Category: CSS245 0 CSS245 1 / 120 The triangular theory of industrial loss is symbolically thus ______ HE/UC/UH UC/CH HJ UC/CH CH/UC BE 2 / 120 The breach of corporate security is called Check 3 / 120 How the security departments should discharge its function is part of the Check 4 / 120 Public security refers to security as ______ Competitive activity Gain venture Loss prevention activities Liberal market 5 / 120 The demand for identification card for anybody claiming to be from water works is a hint on Check 6 / 120 Agencies like customs immigration Nigeria security land civil defense corps, etc are called _______ Public sector security Private sector Individual sector Area command sector 7 / 120 All appliances must be properly switched off before leaving the establishment is _______ Personal Hints Office Hints Public Hints Home Hints 8 / 120 Electronic devices constitute the fastest growing category of security Check 9 / 120 The aim to detect less wanderers in the office environment is known as Check 10 / 120 The public security refers to security (loss prevention activities) is undertaken by the Check 11 / 120 The records in security practice used for record keeping or to issue out instructions are called Check 12 / 120 The records in security practice used to keep permanent information are called Check 13 / 120 The attribute of Ethics is _________ Culture Structure Value Practice 14 / 120 The armed forces and Nigeria police are agencies under the term Check 15 / 120 The Nigeria police force is a public institution established by the Act CAP of _____ 156 of 1945 157 of 1946 154 of 1943 155 of 1944 16 / 120 Unsafe attitude or Act is a behaviour which resulted in ____ Carefully Safety Negligence Purpose 17 / 120 Every business enterprise or company is exposed to Check 18 / 120 The protection and preservation of lives and property against wastage in a premises is called Check 19 / 120 The private security is employed to perform the services of _____ Detection Watching Investigation Preservation of law 20 / 120 Example of unsafe conditions in industrial loss is______ Under carrying Over carrying Under loading Overloading 21 / 120 The private Guards Degree of _______ 33 of 1986 33 of 1989 33 of 1987 33 of 1988 22 / 120 The private security is characterized by ______ Competition Abnormality Monopoly Surplus partners 23 / 120 Aberdeen patrol system is a patrol where there is ______ Shortage man power Large manpower Shortage of premises Small areas 24 / 120 The valuable management tool in the process of risk analysis which proceed from threat assessment (identifying risk) to the threat evaluation (determing the criticality and cost of that risk) to the selction of security counter measure is known as Check 25 / 120 The constitutional body responsible for advising the president on matters relating to public security is Check 26 / 120 The evaluation of protection programme is associated with loss and analysis. Check 27 / 120 The effective control and the monitor of movements of both visitors and internal staff requires Check 28 / 120 The craftworker assumed the role of Check 29 / 120 The public security is invariably a Check 30 / 120 The prevention and detection of crime and the apprehension of an offender is the sole duty of Check 31 / 120 Professional security practitioners must not only be people of integrity they must also be seen to be so it is a ________ Religious ethics Political ethics Social ethics Security ethics 32 / 120 This is one of the several systems of organizing effective patrol ______ Flexible route system Fight-up system Down tool system Follow-up system 33 / 120 The bourgeois class assumed the role of Check 34 / 120 The act of watching, protecting a facility by moving continually around is Check 35 / 120 The security survey report tries to reveal the areas of ______ Weak Status Strength Strongness 36 / 120 At the apex of the structural organization of the industrial security management is ____________- Chief security officer Board of Directors General manager Chief Executive officer 37 / 120 There are types of records in security practice Check 38 / 120 Ensure that all gates and other entrances are closed and locked it is the responsibility of________ Security patrol Public officer Private office Home office 39 / 120 The unnecessary exposures to risk - bearing are the suffering harm or losses and of protection programmes Check 40 / 120 The process by which individuals assess information from the environment, organise it and make meaning of it is Check 41 / 120 The functions of the Nigeria police council include_______ Defend the law Appointment the IGP Present Budget To advise the president 42 / 120 The behaviour or actions that expose life and property to danger or security risks is called Check 43 / 120 A process of establishing objectives, allocating resources within prescibed budgeting limitations is Check 44 / 120 The Jesse Oil Spill of October 1998 in which NNPC loss thousands of naira is ______ Called losses Indirect losses Direct losses Uncalled losses 45 / 120 An incorporated company as an artificial person in the eye of the law, is entitled to Check 46 / 120 The private security is characterised by Check 47 / 120 The loss prevention and control as a selection of counter measures such as _______ Procedural control Process control Software system Risk control 48 / 120 The limit and extents of powers to be conferred on security managers, supervisors, etc entails _______ social policy Security recruitment Security administration Security policy 49 / 120 The security manager must comply with the decree ______ In the training functions of the security staff No 16 of 1989 No 17 of 1988 No 18 of 1989 No 19 of 1990 50 / 120 The Nigeria police council comprises one of the following _____ Minister of Police Affairs The president Commissioner of police ASP 51 / 120 Super numerary police officer is a police officer from the _____ Private organization Shel NPF Super police 52 / 120 The latin translation of the word 'moris' is Check 53 / 120 An incorporated company as a natural person is entitled to security of the Check 54 / 120 To acknowledge standards and criteria for training induction and deployment of staff is _______ Staff policy Recruitment policy Labour policy Personnel policy 55 / 120 Endeavour not to spray your money at public functions such marriages, etc is _______ Hints on security at wedding Hints on security inside home Hints at easy Hints on security outside home 56 / 120 Security survey is aimed at _______ Identifying deficiencies Identifying abundance Identifying production Identifying abuses 57 / 120 The word 'ethic' is derived from the Greek word Check 58 / 120 The chairman of the National Security council is Check 59 / 120 How the security of retrenchment information should be protected against leakage, is_______ Retrenchment policy General policy Protection policy Security policy 60 / 120 Fighting do occur because of poor communication between the security, staff and at the guard - post Check 61 / 120 The private guards companies decree no 33 of was enacted to safeguard the conducts of private operators. Check 62 / 120 ______ is one of the proforma schedule of duty for security staff Restraint actions Delay response Receive, read Don’t receive or read 63 / 120 The National Security Council is a ________ body responsible for advising the president on matters of public security Constitutional Advisory Cultural Legal 64 / 120 The public sector security is an agency of the Check 65 / 120 Uniforms, Cap, Badge, or other identification marks to be must be approved by the minister of internal affairs before _______ be in operation Private security outfit Security guard Security outfit Public security company 66 / 120 The technological innovations were the main factors of the industrial revolution in Great Britain and ___________ USA Obohia Brazil Japan 67 / 120 One of the four major types of patrol is ______ TV patrol Radio patrol Afternoon patrol Country patrol 68 / 120 The state or circumstatnces or place not providing good protection or not free from danger is called Check 69 / 120 Industrial Revolution affluence causes______ Harmony Enjoyment Frustration Education 70 / 120 The security equipment manufacture safes and services is a type of company that _____ Secure security Distribute CCTV movement detector Attack security Prevent war 71 / 120 The formulation of security policy is the sole responsibility of management at ________ District level Board level Social level Security level 72 / 120 To have a visitor's access control, guard post at every access point is very important to check their entry and Check 73 / 120 The security that is privately owned and managed is called Check 74 / 120 The persons associated with economic gains and profits are known as Check 75 / 120 The most popularly Guard Dog used is the German shepherd, also known as the_____ Alhassan Obohia Alsatian Atassian 76 / 120 The act of performing the services of watching, guarding, patrolling or carrying of money is the sole duty of Check 77 / 120 Industrial Revolution is associated with ______ Economic production Factory system production Revolutionary production Finished goods production 78 / 120 The relationship between the employer and the employee becomes Check 79 / 120 The qualities of industrial security manager includes ______ Smartness Very tall Physique Bound by code of ethics 80 / 120 Causes of industrial loss include __ Safe retention Unsafe response Unsafe retention Safe response 81 / 120 Any person may be ineligible to own security guards company in Nigeria if ______ Inhibited Innocent Trusted Convicted 82 / 120 To protect lives' are the sole responsibility of management at board level to formulate Check 83 / 120 The act which is related to the conduct of security practitioners is Check 84 / 120 The understanding of security problems and the measures to solve them is Check 85 / 120 The basis of security is the need to know the and reaction in industrial security Check 86 / 120 The modern security hardware which is remotely controlled by an intrusion alarm is Check 87 / 120 ______ Should not act as a member of the police force or perform the duties Prison services Special constabulary Shell police Public security 88 / 120 Security agencies in Nigeria include _____ Girls Guide Shell police Boys Bridge Boys Scout 89 / 120 When an environment induces actions or events that can result in losses to the company it is called Check 90 / 120 Another aspect of the revolution is that it is based upon _______ Mixed system Communal system Socialist system Capitalist system 91 / 120 The subject matter of ethics is concerned with what is right or Check 92 / 120 Perception is the process in the problem of security industry where individuals assess _____ Technology from the environment Information from the environment Knowledge process Cultural environment 93 / 120 and timely account of events provides both hind sight and forsight to security management Check 94 / 120 The detail legal framework for the establishment of company in Nigeria is scheduled in ______ Decree 1 of 1990 Decree 2 of 1991 Decree 3 of 1992 Decree 4 of 1993 95 / 120 ______ is the government arrangement for the protection of lives and property Odua peoples Vigilante Bakkasi boys Armed forces 96 / 120 The purpose of professional ethics is to_____ Set rules and regulations Coordinate members Set force task Establish relationship 97 / 120 The decree that was enacted by the government to regulate private guards operators is ______ PGC No. 36 of 1989 PGC No. 35 of 1988 PGC No. 34 of 1987 Private guards companies decree No. 33 of 1986 98 / 120 The electronic system which enunciated at the security duty room from where a designated response force is dispatched is Check 99 / 120 The develop forecasts in planning process is aimed at_____ Look at the past only Don’t predict Targets for crime Does not apply methods 100 / 120 A system of patrol adopted when the area is large and there is shortage of manpower is Check 101 / 120 The protection of company assets from fire, fraud, damage and trepass is the role of ____ Industrial security Social security Economic security Political security 102 / 120 ___ is a member of the Nigeria National Council Minister of foreign affairs Minister of education Minister of sports Minster of Labour 103 / 120 The private security firms are private companies required by law to be registered with Check 104 / 120 The process of security planning involves the establishment of _____ Liberation Freedom of planning Limitation Standards 105 / 120 The policy on employee dishonesty and crimes is aimed at ______ Trade union Dismissal Avoid embarrassment Destabilization 106 / 120 Dearth of modern equipment, technology and methods is the problem of ___________ Cultural industry Security industry Political industry Social industry 107 / 120 The private security firms are private companies required by law to be registered with _____ CBC CDC CBN CAC 108 / 120 A system where the security operative is detailed to patrol along a given route is known as Check 109 / 120 The industrial revolution contributed to a production Check 110 / 120 Avoiding leaving your visitor alone in the office is a hint on Check 111 / 120 While in a bank, make sure you do not use your residential address is a hint on Check 112 / 120 By constitutional responsibility, the Nigeria police is answerable to the _______ President NPC IGP PSC 113 / 120 The philosophy of security is an ideology from the time of Check 114 / 120 The duties of the Nigeria police include the ______ Legislate the law Apprehension of offender Interpretation of law Execute offender 115 / 120 When some employees are dismissed, they may resort to dangerous maneuvers$ against the company or to settle embittered scores. Check 116 / 120 This is one of the features of security planning _____ Liberal in limitation Plan for security Always liberal Authorized budgetary limitations 117 / 120 is the primary mode of production during the industrial revolution. Check 118 / 120 The method to control any activity carried out and to prevent any violation of the policy is Check 119 / 120 The police service commission is responsible for ______ Advise the president Appoint IGP Advise the Governor Exercise disciplinary actions 120 / 120 In modern applications, security hardware is often combined with Check Restart quiz Rate this quiz Send feedback