0% found this document useful (0 votes)
60 views6 pages

Final Security

The document is a final examination for the Industrial Security course at Isabela State University, containing multiple-choice questions related to private security agency requirements, physical defense measures, and security protocols. It covers various topics such as firearms regulations, security barriers, and personnel security investigations. The exam assesses knowledge on maintaining security standards and practices in industrial settings.

Uploaded by

Franklin Ramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views6 pages

Final Security

The document is a final examination for the Industrial Security course at Isabela State University, containing multiple-choice questions related to private security agency requirements, physical defense measures, and security protocols. It covers various topics such as firearms regulations, security barriers, and personnel security investigations. The exam assesses knowledge on maintaining security standards and practices in industrial settings.

Uploaded by

Franklin Ramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Isabela State University

Echague,Campus
College of Criminal Justice Education
Industrial Security
Final Examination

Name_________________________________ Score_________

1. Primary requirement in maintaining and organizing a private security agency.


a. It should be 100% Filipino owned and controlled by Filipino citizens.
b. Bond requirement
c. Equipment requirement
d. Trained, skilled and qualified personnel

2. Restriction for high powered firearms, prescribed that its number should not exceed ___ percent of the total number of
guards of a private security agency.
a. 5 c. 15
b. 10 d. 20

3. Third line of physical defense.


a. Perimeter defense c. Storage system
b. Inside perimeter defense d. Clear zone

4. Doors, floors, windows, roofs and walls constitute the second line of defense usually referred to as:
a. Perimeter defense c. Storage system
b. Inside perimeter defense d. Clear zone

5. Common weakness for a sentry dog when used as an animal barrier.


a. Ability to check identity c. Incorruptible
b. Keen sense of smell and hearing d. Loyalty

6. Most common animal barrier used to secure facilities.


a. Geese c. Cats
b. Sentry dogs d. Parrots

7. Refers to a line protection adjacent to a protected area and passing thru points of possible entry.
a. Clear zone c. Outside perimeters
b. Inside perimeter d. Restricted areas

8. A line protection surrounding and removed from protected areas.


a. Clear zone c. Outside perimeters
b. Inside perimeter d. Restricted areas

9. From the standpoint of security, when should locks be changed?


a. At least once a year c. At least three times a year
b. At least twice a year d. On a quarterly basis

10. If utility openings such as air intakes, sewers, and exhaust tunnels have a cross section of ninety-six inches or more, as a
security consultant what should be the appropriate recommendation?
a. It should be protected by filters and bar grills.
b. It should be closed immediately to avoid entry of persons with petit physique.
c. It should be manned with an armed guard at all times
d. Sensors should be place on it to detect movements.

11. Minimum acceptable height for a fence used as a security barrier.


a. 5 feet c. 10 feet
b. 8 feet d. 12 feet

12. To deny outsiders from visual access in a certain facility what must be constructed.
a. Full view fence c. Solid fence
b. Chain link fence d. Multiple fences

13. To prevent unauthorized persons from jumping from one fence to another in case of multiple fences they should be
installed at least _____ feet apart.
a. 6 feet c. 12 feet
b. 9 feet d. 15 feet

14. As a security consultant you have noticed that windows of a particular building has been constructed less than 18 feet
from the ground and 14 feet away from another building, what will be your recommendation to fortify said facility?
a. The windows must be reinforced with steel grills.
b. A fence of at least 18 feet must be constructed around the building.
c. Screens should be installed to prevent petty thievery
d. A wall should be constructed around the building.

15. The simplest form of lock which uses a bolt containing a notch called talon.
a. Warded locks c. Disc tumbler locks
b. Coded locks d. Cylinder locks

16. It serves as the trigger apparatus for protective alarms.


a. Circuit c. Signaling device
b. Sensor d. Alarm device

17. Vicinity wherein access is restricted to all unauthorized personnel.


a. Controlled areas c. Limited areas
b. Exclusion areas d. Clear zones

18. Areas wherein additional security measures are utilized.


a. Controlled areas c. Limited areas
b. Exclusion areas d. Clear zones

19. Areas which are always in close surveillance.


a. Controlled areas c. Limited areas
b. Exclusion areas d. Clear zones

20. An inquiry into the reputation, integrity, character, morals and loyalty of an individual to determine a person’s suitability
for appointment or access to classified matters.
a. National agency check c. Personnel Security Investigation
b. Background check d. Loyalty check

21. Refers to the working protective detail that provides close physical security to the principal.
a. VIP security c. Close in security
b. Personal security d. Protective security

22. A vehicle always fronting the principal’s vehicle to neutralize any possible threat.
a. Escort vehicle c. Decoy vehicle
b. Recon vehicle d. Shield vehicle

23. Maximum number of guards for company guard forces.


a. 200 c. 800
b. 500 d. 1,000

24. Minimum number of guards allowed for private security agencies.


a. 200 c. 800
b. 500 d. 1,000

25. Minimum number of guards for company guard forces.


a. 20 c. 50
b. 30 d. 200

26. It includes barriers, perimeter fences or guards at the gate.


a. Perimeter defense c. Storage system
b. Inside perimeter defense d. Exclusion area

27. The following are examples of an inside perimeter defense, except:


a. Doors c. Vaults
b. Floors d. Grills

28. It is an independent structure designed to control physical and/or visual access between outside areas, usually classified
as solid and plain view.
a. Masonry walls c. Fence
b. Chain link d. Utility openings

29. House-like structures placed above the fence installed to provide additional view to human guards around the
perimeter.
a. Masonry walls c. Guard control system
b. Top guard d. Towers

30. Usually installed at residences, it is also called night latch and is operated by a key on the outside and a knob on the
inside.
a. Cylinder lock c. Disc tumbler lock
b. Lever lock d. Code operated lock

31. Refers to a key that will open everything in a system involving two or more master key groups.
a. Grand master key c. Sub master key
b. Master key d. Change key

32. A term used in England for lock pickers, safe combination crackers.
a. Padlock expert c. Peter pan
b. Peterman d. Grand master

33. It projects light in concentrated beams, and ideal to use in illumination of buildings, perimeter areas and boundaries.
a. Flood lights c. Fresnel lights
b. Search lights d. Street lights

34. A type of detection system wherein when the security has been breached, the siren is sounded in remote stations
located in the immediate vicinity of the installation.
a. Central station system c. Proprietary alarm system
b. Local alarm system d. Local alarm by chance system

35. A metallic container use primarily for safekeeping usually anchored to the building and should be at least 750 lbs.
a. Safe c. File room
b. Vault d. Depository

36. A heavily constructed fire resistant storage facility and is always part of the building structure.
a. Safe c. File room
b. Vault d. Depository

37. It includes all measures designed to prevent individuals of doubtful loyalty, character and integrity from gaining access
to classified information and sensitive facilities.
a. Document security c. Personal security
b. Personnel security d. VIP security

38. It consists of devices, patterns or compilation of information which is used in one’s business and gives the user
advantage over competitors.
a. Trade secrets c. Proprietary information
b. Formula d. Intellectual property

39. A private security agency applying for a regular license to operate must possess how many pieces of licensed firearms
for guard duty purposes?
a. 50 c. 70
b. 60 d. 100

40. When may firearms issued to private security agencies be confiscated?


a. When the firearm has been used or is about to be used in the commission of a crime.
b. When the firearm’s caliber is not among those prescribe by law for use.
c. When the firearm is carried or used outside the property or compound serviced by the agency without proper authority.
d. All of the foregoing

41. He exercises the power to revoke, for causes licenses issued to security guards.
a. Chief, PNP c. NAPOLCOM Chairman
b. USec. for Peace and Order, DILG d. Secretary, DILG

42. Industrial establishments must establish the first line of physical defense, it refers to:
a. Perimeter barriers
b. The building itself
c. Doors, locks and window barriers
d. Entry points where security guards are located

43. Minimum age requirement for Security Manager or Operator of a Security Agency:
a. 25 years old c. 35 years old
b. 30 years old d. 40 years old

44. Refers to a natural or man made structure which is capable of delaying illegal access to a facility.
a. Wall c. Barrier
b. Fence d. Beach front

45. It refers to means and ways that train personnel and employees making them security conscious.
a. Security promotion c. Security investigation
b. Security education d. Security seminar

46. Registration of a security agency must be processed at what particular government agency?
a. PNP SAGSD c. DND, Civil Defense Office
b. NAPOLCOM d. Securities and Exchange Commission

47. Physical security is a system of barriers placed between the potential intruder and the objects/matters to be protected.
As a criminologist, this is simply a denial of______________.
a. Opportunity to commit the offense
b. Access to the object of protection
c. Opportunity and access to object of protection
d. Criminal instinct to surface in the potential offender

48. Weakest link in the security chain.


a. Security guards c. Barriers
b. Managers d. Personnel

49. Perimeter barriers, protective lighting, and________ systems are known in industrial security as Physical security.
a. Guarding c. Relieving
b. Reporting d. Accounting
50. This is an additional outwardly inclined fixed structure, usually barbed wires placed above vertical fences to increase
physical protection from intruders of a certain area, this is known as________________.
a. Cellar guard c. Top guard
b. Tower guardhouse d. Top tower

51. The exterior and interior parallel area near the perimeter barrier of an industrial compound to afford better observation
and patrol movement is known as_____________.
a. Protective zone c. Twilight zone
b. Clear zone d. Patrol lane zone

52. Protective guarding in a compound can be done by the use of electronic hardware, human guards and even animals. In
England, an owner to protect his compound used this and they are not only effective but also the cheapest to maintain. This
man is using___________.
a. Doberman dogs c. Geese
b. tamed tigers and lions d. Ducks

53. The government agency that issues licenses for private and government security guards is?
a. PNP SOSIA c. PNP FEO
b. Municipal/City mayor's office d. PNP SAGSD

54. If access is limited only to authorized personnel, this particular place is referred to as-
a. Compromise area c. Restricted area
b. Danger area d. Exclusive area

55. First measure undertaken before a comprehensive security program for an industrial plan could be developed.
a. Security survey c. Security check
b. Security education d. Security inspection

56. A security survey of a plant or industrial firm is also known by other terms except-
a. Security audit c. Vulnerability
b. Risk assessment d. Robbery evaluation

57. Today there are three categories of security guards belonging to the "Blue Army”. One of those listed below does not
belong to the group.
a. Body guards c. Company guards
b. Agency guards d. Government security guards

58. Whether to put up its own security guards organic to the firm or hire contractual agency guards have their individual
merits and disadvantages. To determine which type of guarding system an industrial firm will require, management must
consult________________.
a. A security agency owner
b. A police officer
c. A military intelligence officer
d. A security consultant not connected to or owning a security agency, or part thereof

59. As a security officer, you can not prevent nor predict natural hazards like storm earthquakes, floods and the like. In order
to reduce the disastrous effects of these natural hazards, you will__________________.
a. Prepare a disaster or emergency plan for these hazards for the firm
b. Not take any concern on such hazards
c. Alert your guards when hazards occur
d. Call PAGASA and inquire when the next storm is coming

60. Practical exercise or test of a plan or activity to determine its effectiveness is called-
a. Evac. Plan c. Fire drill
b. Dry-run d. Sham drill

61. The management of keys used in plant, office or business organization to prevent unauthorized access is referred to as-
a. Key management c. Lock control
b. Key control d. Security key control

62. There are many types of electronic and electric protective devices available for security buildings, storehouses and
compounds. One of the following is true.
a. Electronic/electric devices eliminate human guards
b. Each building or compound requires particular electronic/electrical protective devices
c. Types of alarms needed can best be given by the dealers of said devices
d. Electronic/electrical devices provide total protection for the place to be safeguarded

63. As a security chief of an industrial firm, inventory shows that pilferage is rampant in the warehouses. What will be your
choice of action?
a. Tighten checking at exits of vehicles of the compound/complex
b. Prepare your protective plans and confer with management for their immediate implementation
c. Deploy intelligence men in pilferage prone areas to catch the culprits
d. To resign as you have failed your job.

64. In an industrial firm, there is a need for document security. As a security officer, you can advice management on this
aspect although this is not totally your assigned work. Document security is not a protection of vital records from-
a. Unauthorized access c. Theft or loss
b. Compromise or destruction d. Authorized handling

65. The main reason for a personnel security investigation is--


a. To weed out undesirable employees;
b. To check loyalty of employees to the organization;
c. Preclude assignment to sensitive positions for those who are security risks;
d. To determine the character and reputation of certain employees secretly tagged as risks.

66. It is defined as a system of barriers placed between the matters protected and the potential intruder.
a. Physical Security c. Personnel Security
b. Document Security d. Computer Security

67. This type of alarm system utilizes a station located outside the compound.
a. Local alarm system c. Proprietary system
b. Central Alarm system d. Auxiliary system

68. It is installed as part of the building which holds up to 10,000 cubic meters of essential items. At least 12 feet in height,
with enough ventilation and fire proof of at least 1 hour.
a. Safe c. File room
b. Vault d. Protective cabinet

69. It is the susceptibility of a plant or establishment to damage, loss or disruption of operations due to various hazards.
a. Relative criticality c. Risk assessment
b. Relative vulnerability d. Risk analysis

70. It refers to the importance of the establishment with reference to the national economy and security.
a. Relative criticality c. Risk assessment
b. Relative vulnerability d. Risk analysis

71. Classification of one who steals due to irresistible urge primarily because of unexpected opportunity and little chance of
detection.
a. Systematic pilferer c. Pickpocket
b. Ordinary pilferer d. Casual pilferer

72. They are installed between the prospective intruder and the target installation.
a. Barriers c. Locks
b. Hazards d. Guards

73. For new applicants trying to acquire a security guard license, the maximum age is;
a. 30 c. 40
b. 35 d. 50

74. A security consultant must have at least ___ years experience in the operation and management of security business.
a. 5 years c. 15 years
b. 10 years d. 20 years

75. A regular license granted as private security license card is valid for;
a. 1 year c. 3 years
b. 2 years d. 5 years

76. A security unit operated and maintained by any government entity other than the military or the police, which is
established and maintained for the purpose of securing the office or compound and/or extension of such government entity.
a. Company Security Force c. Government Security Unit
b. Agency Security Force d. None of these

77. Refers to a security force maintained and operated by any private company or corporation for its own security
requirement only.
a. Company Security Force c. Government Security Unit
b. Agency Security Force d. None of these

78. Refers to the association of all licensed security agencies and company security forces.
a. PADPAO c. PNP SAGSD
b. PNP SOSIA d. PNP CSG

79. Under the law, the maximum ratio of a firearm to every security guard in the employ of private security agencies is:
a. 1:1 c. 1:3
b. 1:2 d. 1:4

80. A private security agency must initially procure at least ___ pieces of licensed firearms for use of its security guards.
a. 20 c. 50
b. 30 d. 70

81. The license or permit to own a firearm for security agencies is applied and processed at:
a. PNP Civil Security Group
b. PNP Security Agencies and Guards Supervision Division
c. PNP Firearms and Explosives Office
d. Any of these

82. Refers to the merger with any person or a group of persons for the purpose of organizing a branch, unit or subsidiary
under separate control and ownership.
a. Security corporation c. Merger system
b. Kabit System d. Illegal association

83. A lock which is commonly installed in safe deposit boxes and is deemed pick proof since it is operated by utilizing
combinations by means of a dial.
a. Lever lock c. Cylinder lock
b. Combination lock d. Code operated locks

84. A disc tumbler lock which is used in automobiles would afford delay of at least;
a. 5 to 10 minutes c. 15 to 20 minutes
b. 10 to 15 minutes d. 20 to 30 minutes

85. Earliest known lock in existence.


a. Egyptian Lock c. Roman Lock
b. Greek Lock d. Persian Lock

86. For illumination of covered pathways and side walks it is wiser to install;
a. Fresnel lights c. Street lights
b. Search lights d. Flood lights

87. Vaults are storage devices which are usually designed to be at least ___ hours fire resistant.
a. 3 c. 9
b. 6 d. 12

88. Conducted for a period of at least 4 hours, its concern is to reiterate to employees that security is an additional burden
imposed on everyone who is part of the company
a. Refresher conference c. Security reminders
b. Training conference d. Debriefing

89. This serves as a forum to resolve security problem and explain new rules and regulations.
a. Refresher conference c. Security reminders
b. Training conference d. Debriefing

90. A positive effort to sell security or make the employees more involved in the implementation of security measures.
a. Refresher conference c. Security reminders
b. Training conference d. Security promotion

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy