0% found this document useful (0 votes)
405 views

Review Questions Industrial Security Management INSTRUCTIONS: Select The Correct Answer in Each of The Following

The document contains a review test on industrial security management. It consists of 32 multiple choice questions about topics like perimeter barriers, physical security lines of defense, record security, private security laws and agencies, and security concepts like criticality and vulnerability assessments. The test is intended to assess understanding of key concepts in industrial security.

Uploaded by

Jayson Castro
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
405 views

Review Questions Industrial Security Management INSTRUCTIONS: Select The Correct Answer in Each of The Following

The document contains a review test on industrial security management. It consists of 32 multiple choice questions about topics like perimeter barriers, physical security lines of defense, record security, private security laws and agencies, and security concepts like criticality and vulnerability assessments. The test is intended to assess understanding of key concepts in industrial security.

Uploaded by

Jayson Castro
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

REVIEW QUESTIONS

INDUSTRIAL SECURITY MANAGEMENT


=================================================================
INSTRUCTIONS: Select the correct answer in each of the following
questions. Mark only one answer on each item by a putting a
circle corresponding to the letter of your choice.

1. This is a medium or structures that define the physical


limits on installations or are to restrict of impede access
thereto.
A. natural barrier B. perimeter barrier
C. man-made barrier D. security barrier

2. The three basic lines of physical security are the


following, sometimes all of these lines of defense are available,
other times only one or defense are available, and they are as
follows, EXCEPT:
A. concrete walls and fences
B. building interior
C. perimeter barrier
D. building exterior

3. These are structural constructions like fences, walls,


floors, roofs, grills, bars, road blocks, op other physical means
to deter or impede penetration, and prevent unauthorized access.
A. natural barriers B. man-made barriers
C. perimeter barrier D. all of these

4. It is a type of perimeter barrier made of chain link design


with mesh openings design not larger than two inches square of #9
gauge wire or heavier, twisted and has barbed wire salvage at top
and bottom.
A. garrison wire B. barbed wire
C. wire fence D. Marcelo wire

5. It is an unobstructed area maintained at both sides of the


perimeter barrier, consisting of twenty feet or more between the
barrier and exterior structure which provide concealment and
assistance to a person seeking unauthorized entry.
A. restricted zone B. clear zone
C. unblemished zone D. transparent zone

6. This is house-like structures above the perimeter barriers,


as the height of this structure increases, and the visibility of
guards of duty likewise improves.
A. guard house B. sentry station
C. security tower D. guard towers

7. It is an additional overhang barbed wire placed on vertical


perimeter fences facing upward and outward with a forty five
degree angle, and with three to four strands of barbed wire
spaced six inches apart.
A. topguard B. topping
C. barbed wires D. wire fence

1
8. This includes the records that are irreplaceable, records
wherein reproduction of which does not have the same value as the
original.
A. non-essential records B. useful records
C. vital records D. important records

9. These are designed to meet the specifications for


safeguarding classified materials, and it is included some of the
categories of safe.
A. record safes B. security cabinets
C. money safes D. all of these

10. It is another procedure important in controlling access to


restricted areas and this is due to the fact that lock is only as
secure as this is also secure.
A. card control B. lock control
C. access control D. key control

11. Effective _________ should also use a distinctive intricate


background design difficult to reproduce, and have some
characteristics known only to management
A. identification cards B. access cards
C. badges or passes D. biometric cards

12. It can be used with employee, as well as visitors, and this


system requires the person seeking entrance to sign in with
receptionist or security guard, and present identification.
A. check-in and check-out register
B. security log books
C. visitors log register
D. entry and exit record books
13. These include identifying, directing or limiting the
movement of vehicles, employees, contractors, vendors, and
visitors.
A. security control B. entry & exit control
C. access control D. perimeter control

14. It is otherwise known as the Private Security Law in the


Philippines, as amended, and was enacted on July 13, 1969, and
has provided for the qualifications of security operators and
guards.
A. R.A. No. 7548 B. R.A. No. 4857
C. P.D. No. 1919 D. R.A. No. 5487

15. In the City of Manila, the first formally licenses private


security agency with the business name of “Special Watchman
Agency,” was set up, and it was later to be known as the
__________.
A. Bombay Serene B. Manila Security Agency
C. Jimenez Security Agency D. none of these

16. It is the first private detective agency formed in the


United States, and which is specializing in providing
investigative and security services for railroads and industrial
organizations.
A. Wells Fargo & Company B. Pinkerton Detective Agency
C. Bow Street Runners D. Evangelical Police

2
17. It is a government agency in-charge with the supervision of
the operation of Private Detective Agencies and Private Security
Agencies through the enforcement of the Implementing Rules and
Regulations of the Private Security Agency Law.
A. PADPAO, Inc. B. SOSIA
C. SEC D. CSG

18. It is the consultant of the C, PNP in the enforcement of the


Implementing Rules and Regulations of the Private Security Agency
Law, and serve as the umbrella organization of the Private
Detective Agencies, Private Security Agencies and Government
Security Forces.
A. PADPAO, Inc. B. NAPOLCOM
C. PNP D. Local Government

19. Briefly, it is an approach that brings to bear—in an


organized manner—all of the security components and resources
with loss prevention, protection of employees, physical assets,
business, or personal integrity, reputations, proprietary
information, and other intangible assets.
A. physical security
B. comprehensive security
C. private policing
D. public policing

20. It has been defined as the use of measures designed to


safeguard personnel, to prevent unauthorized access and entry to
equipment, facilities, and documents, and to safeguard these
against espionage, sabotage, theft and fraud by intruders.
A. bodyguards B. guards
C. private police D. security

21. These include those self-employed individuals and privately


funded business entities and organizations providing services to
a specific clientele for a fee.
A. private policing B. private security
C. private detective D. private agency

22. It is the broadest branch of security which is concerned


principally with the physical measures adopted to prevent
unauthorized access.
A. physical security B. security officers
C. security watchman D. security guards

23. It is a type of physical security involving the protection


of documents and classified information from loss, access by
unauthorized persons, damage, theft, and compromise through
disclosure.
A. communications security B. document security
C. records security D. information security

24. They are the common and highly visible type of security, and
who is usually in uniform and is sometimes armed, and they
control access to private property, maintain order on the
premises, and enforce the rules and regulations of the employer.
A. watchman B. security officers
C. security guards D. private security

3
25. It is part of physical security that deals primarily with
the protection of processes, formulas, patents, and other
industrial and manufacturing activities from espionage,
infiltration, loss, compromise, or photocopying.
A. tactical security B. activities security
C. management security D. operational security

26. It is the importance of the firm or establishment with


reference to the national security and economy.
A. relative criticality B. relative vulnerability
C. relative probability D. all of these

27. It is the susceptibility of the plant or establishment to


damage, loss or destruction of operation, and the likes due to
various hazards.
A. relative criticality B. relative vulnerability
C. relative probability D. none of these

28. It is the conditions or a set of conditions that may worsen


or increase the business or establishment’s assets exposure to
hazard or loss.
A. relative criticality B. relative vulnerability
C. relatively probability D. relative possibility

29. It is a complex challenge to security and safety activities,


and consequently it is essential to define and to analyze all
hazards that might be encountered to make it possible to restrict
the number and scope of such disturbance, either natural or man-
made.
A. security hazard management
B. handling security hazard
C. hazard management cycle
D. hazard management balance

30. It is a fact finding probe to determine the plants adequacy


and deficiency in all aspects of security with the corresponding
recommendations.
A. security operations B. security inspection
C. security survey D. security check

31. It is term used for the succeeding surveys after the conduct
of initial survey, and it is also termed as follow up survey.
A. detailed looks and see B. security inspection
C. security observation D. security visitation

32. It is one directed by the management if the initial survey


appears to have left certain portions or aspects involving
security due to change in policy or operation that will greatly
affect the total security picture.
A. common survey B. ordinary survey
C. special survey D. regular survey

33. These are the counter-measures for vulnerabilities, and


which are of four types, i.e., deterrent, preventive, corrective,
and detective.
A. controls B. mechanism
C. measures D. security

4
34. These make a system more prone to attack by a threat or make
an attack more likely to have some success or impact, e.g., the
occurrence or natural or man-made hazard.
A. probabilities B. vulnerabilities
C. criticalities D. susceptibilities

35. It is a dialogue between the survey teams and the


management, and official of plant before the security survey is
conducted.
A. coordinating conference B. command conference
C. entrance conference D. management conference

36. Before an actual security survey is conducted a __________


it is made with the appropriate officials in the manufacturing
installations or business concerns.
A. regular contact B. preliminary contact
C. initial contact D. continuous contact

37. After the security survey is developed, someone should


__________ the establishment, observing and talking to personnel
to obtain the required information.
A. initial walk through B. walk through facility
C. preliminary walk through D. physical walk through

38. All potential targets of attack should be identified and the


means of eliminating or reducing hazard to those targets
specified, and __________ should also be identified.
A. potential hazard B. actual hazard
C. pure hazard D. security hazard

39. It is similar to entrance conference, and it is done after


the completion of the security survey.
A. exit conference B. debriefing conference
C. command conference D. briefing conference

40. Security survey is performed by qualified security experts


who can be from the organization or outsiders contracted to do
the job, and recommendations will fall into the following
categories, EXCEPT:
A. human guard B. equipment
C. procedures D. security hazard

41. The popular television series have glamorized their


profession, but in reality, today criminal investigation is only
a small part of their work.
A. private detectives B. private investigator
C. public investigator D. none of these

42. It is the protection resulting from the application of


various measures which prevent or delay the enemy or unauthorized
person in gaining information through the communication system.
A. building security B. installation security
C. transmission security D. communications security

43. This is a part of personal security, and this work involves


not only the safety of the high ranking officials of the land but
it also involves diplomatic implications in the event that any
untoward incident happens to a visiting dignitaries.

5
A. political security
B. crisis security
C. personal and VIP security
D. government security

44. It is another specialized line to physical security, and due


to the peculiar nature of the business operations, the main
objective of the protection of the life of employees and company
assets.
A. school security B. hotel security
C. supermarket security D. bank security

45. In any plant of industrial complex, this is indispensable


not only in security work but in the plant operation itself, and
it is numerous types are available for use.
A. inter-communications B. intra-communications
C. all of these D. none of these

46. This type of security, are those hired directly under the
payroll of an employer to protect the employer’s property, and
they are considered employees of the company.
A. company guards B. in-house guards
C. govt. security guards D. all of these

47. There are other individuals or entities prefer to avail the


services of an outside firm on contract basis, specializing in
providing trained security guards, and these firms are:
A. private security guard B. private security agency
C. private detective D. government security unit

48. They are charge with directing the work and observing the
behavior performance of the men under his unit, and the principal
task is providing leadership within an organization.
A. security officer B. security consultant
C. security supervisor D. security manager

49. It is a physical security as applied to business groups


engaged in industries, like manufacturing assembling, research
and development, processing, warehousing, and even agriculture
and pasture lands.
A. bank security B. operational security
C. industrial security D. hotel security

50. In addition to doing background checks on employees,


sometimes using deception detection instrument, they can also
provide advice on risk management.
A. security manager B. security consultant
C. security officer D. security supervisor

51. This is the age requirements of the operators or managers of


the private security agency.
A. 25 years B. 30 years
C. 21 years D. all of these

52. He may issue or revoked license issued to private security


guard, private detectives, private security agencies, and private
detective agencies.
A. City/Municipal Mayor B. Chairperson, NAPOLCOM

6
C. Secretary, DILG D. Chief, PNP

53. In case of emergency or in times of disaster or calamities


where the services of private security agencies arise, the City
Municipal Mayor, as the Chairperson, City/Municipal Disaster
Reduction and Mitigation Management Council (C/MDRMM), may
__________ the services of the agency nearest the area where such
disaster or emergency arises.
A. muster or incorporate B. organize or utilize
C. volunteer or require D. employ or deploy

54. They are any person who offers or renders personal services
to watch or secure either residential or business establishments,
or both, or any building, compound, area, including but not
limited to logging concessions, agricultural mining or pasture
lands.
A. watchman B. security guards
C. all of these D. none of these

55. The maximum number of watchmen or security guards that an


agency may employ in first class city and municipalities, to
include its branches shall be:
A. not more than 500 B. not more than 1,000
C. not more than 300 D. not less than 200

56. It is natural or manufactured obstacles intended to control


the movement of persons, animals, vehicles, or materials, and it
defines the physical limits to delays or prevents penetration of
an area in coming in and out of industrial installations.
A. protection B. fence
C. all of these D. barrier

57. These include bodies of water, mountains, marshes, deserts


or other terrain difficult to traverse, accidentally or
intentionally by potential intruders.
A. perimeter barrier B. natural barrier
C. man-made barrier D. security barrier

58. These are construction of human, such as doors, windows,


fences, etc., and it serves the purpose of preventing
unauthorized ingress or egress.
A. natural barrier B. protective barrier
C. man-made barrier D. installation barrier

59. These are concrete fence structures from individual


buildings or compound which are laid in and b0ind together by
mortar.
A. masonry walls B. concrete walls
C. hollow block walls D. cemented walls
60. It is a mesh of metal strips whose purpose is to protect
passage by persons, animals, or vehicles from having unauthorized
ingress of entry to establishment.
A. metal wires B. drawn wires
C. all of these D. none of these

61. In the field of physical security, __________ are often used


as a preventive and corrective measure against intrusions or
other criminal activity on a physical piece of property.

7
A. incandescent lamp B. search lights
C. lightings D. fluorescent lamp

62. A stand by lighting which can utilized in the event if


electrical failure, either due to local equipment or commercial
power failure.
A. disaster lighting B. search lighting
C. emergency lighting D. reserve lighting

63. The security lighting must be bright enough, and not “as
“bright as possible,” and in many cased a good rule thumb is
__________, and this may need to be increased in very confused
environment, but conversely can be reduced in very open
environments.
A. 0.10 watts per sq. meter
B. 0.01 watt per sq. meter
C. 0.5 watts per sq. meter
D. none of these

64. It is consisting of stationary or portable, manually


operated search lights which may be lighted continuously during
hours of darkness or only as needed and usually supplementary to
either of the first two types of lightings.
A. stand-by lighting B. potable lighting
C. emergency lighting D. movable lighting

65. These are found in electronic form today, wherein the


sensors are connected to a control unit via either a low-voltage
hardware or narrowed signal, which in turn connects to a means
for announcing the sound, and hopefully to elicit some response
to guards on duty.
A. alarm B. fire alarm
C. signal D. sensors

66. These are signals given by the sensors to the security when
the intruder actuates device in a protected area, and basically
was designed to alert security personnel to consummated or
attempted intrusion into an area, building or compound of
industrial establishments.
A. emergency alarms B. protective signal
C. protective alarms D. protective sensors

67. In the alarm systems, it range from simple magnetic switches


to sophisticated ultrasonic Doppler and sound systems, and the
simplest are electro-mechanical device in which an electric
circuit is broken or closed, including switches, windows foil,
and screens.
A. signals B. sensors
C. lights D. alarms
68. It is communication channel that conveys the information
from all sensors in the systems to the signal by means of wire,
radio waves, existing electrical circuits, or a combination of
these.
A. signals B. sensors
C. circuit D. alarms

8
69. It can be in the form of actual alarm, and may be audible of
silent, a bell, buzzer, phone ringing, or flashing light, and
opinion vary on it as to which is more effective.
A. signal B. alarms
C. circuit D. sensor

70. It is consisting of 3 to 5 strands of wire spaced from 9 to


24 inches above one another which serves as an antenna, a monitor
panel or an electric circuitry.
A. sound and vibration
B. electromagnetic fence
C. breaking circuit
D. space and motion vibration

71. These are simple type to detachable security tool, with a


hinged or sliding shackle to pass though a ring or staple on a
door, chest, etc.
A. keys B. locks
C. restraining device D. padlocks

72. These are used by consumers, commercial businesses,


utilities, railroads, and government for various applications,
for the purpose of impeding theft, vandalism, sabotage,
espionage, or to protect the people from personal harm, risk or
dangers.
A. door locks B. alarm and signal
C. padlocks D. close circuitry

73. It is an act or conditions which may result in a situation


conducive to a breach of protection system and the subsequent
loss or compromise of information, secret to damage to property
or injury to personnel.
A. security hazard B. security risk
C. security danger D. security weaknesses

74. These are the acts or conditions affecting the safe


operations of the facility caused by human action, either
accidental or intentional in nature.
A. real hazard B. man-made hazard
C. human hazard D. actual hazard

75. These are caused by natural phenomena which cause damage,


disturbance and problems of the normal functioning of human
activities, including security personnel.
A. ordinary hazard B. phenomenal hazard
C. natural hazard D. common hazard

76. It can be defined as a sound system of norms and beliefs on


an amalgamation of individual and groups values, attitudes,
perceptions and behavioral pattern.
A. private security culture B. private security ethics
C. private security conduct D. private security values

77. This is another security measure involved in personnel


security, and it is primarily designed to enable the office or
unit to achieve and maintain a sound and effective security.
A. security promotion B. security indoctrination
C. security survey D. security education

9
78. It should be held during the initial processing of training
period of the individual, and should last from two to four hours
depending upon the completion of the security requirements
pertaining to particular positions.
A. entrance conference B. exit conference
C. training conference D. briefing conference

79. In the different phases of security education, the initial


interview is intended to accomplish these three purposes, as
follows, EXCEPT:
A. it must leave an impression on the individual of the
seriousness of the security

B. it should be mandatory for all new personnel before


their assignment to the respective jobs
C. it must stress the importance of security in the
company and to the individual employee
D. it must explain to the individual the penalties that
could result from violations of security regulations

80. This is a phase in the security education program, wherein


the rank and file will be asked concerning their personal
observations and experiences about security rules and regulations
while performing their individual tasks.
A. dissemination B. briefing
C. debriefing D. orientation

81. It is not inherent to an individual, and it is a state of


mind that will have to be taught and learned like the many
disciplines.
A. security alertness B. security awareness
C. security consciousness D. security mindset

82. Refresher courses should be conducted semi-annually, and at


least annually, and it is designed to serve three purposes, as
follows, EXCEPT:
A. to reiterate that security is part of the job
B. reminds individuals of their responsibilities
C. it can be used as forum to resolve problems
D. to explain new regulation and new requirements

83. It is more effective if done more frequently in short


sessions that less frequently on long sessions to selected groups
without disrupting the schedule of work.
A. follow-up security survey
B. follow-up security conference
C. follow through security inspection
D. follow through security education

84. He must keep all members of his or her unit alerted to all
possible dangers to security, and generate the willingness on the
part of the every man and woman to be more careful in talking
about their jobs.
A. security guards B. security officer
C. security consultant D. security supervisor

10
85. This is consists of initial briefing made upon the new
personnel and employees on security and its various aspects, and
its importance.
A. security orientation B. security indoctrination
C. security inspection D. security education

86. It is one of the most important interrelated functions in a


plant security system, it is as important as in business
organizations as physical security, fire protection, guard
forces, security of documents and personnel security.
A. emergency plan B. disaster plan
C. security planning D. emergency planning

87. It is the test of the practicability of the approved


emergency plan.
A. all of these B. rehearsal
C. dry runs D. run-thru

88. In setting priorities, certain time-tested principles should


be applied with regards to the protection of life and properties,
and the following are the acceptable list, EXCEPT:
A. evacuation and shelter B. personal protection
C. rescue and relief D. safety and training

89. In the implementation of emergency plan, there must be a


__________ to direct all the activities, and to do this, a
reliable and adequate means of communications must be available.
A. guard sentry B. control post
C. security post D. security tower

90. It is a mechanical device strategically located in an


installation or street where a fire hose can is connected so that
water with pressure will be available to extinguish fire.
A. fire hydrant B. fire alarm
C. fire hose D. fire box

91. These are the three (3) primary objectives to be considered


in emergency planning, EXCEPT:
A. to establish available resources during emergency
B. to minimize the probability of threat or emergency
C. to mitigate the impact if the event occurs
D. to recover from the emergency or disaster

92. It is fire-fighting equipment which can be portable or in a


cart that it used to put out fire depending on the contents to
extinguish certain types of fires.
A. fire extinguishers B. fire apparatus
C. fire truck D. fire-fighting equipment

93. These fires results from the burning of wood, paper,


textiles and other carbonaceous materials.
A. Class “B” Fires B. Class “A” Fires
C. Class “C” Fires D. all of these
94. The oxygen content of air is reduced below 15%-from normal
of 21 in volume by using chemicals, fog, sand blankets, etc.
A. smothering B. blankering
C. all of these D. none of these

11
95. Fire protection is typically achieved by the following
means.
A. passive fire protection B. active fire protection
C. all of these D. none of these

96. It is the study of standards of custody and moral judgment,


and oftentimes, it is referred to as the moral philosophy or a
science which deals with the philosophical study of morality.
A. morality B. ethics
C. standards D. conduct

97. It is personal behavior, and it is the voluntary control and


direction of one’s activities toward moral and spiritual
development.
A. conduct B. tradition
C. values D. culture

98. Are those rules or conduct by which members of a profession


regulate their conduct among themselves and with all other person
with whom they deal in their professional responsibility. A.
professional conduct B. professional standards
C. professional values D. professional ethics

99. It is term used to describe the conduct that one person used
in the workplace and is normally more formal than other types of
human behavior.
A. ethical values B. discipline
C. professional conduct D. professionalism

100. The private security agencies and the private detective


agencies had to be registered at what agency of the government.
A. Philippine National Police
B. Securities and Exchange Commission
C. Local Government Unit
D. Department of Trade and Industry

-END-

12

You might also like