0% found this document useful (0 votes)
38 views29 pages

Leasec Final Reviewer

The document consists of a series of questions and answers related to security measures, alarm systems, lighting types, locks, and various security principles and regulations. It covers topics such as the purpose of different security devices, types of barriers, and qualifications for security personnel. Additionally, it includes historical context and legislation relevant to the security industry in the Philippines.

Uploaded by

shindolim34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views29 pages

Leasec Final Reviewer

The document consists of a series of questions and answers related to security measures, alarm systems, lighting types, locks, and various security principles and regulations. It covers topics such as the purpose of different security devices, types of barriers, and qualifications for security personnel. Additionally, it includes historical context and legislation relevant to the security industry in the Philippines.

Uploaded by

shindolim34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Leasec

I. What does the concealment method in cryptography do?


A) Reverses words in a sentence
B) Hides the message in unrelated texts
C) Encrypts mameric sequences
D) Uses codes 1o represcnt entire words

2. An annunciator in an alarm system functions as what?


B) The signaling component that activates alarms
A) A power supply unit
C)A vibration-sensitive sensor
D) A data transission device

3. Which type of alarm uses vibration detcction?


A) Laser beam alarm
B) Photoclectric device
C) Vibration detection device
D) Audio detection device

4. Which type of lighting is best suited for selective, temporary illumination?


A) Continuous lighting
B) Movable or portable lighting
C) Mercury vapor lighting
D) High-pressure sodium vapor lighting

5. What type of lock is design by pressing a series of buttons in the proper sequence?
A) Combination lock
B Code-operated lock
C) Electrical lock
D) Card-operated lock

6 Key control is an essential part of security. Which of the fotlowing is NOT a recommended
method for ky control?
A) Key cabinet
B) Frequent changes of key codes
C) Key audits
D) Automatic disposal of old keys

7What is the purpose of a top guaard on a fence?


A) To add aesthetic appeal
B) To deter climbing by intruaders
C)To provide additional lighting
D) To cnable better patrol routes

8. What kind of alarm system directly alerts law enforcement agencies?


A) Local alamm
B) Auxiliary alarm
C) Central station systcm
D) Propnicty alarm
9. Which type of key opens locks within a specific area or department?
A) Change key
B) Sub-master key
C) Master key
D) Grand master key
10. Which of the following is NOT a type of protective alarm?
A) Vibration detection device
B) Laser beam alarm
C) Soundwave distortion detector
D) Photoelectric device

11. The pass system that enhances security through exchanges at multiple points is called:
A) Single pass system
B) Pass exchange systcm
C) Multiple pass systcm
D) Visitor pass systcm

12. Which is an example of personal recognition?


A) Facial features
B) ID cards
C) Passcodes
D) Biometric scans

13. Which type of investigation includes inquiries sent to previous employers and- schools?
A) National Agency Check (NAC)
B) Local Agency Check (LAC)
C) Complete Background Investigation
D) Partial Background Investigation

14, What is the purpose of floodlights in security systems?


A) To cnhance acsthetics of the building
B) To illuminate vital areas and boundarics
C) To replace other types of lighting
D) To decrease power consumption

15. Which lamp type offers instant illumination?


A) Mercury vapor lamp
B) Incandescent lamp
C) Fluorescent lamp
D) High-pressure sodium vapor

16. Scarchlights are primarily uscd for:


A) Gencral lighting in parking areas
B) Pinpointing specific trouble spots
C) Reducing crime near street lights
D) E mergency lighting purposes

17, Which part of an alarm system triggers the alert?


^) Sensor/Trigger device
B) Enunciator
C) Trasmission linc
D) Control panel

18, What is the main purpose of document and information security?


A) To organize office records
B) To prevent unauthorized access and ensure confidentiality
C)'To reduce costs associated with storage
D) To replace physical documents with digital copies

19, Information concerning employees' salaries and medical matters is classified as:
A) Restricted
B) Private
C) Secret
D) Confidential
20, Which of the following is considered proprictary information?
A) Public domain data
B) Customer lists
C) General marketing trends
D) Open-source software

21. Trademarks are used to


A) Prevent theft of trade secrets
B) Protect literary works
C) Differentiate goods from competitors
D)Safeguard classified documents

22. Copyright violations are referred to as:


A) Breach of contract
B) Trademark infringement
C) Piracy or infringement
D) Espionage

23. Which of the following is an example of a trade secret?


A) Trademarked product name
B) Secret production formula
C) Published patent dctails
D) Company logo

24, What is risk in the contxt of security?


A) The process of avoiding hazards
B) Potential damage or loss of an asset
C) The creation of a safe environment
D)Ensuring compliance with laws

25. Risk management involves:


A) Avoiding hazards entirely
B) Developing countermeasures to reduce risks to acceptablc levels
C) Eliminating all possible risks
D) Focusing only on physical security

26. What is the purpose of protective lighting?


A) To reduce cnergy consumption
B) To improve the aesthetic of facilities
C) To create a psychological deterrent to intrusion
D) To eliminate the need for barriers

27. What is the primary advantage of a solid fence?


A) It is less expensive than other fences
B) It denies visual access to intruders
C) It allows roving patrols to monitor easily
D) It is more durable than chain-link fences

28 Which type of protective lighting IS typically used in prisons?


A) Emergency lighting
B) Glare projection lighting
C) Fluorescent lighting
D) Controlled lighting

29, Which fencing barrier is known for its coiled wire structure?
A) Chain-link fence
B) Barbed wire fence
C) Concertina wire fence
D) Full-view fence
30. The Great Wall of China serves as an cxample of
A. Early defensive and protective structures
B. A symbol of economic trade routes
C. Primitive communication techniques
D. Religious monuments for sccurity

31, What was the first name of the Jimenez Security Agency?
A. Special Watchman Agency
B. Security and Protection Service
C. National Watchman's Organization
D. Industrial Guard Forcc

32 What docs PNP SOSIA primarily oversee?


A. Security education in schools
B. Supervising operations of security agencies
C, Civil sccurity regulation laws
D. Communication and logistics for agencics

33. The first organization of security agencies in the Philippines was called:
A. PADPAO
B.SOSIA
C, Civil Security Group
D.PCSUSIA

34 , Which of the following is NOT an arca of security?


B. Digital sccurity
A. Physical security
D. Document and information security
C, Personnel security

35, Sccurity cducation and personnel checks are examples of.


AActive measures
B. Passive measures
C.Personnel policics
D. Physical measures

36. What is the primary focus of Industrial Sccurity?


A. Guarding schools and malls
B.Protecting VIPs during events
C, Sccuring business opcrations and assets
D. Managing government agencics' personnel

37. The Logistics Manager is responsible for:


A. Supervising financial transactions
B. Developing logistical support plans
C, Oversccing personnel training
D. Managing daily security operations

38. Which role involves preparing official communications for the General Manager?
A. Communications Office
B. Office of the Executive Secrctary
C. Operations Manager
D. Inspectorate Staff
39, What is the primary purposc of a perimeter barricr?
A) To create storage arca
B) To deny or impede unauthorized access
C) To beautify the surroundings
D) To act as a natural landmark
40. Which of the following is a natural barrier?
A) Fences
B)Rivers
C) Guard dogs
D) Safe cabinets

41. What type of barrier is created using trained dogs?


A) Structural
B) Animal
C) Human
D) Natural

42. The principle that "physical sccurity must be built upon a systcm of defense in depth" implics
what?
A) One strong barrier is sufficient
B) Multiple layers of security should be used
C) Physical barriers are optional
D) Only electronic security is needed

43. What is an exclusion arca?


A) A restricted arca with TOP SECRET security interests
B) A public gathering space
C) An unmonitored utility zonc
D) A temporary checkpoint

44. Which type of fencing allows full visual access?


A) Solid fence
B) Full-view fence
C) Concertina wire
D) Guard tower

45. A chain-link fence should reach how close to the ground?


A) 5 inches
B) 2 inches
C)10 inches
D)1 foot

46. The clear zone requirement for perimeter barriers is at least how wide?
A) 10 fect
B)20 feet
C) 50 feet
D) 5 feet

47. What type of lighting is used during power failures?


A) Continuous lighting
B) Emergency lighting
C) Movable lighting
D) Floodlights

48. Which type of alarm system is monitored dircctly within a company?


A) Local alarm
B) Auxiliary alarm
C) Propriety alarm
D) Central station system
49. What is an artificial recognition method?
A) Personal rccognition
B) Identification cards
C) Facc-to-face identification
D) Retinal scanning
50. Which pass system allows an employec to keep thcir badge permanently?
A Single pass system
B) Pass exchange system
C) Multiple pass systcm
D) Visitor pass system

51, What is communication security?


A) Safeguarding documents
B) Preventing unauthorized interception of messages
C) Encrypting personnel files
D) Locking up physical keys

52 Which component of communication sccurity prevents traffic analysis?


B) Cryptographic security
A) Transmission security
C) Physical sccurity
D) Alarm systems

53. A well-maintained clear zone helps to achicve which of the following?


A) Concealing sccurity personnel
B) Protecting utility openings
C) Preventing unauthorized entry
D) Providing shelter for employees

54. Which lock type uses a coded card for operation?


A) Combination lock
B) Card-operated lock
C) Key-operated lock
D) Padlock

55, What is a grand master key capable of?


A) Opening all locks in a specific department
B) Opening only safes and vaults
C) Opening every lock within a systcm of master keys
D) Unlocking doors without a passcodc

56. What is the most important feature of a sccurity cabinct?


A) Fireproofing and burglary resistance
B) Lightweight and portability
C) Transparent design for easy monitoring
D) Adjustable size for documents

57. What is the minimum recommended weight of a safc?


A) 500 Ibs.
B)1,000 lbs.
C) 750 lbs.
D) 250 l'bs.

58. Vault walls must be reinforced concrete of what minimum thickness?


A) 6 inches
B) 8 inches
C) 10 inches
D) 12 inches
59. What is the term for limiting access to information on a necd-to-know basis?
A. Command Responsibility
B. Compartmentation
C, Access Control
D. Efficiency Management
60. What ycar was the Private Security Agency Law (R.A. 5487) passed?
A.1933
B.1958
C.1969
D.1973

61. Which office within a security organization is responsible for financial manageraent?
A. Office of the Inspectorat
B. Office of the Finance
C.Office of the Opcrations Manager
D. Officc of the Logistics Manager

62. What is a basic qualification for a private detcctive?


A. Must be over 30 years old
B. Graduate of a Criminal Investigation Coursc
C. Active member of the AFP
D. Holds a firearms license

63, Which principle emphasizes that security is a concern of all personnel regardless of rank?
A. Command Responsibility
B. General Principles of Security
C, Balance between Security and Efficiency
D. Compartmentation

64. What is an example of an active security measure?


A. Security education seminars
B. Psychological deterrence
C. Installation of physical barriers
D. Personnel background checks

65. What year did the private security business begin in the Philippines?
A.1933
B.1958
C.1969
D. 1972

66. Who founded the first licensed private security agency in the Philippines?
1 Jose and Pedro Jimenez
B. Juan and Pedro Jimenez
C. Juan and Jose Jimencz
D. Pedro and Rico Jimenez

67. The PNP Supervisory Office for Sccurity and Investigation Agencies (SOSIA) was established
in
what year?
A.1958
B. 1969
C.1996
D. 2009

68. What does Republic Act 11917 regulate?


A Licensing of firearms
B. Employment of security guards
C.Private sccurity services industry
D. Logistical operations for security agencies

69 Which principle ensures that specific measures suit operations?


A. Balance betwcen security and efficiency
B. Command responsibility
C. General principles of security
D. Compartmentation

70. What are passive sccurity measures designed to do?


A. Act: as physical barriers
B. Deter actions through fear of consequences
C, Provide covert surveillance
D. Reinforce company structures

71. Which type of sccurity deals with protecting classified documents?


A Physical Security
B. Personnel Sccurity
C, Document and Information Security
D. Industrial Security

72. What type of sccurity is primarily concerned with protecting shopping malls and their patrons?
A. Mall Security
B. Industrial Security
C, Hotcl Sccurity
D. Bank Sccurity

73. What is the key role of a security guard?


A. Prevent property damage during disasters
B. Protect lives and properties within their jurisdiction
C.Enforce government tax laws
D. Operate heavy machinery in industrial facilities

74. What is the duty of a Detachment Commander?


A, Coordinate financial operations
B. Supervise all security personnel within a detachment
C. Conduct employee background checks
D.Investigate administrative issues in the security agency

75. The Assistant Detachment Commander takes over the duties of the Detachment Commander
when:
A. The commander is relieved
B. The commander is absent
C. New security policies are implemented
D. There are more than 15 guards assigned

76, Which cthical principle prohibits revealing confidential information?


A. Honesty in thought and deed
BObedience to laws
C. Maintaining dccorum
D. Confidentiality

77. What is the first General Order for security guards?


A. To obey and report orders from superiors
B. To take charge of their post and company property
C. To quit their post only when relieved
D. To maintain a professional appearance

78. A security guard must not:


A. Engage in unnecessary conversation while on duty
B. Learn the location of fire extinguishers
C, Report cases of disorder to the police
D. Observe the Private Security Agency Law

79 , What is a minimum qualification for a sccurity guard?


A.Aged 16-60 years
B. At least a college graduate
C. Physically and mentally fit
D Holds a private investigator licensc

80. What basic qualification is required for a private detcctive?


A. Master's Degree in Criminology
B, Bachelor's Degrec in Criminology
C. Sccurity Officers Training Course
D. Experience as a security guard

81. A security consultant must hold at least which degree?


A High School Diploma
B. Bachelor's Degree
D. Associate's Degrec
C. Master's Degree

82. What training must a security guard undergo before licensure?


A. Pre-licensing training course
B. Firearms certification program
C.Advanced ROTC
D Industrial Security Certification

83. Licenses for firearms used by security guards are renewed every:
A. Six months
B. One yrar
D. Five years
C. Two years

84. What did ancient Greece use as an carly alarm system for intruders?
B. Geese
A. Bells
D. Torches
C.Dogs

85. When was the Philippine Association of Detectives and Protective Agency Operators
(PADPAO)
formally organized?
A.1933
B.1958
C. 1969
D.1972

86. Presidential Decree 11, passed in 1972, expanded R.A 5487 to include security guards
employed
in:
A. Industrial manufacturing
B. Agriculture and pasture lands
C. Private schools
D, Banking institutions

87. In 1973, what was the focus of Presidential Decree 100?


A. Setting minimum guard requirements
B. Regulating security firms in urban areas
C. Expanding coverage to government-employed guards
D. Issuing firearm guidelines for guards
88. The Civil Securky Group (CSG) is primarily responsible for:
A. Enforcing general laws on business
security
B, Regulating firearms, explosives, and private security
C. Hiring security consultants for private industries
D. Handling logistical operations in security agencies
89, What is the primary duty of the Finance Office in a security organization?
A. Supervising security operations
B. Handling accounting and payroll
C. Developing operational plans
D. Inspecting guard performance

90. Security guards at fixed posts must maintain a logbook to record:


A. Their personal tasks
B. Details of VIP passages and inspections
C. Communication logs with other guards
D. Attendance of all personnel

91. Which personnel is responsible for preparing security plans for detachments?
A. Logistics Manager
B Human Resources Officer
C. Detachment Commander
D. Communications Officer

92. What should a security guard avoid doing during their tour of duty?
A. Drinking alcoholic beverages
B.Reporting signs of disorder
C.Leaming how to operate fire extinguishers
D. Assisting the police during emergencies

93 When issued a pass, a security guard must not:


A. Keep it on their perso
B. Display it to authorities when requested
C. Lend it to another person
D. Use it to access restricted areas

94. What General Order requires a sccurity guard to quit their post only when properly relieved?
A. General Order No. 2
B. General Order No 5
C, General Order No. 7
D. General Order No. 11

95. Which risk management strategy involves transferring financial responsibility?


A) Risk avoidance
B) Risk reduction
C) Risk transfer
D) Risk spreading

96. What is criticality in risk management?


A) The chance of an event occurring
C) The level of security required
B) The financial impact of a loss
D) The severity of employee dissatisfaction

97. A proactive measure to eliminate the possibility of risks is called


A) Risk reduction
B) Risk transfer
C) Risk avoidance
D) Risk assessment

98. What is risk spreading?


A) Sharjng the consequences of risk with others
B) Allocating risks to one department
C) Eliminating risks completely
D) Concentrating risks in onc location
99. Natural hazards include
A) Espionage and theft
C) Sabotage and pilferage
B) Floods and earthquakes
D) Industrial accidents

100. What is the main characteristic of a systematic pilferer?


A). Acts on impulse
B) Has preconceived plans for theft
C) Works alonc without assistance
D) Avoids stealing 1tems of valuc

101. Espionage is defined as:


A) The act of sabotaging company property
C) Spying to gain confidential information
B) The deliberate destruction of records
D) Vandalizing proprictary equipment

102. What is the primary purpose of a security survey?


A) Routine inspection of daily operations
B) Evaluation of potential hazards and protection measures
C) Investigation of past security breaches
D) Monitoring employce performance

103, Which of the following is a key goal of a security inspection?


A) Identifying new employces
B) Ensuring compliance with existing security protncols
C) Eliminating all hazards
D) Expanding business operations

104. What is the act of stealing items of small valuc called?


A) Vandalism
B) Sabotage
C) Pilferage
D) Espionage

105. A casual pilferer is characterized by:


A) Organized theft with a tcam
B) Stealing due to unexpected opportunities
C) Planning and stcaling for economic gain
D) Using insider knowledge for theft

106. Risk reduction aïms to:


A) Eliminate the probability of risk entirely
B) Minimize the likelihood or severity of a potential loss
C) Transfer risk responsibility to another party
D) Focus all resources on a single risk

107. In risk management, probability measures:


A) The severity of harm
B) The mathematical likelihood of an event occurring
C) The financial value of an asset
D) The type of hazard involved

108, Which strategy spreads the impact of risk across multiple sectors?
A) Risk transfer
B) Risk avoidance
C) Risk spreading
D) Risk elimination
109. A security suryey is conducted to:
A) Investigate employce performance
B) Review security systems for potential risks
C) Build new security installations
D) Perform routine facility maintenance

110. What classification applics to information that could harm a company if disclosed?
A) Secret
B) Restricted
C) Public
D) Private

111. Which classification is typically used for marketing stratcgies?


A) Secret
B) Restricted
C) Public
D) Private

112, Trade secrets are considcred:


A) Patented intellectual property
B) Proprietary information
Cy Publie domain data
D) Unregulated company assets

113, What is the primary objective of a security inspeetion?


A) Detecting weaknesses in existing security protocols
B) Ensuring document retricval speed
C)Providing a security baseline for competitors
D) Improving public access to company data

114, How is proprietary information protected by a company?


A) By storing it in public repositories
B) Through patents, trademarks, and copyrights
C) By allowing employees full aceess to it
D) By encrypting only seeret information

115. A risk analysis helps an organization:


A) Avoid all types of risks
B) Identify, evaluate, and mitigate risks
C) Increase financial exposure
D) Transfer risks without evaluation

116. What type of lighting i5 used during a power outagc?


A) Continuous lighting
B) Emergency lighting
C) Portable lighting
D) Mercury vapor lighting

117. Which type of protective barricr uses high-strength stcel wirc?


A) Solid fence
B) Barbed wire
C) Concertina wire
D) Energy barricr

118, Which part of an alarm system detccts potential intrusions?


A) Enunciator
B) Sensor/Trigger device
C) Transmission linc
D) Control panel
119, Which type of alarm activates when an object breaks a light beam?
A) Vibration detcction alarm
B) Audio detection alarm
C) Photoclectric alarm
D) Laser beam alarm

120, The primary purpose of protective lighting is to:


A) Providc backup power for other systems
B) Illuminate the facility for psychological deterrence
C) Replace all physical barriers
D) Increase the aesthetic appeal of the premises

121. A vault wall should have a minimum thickness of;


A)8 inches
B) 6 inches
C) 12 inches
D) 10 inches

122 The term "risk transfer"" refcrs to:


A) Reducing the probability of risks
B) Shifting financial responsibility for risks to another party
C) Eliminating all risks within an organization
D) Increasing asset value to offset risk

123. What type of alarm systcm is monitored by security personncl within the company?
A) Loca] alarm
B) Auxiliary alarm
C) Propricty system
D) Central station system

124. What is the minimum recommended height for barbed wire fencigg. exeluding the top
guard?
A) 5 feet
B)6 feet
C)7 feet
D)8 feet

125, Which type of protective lighting is manually operated and movablc?


B) Continuous lighting
A) Emergency lighting
C)Portable lighting
D) Standby lighting

126. Which hazard involves the delibcrate destruction of systems or asscts?


A) Pilferage
B) Sabotagc
C) Espionage
D) Vandalism

127. Which type of pilferer acts without a preconceived plan?


A) Organized pilferer
B) Systematic pilferer
C) Casual pilferer
D) Group pilferer
128. What type of pilfcrer stcals for cconomc gain with a planned approach?
A) Random pilferer
B) Opportunistic pilferer
C) Systematic pilferer
D) Accidental pilferer
129. Which classification of information includes plans to merge, divest, or reorganize?
A) Restricted
B) Private
C) Secret
D) Public

133. Pass cxchange systems arc designod to:


A) Reduce the need for physical barriers
B) Enhance secunty through multiple checkpoints
C) Provide tempotary badges for employces
D) Replace automated identification systems

134, A security guard must immediately notify autboritics in the event of:
A Expired licenses
B. Signs of disorder or riot
C.Ashift change
D. Loss of personal property

135, The Code of Ethics roquires a secunity guard to:


A Share confidential information only with their employer
B. Obey the laws of the land at all timcs
C Always prioritize tbcir personal interests
D. Perform duties without regard to client policics

136. Which qualification is mandatory for a Sccurity Officer?


A. Advance ROTC training
B. Retired AFP/PNP personnel status
C,Sccurity Officer Training Course completion
D. Bachclor's Degree in Criminology

137. What age range is required for sccurity guards in the Philippines?
A.18-50 ycars old
B. 21-60 yeats old
C,18-60 years old
D. 21-50 years old

138, Which qualification is required for an agency operator/manager?


A. Must be 30 ycars of age or older
B, High school graduate with extensive experience
C. Graduate of Industrial Security Management
D. Active military or police personnel

139, Before practicing, a security guard must obtain a valid:


A. Fircarms permit
B, Security guard license
C. General work visa
D. Operations certification

140, High-powered firearms can be authorized for security guards in arcas where:
A. Crime rates are high
B. There are over 20 guards in a detachment
C, Urban security is minimal
D, Bank operations are prominent
141, The substitution method in cryptography involves what?
B) Hiding messages within unrelated texts
A) Writing messages backward
C) Replacing elements with alternate symbols
D) Using lasers to encrypt texts
142. Which type of investigation involves checking an individual's past employment and resider
A) Background Investigation
B) National Agency Check
C Local Agency Check
D) Security Audit

143. Visitors should always be:


A) Given free access to facilitics
B) Escorted by security personnel
C) Assigned permanent IDs
D) Allowed to bypass checkpoints

147. Which type of cipher involves writing messages backward?


A) Substitution
B) Transposition
C) Concealment
D) Encapsulation

148. Which type of investigation is the most comprehensive?


A) Local Agency Check (LAC)
B) National Agency Check (NAC)
C) Background Investigation
D) Criminal Rccord Check

149. Which is considered the "weakest link" in the sccurity chain?


A) Communication security
B) Personnel security
D) Cryptographic security
C) Barrier sccurity

150. What motivates disloyalty through hatred or a desire for vengeance?


A) Matcrial gain
B)Revenge
C) Idcological belicfs
D) Personal prestigc

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy