100% found this document useful (1 vote)
2K views5 pages

Industrial Security Management

The document discusses various aspects of industrial security management including: 1. Requirements for private security agencies including ownership, bonding, equipment, and trained personnel. 2. Restrictions on high-powered firearms for private security agencies to not exceed a certain percentage of total guards. 3. Perimeter defense as the third line of physical defense. 4. Doors, floors, windows, roofs and walls as the second line of defense, usually referred to as the inside perimeter defense. 5. Sentry dogs being the most common animal barrier used to secure facilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views5 pages

Industrial Security Management

The document discusses various aspects of industrial security management including: 1. Requirements for private security agencies including ownership, bonding, equipment, and trained personnel. 2. Restrictions on high-powered firearms for private security agencies to not exceed a certain percentage of total guards. 3. Perimeter defense as the third line of physical defense. 4. Doors, floors, windows, roofs and walls as the second line of defense, usually referred to as the inside perimeter defense. 5. Sentry dogs being the most common animal barrier used to secure facilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

INDUSTRIAL SECURITY MANAGEMENT

1. Primary requirement in maintaining and organizing a private security agency.


a. It should be 100% Filipino owned and controlled by Filipino Citizen
b. Bond requirement
c. Equipment requirement
d. Trained, skilled and qualified personnel

2. Restriction for high powered firearms, prescribed that its number should not exceed percent of the total number of guards
of a private security agency.
a. 5 c. 15
b. 10 d. 20

3. Third line of physical defense.


a. Perimeter defense c. Storage System
b. Inside perimeter defense d. Clear zone

4. Doors, floors, windows, roofs and walls constitute the second line of defense usually to as:
a. Perimeter defense c. Storage System
b. Inside perimeter defense d. Clear Zone

5. Common weakness for a sentry dog when used as an animal barrier.


a. Ability to check identity c. Incorruptible
b. Keen sense of smell and hearing d. Loyalty

6. Most common animal barrier used to secure facilities.


a. Geese c. Cats
b. Sentry dogs d. Parrots

7. Refers to a line protection adjacent to a protected area and passing thru points of possible entry.
a. Clear zone c. outside perimeters
b. Inside perimeter d. Restricted areas

8. A line protection surrounding and removed from protected areas.


a. Clear zone c. Outside perimeters
b. Inside perimeter d. Restricted areas

9. From the standpoint of security, when should locks be changed?


a. At least once a year c. At least three times a year
b. At least twice a year d. On a quarterly basis

10. If utility opening such as air intakes, sewers, and exhaust tunnels have a cross section of ninety-six inches or more, as a
security consultant what should be the appropriate recommendation?
a. It should be protected by filters and bar grills
b. It should be closed immediately to avoid entry of persons with petit physique
c. It should be manned with an armed guard at all times
d. Sensors should be place on it to detect movements

11. Minimum acceptable height for a fence used as a security barrier.


a. 5 feet c. 10 feet
b. 8 feet d. 12 feet

12. To deny outsiders from visual access in a certain facility what must be constructed.
a. Full view fence c. Solid fence
b. Chain link fence d. multiple fences

13. To prevent unauthorized persons from jumping from one fence to another in case of multiple fences they should be installed at
least feet apart.
a. 6 feet c. 12 feet
b. 9 feet d. 15 feet
14. As a security consultant you have noticed that windows of a particular building has been constructed less than 18 feet from the
ground and 14 feet away from another building, what will be your recommendation to fortify said facility?
a. The windows must be reinforced with steel grills
b. A fence of at least 18 feet must be constructed around the building
c. screens should be installed to prevent petty thievery
d. A wall should be constructed around the building

15. The simplest form of lock which uses a bolt containing a notch called talon.
a. Warded locks c. Disc tumbler locks
b. Coded locks d. Cylinder locks

16. It serves as the trigger apparatus for protective alarms.


a. Circuit c. Signaling device
b. Sensor d. Alarm device

17. Vicinity wherein access is restricted to all unauthorized personnel.


a. Controlled areas c. Limited areas
b. Exclusion areas d. Clear zones

18. Areas wherein additional security measures are utilized.


a. Controlled areas c. Limited areas
b. Exclusion areas d. Clear zones

19. Areas which are always in close surveillance.


a. Controlled areas c. Limited areas
Exclusion areas d. Clear zones

20. An inquiry into the reputation, integrity, character, morals and loyalty of an individual to determine a person’s suitability for
appointment or access to classified matters.
a. National agency check c. Personal security investigation
b. Background check d. Loyalty check

21. The exterior and interior parallel area near the perimeter barrier of an industrial compound to afford observation and patrol
movement in known as
a. Protective zone c. Twilight zone
b. clear zone d. Patrol lane zone

22. Protective guarding in a compound can be done by the use of electronic hardware, human guards and even animals. In England,
an owner to protect his compound used this and they are not only effective but also the cheapest to maintain. This man is
using
a. Doberman dogs c. Geese
b. Tamed tigers and lions d. Ducks

23. The government agency that issued licenses for private and government security guards is?
a. PNP SOSIA c. PNP FEO
b. Municipal/City mayor’s office d. PNP SAGSD

24. If access is limited only to authorized personnel, this particular place is referred to as-
a. Compromise area c. Restricted area
b. Danger area d. Exclusive area

25. First measure undertaken before a comprehensive security program for an industrial plan could be developed.
a. Security survey c. Security check
b. Security education d. Security inspection

26. A security survey of a plant or industrial firm is also known by other terms except-
a. Security audit c. Vulnerability
b. Risk assessment d. Robbery evaluation

27. Today there are three categories of security guards belonging to the “Blue Army”. One of those listed below does not belong
to the group.
a. Body guards c. Company guard d.
b. Agency guards Government Security guards
28. Whether to put up its own security guards organic to the firm or hire contractual agency have their merits and disadvantages.
To determine which type of guarding system an industrial firm will require management must consult
a. A security agency owner
b. A police officer
c. A military intelligence officer
d. A security consultant not connected to or owning a security agency, or part thereof

29. As a security officer, you can not predict natural hazards like storm, earthquakes, floods and the like. In order to reduce the
disastrous effects of these natural hazards, you will
a. Prepare a disaster or emergency plan for these hazards for the firm
b. Not take any concern of such hazards
c. Alert your guards when hazards occur
d. Call PAGASA and inquire when the next storm is coming

30. Practical exercise or test of a plan or activity to determine its effectiveness is called-
a. Evac. Plan c. Fire drill
b. Dry-run d. Sham drill

31. The management of keys used in plant, office or business organization to prevent unauthorized access is referred to as-
a. Key management c. Lock control
b. Key control d. Security key control

32. There are many types of electronic and electric protective devices available for security buildings, storehouses and
compounds. One of the following is true.
a. Electronic/ electric devices eliminated human guards
b. Each building or compound requires particular electronic/ electrical protective devices
c. Types of alarms needed can best be given by the dealers of said devices
d. Electronic/ electric devices provide total protection for the place to be safeguarded

33. As a security chief of an industrial firm, inventory shows that pilferage is rampant in the warehouses. What will be your
choice of action?
a. Tighten checking at exits of vehicles of the compound/ complex
b. Prepare your protective plans and confer with management for their immediate implementation
c. Deploy intelligence men in pilferage prone areas to catch the culprits
d. To resign as you have failed your job

34. In an industrial firm, there is a need for document security investigation is-
a. Unauthorized access c. Theft or loss
b. Compromise or destruction d. Authorized handling

35. The main reason for personnel security investigation is-


a. To weed out undesirable employees
b. To check loyalty of employees to the organization
c. Preclude assignment to sensitive positions for those who are security risks;
d. To determine the character and reputation of certain employees secretly tagged as risks

36. It is defined as a system barriers placed between the matters protected and the potential intruder.
a. Physical Security c. Personnel security
b. Document Security d. Computer Security

37. This type of alarm system utilizes a station located outside the compound.
a. Local alarm system c. Proprietary system
b. Central alarm system d. Auxiliary system

38. It is instilled as part of the building which holds up to 10,000 cubic meters of essential items. At least 12 feet in height, with
enough ventilation and fire proof of at least 1 hour.
a. Safe c. File room
b. Vault d. Protective cabinet

39. It is susceptibility of a plant or establishment to damage, loss or disruption of operations due to various hazards.
a. Relative criticality c. Risk assessment
b. Relative vulnerability d. Risk analysis

40. It refers to the importance of the establishment with reference to the national economy and security.
a. Relative criticality c. Risk assessment
b. Relative vulnerability d. Risk analysis
41. Classification of one who steals due to irresistible urge primarily because of unexpected opportunity and little chance of
detection.
a. Systematic pilferer c. Pickpocket
b. Ordinary pilferer d. Casual pilferer

42. They are installed between the prospective intruder and the target installation.
a. barriers c. locks
b. hazards d. guards

43. For new applicants trying to acquire a security guard license, the maximum age is;
a. 30 c. 40
b. 35 d. 50

44. A security consultant must have at least years experience in the operation and management of security business.
a. 5 years c. 15 years
b. 10 years d. 20 years

45. A regular license granted as private security license card is valid for;
a. 1 year c. 3 years
b. 2 years d. 5 years

46. A security unit operated and maintained by any government entity other than the military or the police, which is established
and maintained for the purpose of securing the office or compound and/or extension of such government entity.
a. Company Security Force c. Government Security Unit
b. Agency Security Force d. None of these

47. Refers to a security force maintained and operated by any private company or corporation for its own security requirement
only.
a. Company Security Force c. Government Security Unit
b. Agency Security Force d. None of these

48. Refers to the association of all licensed security agencies and company security forces.
a. PADPAO c. PNP SAGSD
b. PNP SOSIA d. PNP CSG

49. Under the law, the maximum ratio of a fireman to every security guard in the employ of private security guards.
a. 1:1 c. 1:3
b. 1:2 d. 1:4

50. A private security agency must initially produce at least pieces of licensed firearms for use of its security guards.
a. 20 c. 50
b. 30 d. 70

51. The license or permit to own a firearm for security agencies is applied and processed at:
a. PNP Civil Security Group
b. PNP Security Agencies and Guards Supervision Division
c. PNP Firearms and Explosives Office
d. Any of these

52. Refers to the merger with any person or a group of persons for the purpose of organizing a branch, unit or subsidiary under
separate control and ownership.
a. Security Corporation c. Merger System
b. Kabit System d. Illegal Association

53. A lock which is commonly installed is safe deposit boxes and is deemed pick proof since it is operated by utilizing
combinations by means of a dial.
a. Lever lock c. Cylinder lock
b. Combination lock d. Code operated locks

54. A disc tumbler lock which is used in automobiles would afford delay of at least;
a. 5 to 10 minutes c. 15 to 20 minutes
b. 10 to 15 minutes d. 20 to 30 minutes
55. Earliest known lock in existence.
a. Egyptian lock c. Roman lock
b. Greek lock d. Persian lock

56. For illumination of covered pathways and side walks it is wiser to install;
a. Fresnel lights c. Street lights
b. Search lights d. Flood lights

57. Vaults are storage devices which are usually designed to be at least hours fire resistant.
a. 3 c. 9
b. 6 d. 12

58. Conducted for a period of at least 4 hours, its concern is to reiterate to employees that security is an additional burden imposed
on everyone who is part of the company.
a. Refresher conference c. Security reminders
b. Training conference d. Debriefing

59. This serves as a forum to resolve security problem and explain new rules and regulations.
a. Refresher conference c. Security reminders
b. Training conference d. Debriefing

60. A positive effort to sell security or make the employees more involved in the implementation of security measures.
a. Refresher conference c. Security reminders
b. Training conference d. Security promotion

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy