Q3 Alpha
Q3 Alpha
1. The law that governs the organization and operation of 8. Example of the Security Communication system. 16. The term referring to any information, facility, material, 24. A term used in England for lock pickers, safe crackers and
private security agency throughout the Philippines * A. Telephone information, or activity which has a positive value to its owner penetrators of restricted rooms or area.
a. R. A. 1530 B. Paging system whether it is an individual, private or government A. Superman
b. R. A. 6975 C. Radio entity. * B. Peterpan
c. R. A. 5487 D. All of them a. Asset C. Batman
d. R. A. 8551 9. A security force maintained and operated by any private b. Resources D. Peterman
2. Security lighting system placed at the top of the perimeter company for its own security requirements only. c. Documents 25. This refers to the association of all licensed security
fence is counted as * A. Insular security force d. Property agencies and company security
a. Second line of security B. Company security force 17. It is an act of spying. forces. *
b. Third line of security C. Government security unit A. Saboteur a. PADPAO
c. First line of security D. Private security unit B. Espionage b. PNP SOSIA
d. Fourth line of security 10. The main reason why perimeter barrier openings are C. pilferer c. PNP SAGSD
3. The set of policies, procedures and rules and regulations needed to be monitored is * D. Sabotage d. PNP SUSIA
designed to reduce to an absolute minimum the possibility of a. It could be used as entry points by intruders 18. The system consists of ringing up a visual or audible alarm 26. This type of alarm system utilizes a station located outside
espionage, sabotage and compromise of classified information b. It is a security eyesore system near the object to be protected. the compound.
of an office or a whole establishment. * c. It should be repaired immediately A. Auxiliary alarm A. Auxiliary system
a. Policies d. It could be used as escape route B. Proprietary system B. Proprietary system
b. Procedures 11. It is an act of spying. C. Local alarm system C. Central alarm system
c. Security System A. Saboteur 19. D. Central station system D. Local alarm system
d. Security management B. Espionage This type of alarm system utilizes a station located outside the 27. Issued by the security guard for personnel to be admitted to
4. The business of providing security and protection to private C. pilferer compound the company.
individuals, business and enterprises, or government and non- D. Sabotage A. Auxiliary system A. Duress code
government industries. * 12. This system is used in times of power failure or other B. Proprietary system B. Pass system
a. Industrial Security emergencies when other system are inoperative. * C. Central alarm system C. ID
b. Industrial Security Management a. Emergency lighting D. Local alarm system D. Access list
c. Security b. Search light 20. Barrier which includes but not limited to wall, fences, grill 28. This lighting arrangement is focused on the pile of items,
d. Safety c. Street light etc. rather than the background. The width of the lighted strip can
5. A heavily constructed fire and burglar resistant container d. Portable light A. Structural barriers be controlled and adjusted to suit the security
usually a part of the building structure used to keep and protect 13. It is the uncertainty of financial loss, the probability that a B. Man made barriers needs. *
cash, document and negotiable instruments. loss has occurred or will occur, or the possible occurrence of an C. Physical barriers a. Controlled lighting
A. Basket undesirable event. D. Natural barriers b. Supplemental lighting
B. Vault A. Risk 21. The badge or pass coded for authorization to enter specific c. Continuous lighting
C. Steel cabinet B. Threat areas is issued to an employee who keeps it in his possession d. Glare projection
D. Concrete coffin C. Vulnerability until his authorization terminates. 29. Refers to a natural or man made structure which is capable
6. This is normally provided at main perimeter entrances to D. Danger A. Pass system of delaying illegal access to facility.
secure areas located out- of doors, and manned by guards on 14. If access is limited only to authorized personnel, this B. Pass exchange system A. Wall
full-time basis. * particular place is referred to as C. Single pass system B. Fence
a. Tower Guard A. Compromise area D. Multi pass system C. Barriers
b. Top Guard B. Restricted area 22. Weakest link in the security chain. D. Beach fronts
c. Fence post C. Danger area A. Security Guards 30. This is an additional outward inclined fixed structure usually
d. Guard control station D. Exclusive area B. Manager barbed wires placed above a vertical fence to increase physical
7. What date is the Republic Act No. 5487 or the private 15. This is normally provided at main perimeter entrances to C. Barriers protection from intruders of a certain area, this is known as
security agency law passed? secure areas located out- of doors, and manned by guards on D. Personnel A. Cellar Guard
A. June 13, 1999 full-time basis. * 23. A restricted area where visitors are limited in movement B. Tower Guard
B. June 13, 1969 a. Tower Guard and are usually escorted. C. Top Guard
C. June 7, 2009 b. Top Guard A. Exclusive area D. Top Tower
D. June 31, 1969 c. Fence post B. Limited area
d. Guard control station C. Restricted area
D. Protected area