0% found this document useful (0 votes)
10 views

Reviwer Security

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Reviwer Security

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

1. What form of perimeter security provides the b.

The type of access necessary depends upon the


best psychological deterrence during the hours number of variable factors and therefore
of darkness? maybe achieved in a number of ways.
a. Locks c. There is no impenetrable barrier
b. perimeter fence d. Each installation is different.
c. protective alarm 6. This increases the protective height and prevents
easy access to the fence.
d. protective lighting
a. Chain linked
2. Roger placed three dogs to help him in the
security of their house since they don’t have a b. Fence post
fence, he also installed security lights surrounding c. Top Guard
the house. What specific types of barriers
d. Guard control station
were used by Roger?
7. It is the use of barriers in order to prevent
a. Energy and animal barriers outsiders from gaining access to assets in order to
b. Animals and structural barriers prevent loss.
c. Structural and energy barriers a. Document Security b. Personnel Security
d. Structural, human, energy barriers c. Physical Security d. Personal Security
3. A medium or structure which defines the physical 8. Refers to any physical structure whether natural
limits of an installation or area to restrict or or man–made capable or restricting,
impede access thereto. deterring, delaying or preventing illegal and
unauthorized access to an installation.
a. Security lights
a. Security Lighting
b. Animal barriers
b. Dogs
c. Structural barriers
c. Physical Plant
d. Perimeter barrier
d. Barriers
4. Which of the most commonly used full-view
fences will cause severe injury if scaled by 9. These are wide beam units, primarily used to
extend the illumination in long horizontal strips
intruders since it is made of high strength steel with
sharp blades? to protect the approaches to the perimeter barrier.
a. Barbwire a. search lights
b. Chain-linked b. flood lights
c. Wire fence c. Fresnel lights
d. Concertina d. Spot light
5. Which of the following principles of physical 10. Barriers can be opened, destroyed and
security is involved when a facility piles up conquered no matter how good you think they are.
several barriers from the first line of physical Which of the principles of physical security is
defense to the third line? described by this statement?
a. Defense-in-depth is barrier after barrier. a. There is no impenetrable barrier.
b. The type of access necessary depends upon the the door, upon entering the house the security
number of variable factors and therefore alarm activates which prompts the intruder to
maybe achieved in a number of ways. escape. What line of physical defense of the house
was surpassed by the intruder?
c. Defense-in-depth is barrier after barrier.
a. First line
d. Each installation is different.
b. Third line
11. Security lighting system placed at the top of the
perimeter fence is counted as c. First degree
a. First line of security d. Second line
b. Second line of security 16. A type of security applied for the protection of
top-ranking officials of the government or
c. Third line of security
private entity, visiting persons of illustrious standing
d. Fourth line of security
and foreign dignitaries.
12. It is the employment of mechanical, electrical,
a. Bank security b. Hotel security
electronic energy imposes a deterrent to entry
c. VIP security d. School security
by the potential intruder or to provide warning to
guard personnel. 17. This lighting arrangement is focused on the pile
of items, rather than the background. The
a. Energy barrier
width of the lighted strip can be controlled and
b. Structural barrier
adjusted to suit the security needs.
c. Natural barrier
a. Controlled lighting
13. To prevent employees from stealing from the
b. Glare projection
company, before hiring they are thoroughly
c. Supplemental lighting
screened and interviewed, only worthy and loyal
applicants are given the opportunity to take the d. Continuous lighting
position. What area of security is involved? 18. This system is manually operated and is usually
made up of movable search or floodlights
a. Personnel security
that can be located in selected or special locations
b. Personal security
which will require lighting only for a short
c. Physical security
period of time.
d. Document security
a. Movable or Portable lighting
14. The cashier is stealing money from the cash
b. Portable lighting
register and keep on doing so because the
c. Emergency lighting
owner is not conducting a regular inventory of
goods sold in the store. Which are of security d. Continuous lighting
should be modified and developed in order to 19. This involves the protection of documents and
prevent further loss? classified papers from loss, access by
a. Personal Security b. Physical Security unauthorized persons, damage, theft and
compromise through disclosure.
c. Document Security d. Personnel Security
a. Personal Security b. Personnel Security
15. In the case of a house without a fence, the
intruder makes his entry by picking the lock of c. Document Security d. Physical Security
20. The three areas of security are 26. It involves the protection of assets by proactive
________________. measures of screening applicants to be
a. Personal, document and physical hired in the company.
b. Personal, documentary and perimeter a. Personnel Security b. Physical Security
c. Personnel, physical and document c. Document Security d. Personal Security\
d. Data, Information and Physical 27. This system is used in times of power failure or
other emergencies when other system are
21. This is normally provided at main perimeter
entrances to secure areas located out-of-doors, inoperative.
and manned by guards on full-time basis. a. Emergency lighting
a. Top Guard b. Search light
b. Tower Guard c. Street light
c. Guard control station d. Portable light
d. Fence post 28. It involves measures adopted by a certain
company in order to secure the integrity and
22. The protection of process, formulas, patents,
and other operational activities of an secrecy of their valued information.
installation. a. Physical Security b. Personnel Security
a. Communication Security b. None of the above c. Personal Security d. Document Security
c. Bank Security d. Operational Security 29. Roger is planning to build a fence surrounding
his house. He wanted to have a fence that
23. A type of security applied to business groups
engaged in industries like manufacturing, will not allow visual access so he can have the
privacy that he wanted, which of the following
assembling, research and development,
processing, warehousing and even agriculture. fence is best for him?
a. Document Security b. Industrial Security a. Full-view fence
c. Communication Security d. None of the above b. Combination fence
24. The use of security guards on the entrance of c. Solid fence
the installation is an example
d. Chain linked fence
of_____________________
30. Which of the following is not an asset in hotels?
a. Document Security b. Physical Security
a. Money
c. Personnel Security d. Personal Security
b. Guest or customers
25. It has similar physical appearance to mercury
c. hotel facilities
vapor but provides a light source of higher
d. none of the above
luminous efficiency and better color rendition.
31. The law governing the organization and
a.Metal halide
management of private security agencies.
b. Mercury vapor lamp
A. R. A 6975 C. R. A. 8551
c. Fluorescent lamp
B. R. A. 5487 D. R. A. 4857
d. High pressure sodium vapor
32. The law that gives the PNP the power to D. financial capabilities of the environment
supervise and control the training and operation of
38. The broadest area of security which is
Private security agencies. concerned with the physical measures adopted to
A. R. A 6975 C. R. A. 8551 prevent unauthorized access to equipment,
facilities and to safeguard them against any
B. R. A. 5487 D. R. A. 4857
damage
33. The main reason why perimeter barrier
and theft.
openings are needed to be monitored is
A. Physical security C. Document and information
A. It could be used as entry points by intruders
security
B. It could be used as escape route
B. Personnel security D. Industrial security
C. It is a security eyesore
39. Physical structures either natural or manmade
D. It should be repaired immediately capable of restricting, deterring, delaying

34. The unobstructed area on both sides of the illegal access to an installation are called
perimeter barrier known as clear zone should be
A. Barriers C. Fences
maintained because of the following reasons,
B. Walls D. Security
except;
40. The unobstructed area maintained on both
A. for better patrol movement
sides of a perimeter barrier
B. for better observation
A. Backyard C. Clear Zone
C. for the intruder to be easily seen as he has no
B. Patrol Zone D. Perimeter area
means to hide
41. These are independent structures constructed
D. None of these
and designed to control physical and visual
35. Which of the following statements is NOT true
access between outside areas.
about the top guard?
A. Grills C. Walls
A. It is composed of 3-4 strands of barbed wire
B. Fences D. Barriers
B. The barbed wires are spaced 6 inches apart
42. These are devices installed to help detect fires
C. It is attached in the middle of the fence
or detect anything that causes fire such as
D. Placed on top of the fence with a 45 degree
smoke or unusual rising of temperature.
angle.
A. Alarm system C. Alarm detection system
36. With the following choices, which one is least
expected to act as a human barrier? B. Fire alarms D. Smoke detectors
A. Security Guard C. Manager/Owner 43. Which among the following best describes the
most obvious advantage of using fire alarms?
B. Employees D. Visitor
A. Early detection resulting to easy suppression
37. In the field of industrial security, various types of
security are applied depending on the B. Alarm informs the people to evacuate
A. time and season C. Early transport of documents and materials that
needs to be protected
B. installation and its security needs
D. Passerby will know that conflagration is ongoing.
C. people and environment
44. These mechanical devices supply water from a 51. What type of security where the Security
natural source. Personnel are trained to detect shoplifter,
A. Wet pipe C. Fire pump robbery and bomb detection?
B. Fire hydrant D. Fire alarm VIP security Supermarket security
45. These are galvanized iron steel or plastic pipes Mall security Both b and c are correct
located inside a building with water under
52. What Republic act is the Private Security
pressure ready for use in case of fire. Agency law?
A. Standpipe C. Fire Hydrant RA 5487 RA 8551
B. Water pipes D. Fire extinguisher RA 6975 RA 9165
46. A mechanical device strategically located in an 53. What is the dis advantage of fluorescent as a
installation or street where a fire hose is lighting source?
connected so that water under pressure will be Its not good color rendition
available to extinguish fire.
Expensive among the other lamp
A. Water pipes C. Fire extinguisher
It cannot project light over long distance
B. Fire pump D. Fire hydrant
All of the above
47. A type of lock using numbers, letters and
54. It serves as the trigger apparatus for protective
symbols that must be aligned manually for the
alarms.
operator to unlock it.
Alarm device Transmission line
A. Padlock C. Combination Lock
Signaling device Sensor
B. Card operated lock D. Code operate lock
55. The unobstructed area on both sides of the
48. The type of lock that can be opened by perimeter barrier known as clear zone
pressing a series of numbered buttons in their
should be maintaining because of the following
proper sequence. reason.
A. combination Lock C. Card operated lock For better patrol movement
B. Code operated lock D. Electrical lock For better observation
49. A mechanical, electrical, hydraulic or electronic Both a and b
device designed to prevent entry into a
None of these
building, room, container or hiding place.
56. It refers to any physical barrier used to
A. Keys C. Padlocks supplement the protection of inside
B. Locks D. Mechanical devices perimeter.
50. A portable and detachable lock having a sliding Natural Barrier Human Barrier
hasp which passes through a staple ring or
Structural Barrier Perimeter Barrier
the like.
57. A type of protective lighting that can be turn on
A. Warded lock C. Lever Locks manually or by a special device or
B. Padlock D. Disc tumbler lock other automatic means only when the use is
necessary.
Controlled lighting Movable lighting Local Alarm-By-Chance System
Standby lighting Energy lighting Local Alarm System
58. The type of lock that can be opened by Central Station System
pressing a series of numbered buttons in
Auxiliary Alarm System
their proper sequence.
65. This type of alarm system utilizes a station
Electrical lock Code operated lock located outside the compound.
Card operated lock Combination Lock Central Station System
59. Most of these locks have three dials, which Proprietary System
must be aligned in the proper order
Local Alarm-By-Chance System
before the lock will open
Auxiliary Alarm System
Lever Locks Code Operated Locks
66. In ART. 305.The term “False Key” shall be
Combination Locks Disc Tumbler Locks deemed to, except.
60. Windows and doors can be equipped with Any key other than those intended by the owner for
magnetic or spring activated contacts, use in the lock forcibly opened by
which will sound an alarm when the door or window the offender.
is opened.
The tool mentioned in the next proceeding articles.
Space and Motion Detectors
Genuine keys stolen from the owner.
Bill Traps Activation Device
None of these
Metallic Foil or Wire
67. Which among the following best describes the
Electromagnetic Locks most obvious advantage of using fire
61. A mechanical device of supplying water which alarms?
can be manual or motor driven.
Early transport of documents and materials that
Fire pump Fire hydrant needs to be protected
Stand pipe Fire extinguisher Passerby will know that conflagration is ongoing
62. A key that is capable of opening a series of Alarm informs the people to evacuate
locks.
Early detection resulting to easy suppression
Key cabinet Sub-master key
68. Physical security has the broadest scope
Master key None of these among the area of security. What does it
63. This will have to be of a sufficient size to hold mean?
the original key to every lock in the
Physical security includes protection of documents
system. It should be locked at all times. and personnel
Keys Padlock Physical security has less uses.
Inventories Key cabinet Physical security is the most important in the area
of security.
64. Company owned alarm system with a unit in a
nearest police station so that in case None of these
of need, direct call is possible.
69. Personnel security start even before hiring of an 75. This refers to a document that allow a private
employee and remains to be security agency to operate
maintained for as long as the person is employed. License To Operate
Which of the following statement that
LTO
support personnel security?
License to exercise private security profession
70. It protects the documents and classified papers
License Card
from loss.
76. A written order issued by the superior officer
Personnel security can cause negligence to their
assigning the performance of private
work
security or detective services/duties.
Its purpose is to ensure that a firm hires those best
suited to assist firm in achieving Endorsement letter
goal and objective. Duty Detail Order
Both a and b are correct. Relief Order
71. What law governs the organization and Recommendation letter
operation of private security agencies
77. How many witnesses are needed when a
throughout the Philippines. security guard will search a person he
Republic Act No. 5487 PD 1919 arrested?
Republic Act No.5478 PD 11 One More than two
72. Any person who offers or renders personal At least two three or more
service to watch or secure either a
78. Application for renewal of License to Operate
residence or business establishment or both for security agency shall be filed at
hire or compensation, and with a
least___.
license to exercise profession is
60 days before expiry date of LTO
Police Officer Security Guard
30 days before expiry date of LTO
Body Guard Security Personnel
At the day of expiration
73. This refers to the association of all licensed
security agencies and company security One month before expiry of LTO

forces. 79. The maximum number of private security


personnel in a given agency shall be___.
PNP SAGSD PNP SOSIA
200 1000
PADPAO PNP SUSIA
500 1500
74. This refers to a document that allow an
individual to practice a security profession. 80. Under the law, a Private Security Agency
should apply for regular license only when
License to Operate
in possession of at least 70 licensed firearms and a
LTO minimum of___.
License to exercise private security profession 100 Guards 1000 Guards
License Card 150 Guards 200 Guards
81. The age of a person that can possess a Incorrect partially incorrect
License to Operate a Security agency
86. A security guard making an arrest may not
should not be less than to inform the person to be arrested of his
25 years of age 18 years of age intention to arrest and the cause of arrest if?
52 years of age 21 years of age the person to be arrested flees
82. Which of the following is the fourth (4th General the person to be arrested forcibly resist
Order?)
the giving of such information will peril the arrest
To report all violations of regulations and orders I
all of these
am instructed to enforce
87. Graduates of advanced ROTC, veterans and
To relay all calls from posts more distant from the
retired military are exempted from the
security house where I am stationed
Basic Licensing Training when they decide to
To quit my post only when properly relieved
exercise the private security profession
To talk to no one, except in the line of duty
but not in refresher training courses. This statement
83. After the tour of duty of Security Guard Pablo is TRUE.
Talon, what shall he do with his fire
Correct
arm?
Incorrect
Turns over to the next security guard on duty.
Correct, because it is stated in Rule 5 License to
Bring the firearm to his residence exercise private security profession
Returns the firearm for safekeeping in the Incorrect, because it is necessary to take the Basic
company’s depositary Licensing Training
Deposit the firearm inside the drawer of the guards 88. Who shall supervise and control the training
table and operation of security agencies?
84. Which of the following refer to training and PNP
academic programs and courses duly
AFP
approved or prescribed by the PNP and adopted by
DILG
the Technical Education and Skills
Office of the president
Development Authority for security personnel.
89. What are the principles under the security
Private Security Training
guards' creed?
Refresher Training
Maka Diyos Makatao
Pre Licensing Training
Maka Bayan All of these
Specialized Training
90. Jose is a security guard in Sharetea. While he
85. PADPAO is an association of all licensed was performing his duties, he told
security agencies and company security
one of the customers to observe social distancing
forces and a separate division of the PNP, while they were ordering, to his
responsible for supervising the training and
surprise he was confronted and yelled at by the
operation of the security agency. This statement is said customer. Despite that incident, he
TRUE
still managed to explain calmly the importance of
Correct partially correct the said protocol to the said customer.
Jose displays? 1,000 1,000,000
Ethics Makatao 10,000 100,000
Professionalism Maka Bayan 96. Mr. Cruz, an owner of Stallion Security Agency
must apply for the renewal of his
91. The following are the categories of private
security training, except? license within how many days prior to expiry date of
LTO?
Pre-licensing Training
30 days 1 month
Refresher Training Programs
60 days 2 months
Specialized Training Programs
97. Which of the following are the requirements to
None of these
operate a Security Agency.?
92. Jose abandoned his post because Rizal, his
Filipino Citizen
reliever, was late during the turnover of
not less than 25 years’ old
duties and responsibilities. What general order did
Jose violate? minimum capital of 1 million and 500,000 minimum
bank deposit
GO No. 1
all of the above
GO No. 5
98. All but one is not the type of security forces,
GO No. 3
EXCEPT?
None, because Rizal is the one to be blame for
Company Security Force
coming late not Jose
Detective
93. While on duty, security guard Alvin arrested a
thief on the act of committing a theft in Security Guard
his area of responsibility. Is the arrest valid? None of these
Yes, by virtue of warrantless arrest 99. Detective Conan, a Criminologist and holder of
MSCRIM involved himself in
Yes, by virtue of Hot Pursuit
numerous detective work here in the Philippines,
No, because he is not a police office
Under the Private Security Law of the
No, because he is just a security guard
Philippines he was considered as
94. Dalisay, employed as a security guard in SM
Security Guard Detective
City Iloilo under the SM Group of
Private Detective Watchman
Company. In what type of security forces does he
belong? 100. The minimum educational qualification of a
security officer is
Private Security Agency
High School Graduate Baccalaureate Degree
Company Security Force
Master’s Degree Doctoral Degree
Government Security Unit
101. The following are exempt from pre licensing
Mall Security
training course, except;
95. New applicants of license to operate security
Retired Military Personnel
agency shall have a minimum capital
ROTC Graduate
amounting to
Retired Police Personnel Yes, by virtue of warrantless arrest
College Graduate Yes, by virtue of Hot Pursuit
102. Who shall supervise and control the training No, because he is not a police officer
and operation of security agencies?
No, because he is just a security guard
PNP BFP
107. Patrolman Cruz is in pursuit of a criminal. He
AFP BJMP then requested SG Divino to assist
103. Graduates of advanced ROTC, veterans and him in the pursuit. Which of the following
retired military are exempted from the circumstances will be observed?
Basic Licensing Training when they decide to the SG can assist the peace officer because it is
exercise the private security profession mandated by law
but not in refresher training courses. This statement the SG can assist the peace officer otherwise he
is TRUE. could be held liable for harboring a
Correct fugitive
Incorrect the SG can assist the peace officer provided it is
within the territorial jurisdiction of his
Correct, because it is stated in Rule 5 License to
exercise private security profession (SG) area of duty
Incorrect, because it is necessary to take the Basic the SG can assist the security officer provided it is
Licensing Training within the territorial jurisdiction of his
104. Under Section 6 of Rule V, what are the SG area of duty
qualifications of a private detective.
108. Upon inspection of the PNP SOSIA, SG Gul
He/She must a Filipino citizen Gulon was found out that his license
Physical and mentally fit to exercise security profession was expired. Can
the PNP SOSIA confiscate the
Holder of a baccalaureate degree preferably
Bachelor of laws or Bachelor of Science in firearms of SG Gul Gulon?
Criminology No, beacuse he is inside his area of responsibility
All of the above No beacuse SG Gul Gulon is still on duty and he
need his firearm to fulfill his duty
105. What are the basic requirements of private
security personnel? Yes, because he is not already authorized to carry
a firearm due to he not already
less than eighteen (18) years of age.
considered a Security guard
Of good moral character and must have been
convicted of any crime or violation of .Yes, because he is not allowed to carry a firearm
due to his license as Security Guard
these rules and regulations carrying a penalty of
prohibition to be licensed is expired.
All of the aforementioned 109. Cardo Dalisay took his oath as Police Officer
1, last July 1, 2016. In the year 2020,
None of these
he was promoted to the next higher rank, and he
106. While on duty, security guard Alvin arrested a
was charged with serious grave
thief on the act of committing a theft
in his area of responsibility. Is the arrest valid?
misconduct months after he was promoted and as 114. In industrial security Management, what does
a result he was dishonorably CBI stands for _______
discharged from the service in that same year. Compulsory Background Investigation
Dalisay decided to put up a security
Complete Background Investigatoer
agency after the finality of the decision, is he
Complete Background Investigation
qualified?
Compulsory Background Investigator
Yes, very qualified
115. It is a practiced test of a plan or any activity to
Yes, because of his experience as a police officer
test its validity, it is also an
No, because he was charged with serious grave
operational readiness exercise.
misconduct
Fire drill Run through
No, because he was dishonorably discharge from
his service as a police officer Dry run Controlling
110. Sg Lardera is on duty during his break time he 116. It is susceptibility of the plant or establishment
bring his firearms outside the to damage, loss or disruption of
establishment he served to eat his lunch. Is he operation due to various hazard.
liable for illegal possession of firearms if
Relative Criticality
caught while eating his lunch?
Relative Vulnerability
No, due to he is in uniform while eating his lunch
Vulnerability
No, because he has his DDO and firearm license
Risk
Yes, because the police officer has the authority to
arrest him 117. The exclusive right to patent protection is valid
for a period of ______
Yes, because it was stated in the guidelines that a
security guard are only allowed to 10 years 17 years

bring his firearm inside his area of responsibility 13 years 20 years

112. Those are caused by natural Phenomena 118. Security survey comes before security
which caused damage, disturbance and inspection. The statement is ______

problems of the normal functioning of human Correct Partially Correct


activities, including security. Wrong Partially Wrong
security hazard natural hazard 119. To quit my post only when properly relieved.
man-made hazard Sabotage Means that?

113. Acts or conditions affecting the safe operation I can go home after my duty
of the facility caused by human After rendering 12 hour of duty i can already quit
action, accidental or intentional my duty

natural hazard I can only leave my post when my reliever arrived


and I properly turned over my post to
security hazard
him
man-made hazard
I can leave my post immediately upon the arrival of
Sabotage my reliever
120. A good security survey report must not machines, or presence of possible poisons
encompass all aspects of security risks and
Relative Criticality Relative Vulnerability
its accompanying security plan shall conform with
Probability Criticality
existing security policies of the
127. To complete the background investigation,
management if any, in order to come up with an
information must be collected from
adequate security system. The state is
National Agencies such as, except;
false.
National Bureau of Investigation
Correct Either a or b
Intelligence Service of the Armed Forces of the
Incorrect Neither of the choices
Philippines
121. Pilferers of this kind can be employees or
Philippine Statistics Authority
outsiders of the establishment.
Municipal Trial Court
Casual Pilferage Casual Pilferer
128. The exposure and teaching of employees on
Systematic Pilferer Systematic Pilferage
security and its relevance to their
122. The following are the factors considered by a
work is part of _______
Pilferer to be successful on his act,
Security Training Security Orientation
EXCEPT one:
Seminar Workshop Security Education
Disposal of items Quality of item
129. The action taken or the physical security used
Removal of item None of the following
to reduce or eliminate one or more
123. Which of the following is NOT an example of a
vulnerabilities
Security hazards?
Physical security Security measures
Sabotage, Espionage, Pilferage
Security barriers Countermeasures
Theft, Disloyalty, Dissatisfied employees
130. The impact of a lost as measured in financial
Fire, Lightning, Earthquake
terms is called
None of these
Criticality Probability
124. What is the ratio of number of firearms in each
Possibility Vulnerability
private security guards in its
131. Total removal or elimination of a risk in an
employ?
industry is a risk management
1:1 1:2
alternative known as
1 is to 1 2 is to 1
Risk Reduction Risk Avoidance
125. It is considered as the weakest link in the
Risk Reduct Risk Transfer
security chain
132. A risk management alternative done through
Locks and keys Protective lightning
compartmentation and
Personnal Security Personnel
decentralization to limit the impact of the potential
126. This refers to the susceptibility of the plant or lost
establishment to damage, loss or
Risk Avoidance Risk Reduction
disruption of operation due to various hazards, like
Risk Self-assumption Risk Spreading
the location of the building, the
133. In the field of industrial security, any situation Security Survey Security Inspection
or condition that can cause damage
Security Investigation Onsite Inquiry
or loss of life and property is
141. This pertains to the importance of the firm with
Security hazard Vulnerabilities reference to the national economy
Security Problems Adversaries and security, like gasoline depots, communication
transmission lines, and power plants.
134. Any weakness that can be exploited by an
adversary to gain access to an asset is Relative Criticality Relative Vulnerability
Security hazard Vulnerabilities Probability Criticality
Security Problems Adversaries 142. This refers to the susceptibility of the plant or
establishment to damage, loss or
135. The following are examples of natural
hazards, except disruption of operation due to various hazards, like
the location of the building, the
Floods caused by typhoon
machines, or presence of possible poisons
Incendiary fire
Relative Criticality Relative Vulnerability
Earthquake
Probability Criticality
Lightning storm
143. Any formula, pattern, device or compilation of
136. A critical on-site examination and analysis of
information which is used in one’s
an industrial plant, business, a home
business and which gives him an opportunity to
or public or private institution to determine what
gain an advantage against competitors
protection is needed and to make
who do not know or use it is
recommendations for improving the overall level of
security of that installation is Trade secrets . Patent
Security Survey Security Inspection Proprietary information Classified Documents
Security Investigation Onsite Inquiry 144. This is a grant given by the government to an
inventor, conveying or securing to
137. A conference or dialogue between the survey
team and management officials of a him the exclusive right to make, use, or sell his
invention for a term of years.
plant before a security survey is conducted
Trade Secrets Patent
Exit Conference Entrance Conference
Proprietary information Classified Documents
Orientation Discussion
145. You cannot prevent or predict natural hazards
138. A conference similar to an entrance
like storms, earthquakes, nor floods.
conference done after the completion of the
In order to reduce the disastrous effects of these
security survey
natural hazards, as a security officer,
Exit Conference Entrance Conference
you will:
Orientation Discussion
Call PAGASA and inquire when the next storm is
140. An onsite inquiry to check on the degree of coming
compliance of the facility with the
Alert your guards when such hazards occur
recommended countermeasures given during the
Prepare the disaster or emergency plan for those
survey
hazards for the firm
Not to take any concern on such hazards Casual Pilferage Casual Pilferer
146. When a student came to know the questions Systematic Pilferer Systematic Pilferage
in an examination which he is about
152. The ultimate purpose of security education is
to take without the consent of his teacher, there is to ___________.
Need to know Leakage Make everybody security conscious
Classified Matter Compromise Prepare the employees to be alternate guards
147. In the security point of view, what happens Decrease the security personnel to be hired
when the company employees rely too
Give alternate job to employees
much on the assigned security personnel?
153. The purpose of document and information
The security personnel will double their effort. security is to protect sensitive
It results in vulnerability and susceptibility of the information against unauthorized
concerned company to security
A. Declaration C. Disposal
hazards.
B. Delivery D. Disclosure
More security personnel will be hired
154. An information which in some special way
Additional Protective measures will be needed relates to the status or activities of the
148. The exposure and teaching of employees on possessor and over which the possessor asserts
security and its relevance to their ownership.
work is part of _______ A. Sensitive information C. Classified Information
Security Training Security Orientation B. Patented information D. Proprietary Information
Seminar Workshop Security Education 155. The potential damage or loss of an asset is
referred to as
149. The ultimate purpose of security education is
to ___________. A. Risk C. Loss
Make everybody security conscious B. Vulnerability D. Liabilities
Prepare the employees to be alternate guards 156. An individual, group, organization, or
government that conducts activities
Decrease the security personnel to be hired
detrimental to the individual, private or government
Give alternate job to employees
entity is known as
150. Total removal or elimination of a risk in an
A. Enemy C. Competitor
industry is a risk management
B. Adversary D. Opponent
alternative known as _____
157. The term referring to any information, facility,
Risk Reduction Risk Transfer
material, information, or activity which
Risk Avoidance Risk Spreading
has a positive value to its owner whether it is an
151. One who steals due to his inability to resist the individual, private or government entity.
unexpected opportunity and has
A. Resources C. Asset
little fear of detection, has no plan or premeditation
B. Property D. Documents
and he is usually a “loner” on the
158. Availing a property or life insurance is actually
job.
a risk management alternative
commonly known as recommended countermeasures given during the
survey.
A. Risk Avoidance C. Risk Reduction
A. Security Survey C. Security Inspection
B. Risk Transfer D. Risk Spreading
B. Security Investigation D. Onsite Inquiry
159. A pilferer who steals due to his inability to
resist the unexpected opportunity with 165. This pertains to the importance of the firm with
reference to the national economy
no plan or premeditation and has little fear of
detection is and security, like gasoline depots, communication
transmission lines, and power plants.
A. Casual pilferer C. Systematic pilferer
A. Relative Criticality C. Relative Vulnerability
B. Accidental pilferer D. occasional pilferer
B. Probability D. Criticality
160. The act of stealing small items or items of little
value is considered as 166. This refers to the susceptibility of the plant or
establishment to damage, loss or
A. Robbery C. Stealing
disruption of operation due to various hazards, like
B. Sabotage D. Pilferage
the location of the building, the
161. The following are the factors to be considered
machines, or presence of possible poisons.
in in pilferage, except;
A. Relative Criticality C. Relative Vulnerability
A. Location of the items C. Access to the items
B. Probability D. Criticality
B. Position in the company D. Removal of the item
167. The action taken or the physical security used
162. The set of policies, procedures and rules and
to reduce or eliminate one or more
regulations designed to reduce to an
vulnerabilities
absolute minimum the possibility of espionage,
sabotage and compromise of classified A. Physical security C. Security Measures
information of an office or B. Security barriers D. Countermeasures
a whole establishment. A. Policies C. Procedures 168. The impact of a lost as measured in financial
terms is called
B. Security management D. Security System
A. Criticality C. Probability
163. . A conference or dialogue between the survey
team and management officials of a B. Possibility D. Vulnerability
plant before a security survey is conducted. 169. Total removal or elimination of a risk in an
industry is a risk management
A. Exit Conference C. Entrance Conference
alternative known as
B. Orientation D. Discussion
A. Risk Reduction C. Risk Avoidance
164. A conference similar to an entrance
conference done after the completion of the B. Risk Spreading D. Risk Transfer
security survey. 170. A risk management alternative done through
compartmentation and
A. Exit Conference C. Entrance Conference
decentralization to limit the impact of the potential
B. Orientation D. Discussion
lost
165. An onsite inquiry to check on the degree of
A. Risk Avoidance C. Risk Reduction
compliance of the facility with the
B. Risk Self-assumption D. Risk Spreading
171. In the field of industrial security, any situation hazards.
or condition that can cause damage
C. More security personnel will be hired
or loss of life and property is
D. Additional Protective measures will be needed
A. Security hazard C. Vulnerabilities
178. All personnel of the company, from the rank-
B. Security Problems D. Adversaries and-file to the management people
172. It is considered as the weakest link in the should participate in their company’s protection
security chain because
A. Personnel C. Protective lighting A. They are paid for that purpose
B. Locks and Keys D. Security Alarms B. It is part of their added function
173. Security education programs include the C. Security is everybody’s concern
following, except;
D. Their production will increase
A. Orientation on the employee’s role in the
179. The ultimate purpose of security education is
prevention and/or reduction of loss
to
B. Fire prevention programs and drills
A. make everybody security conscious
C. Natural Disaster/Calamity drills
B. prepare the employees to be alternate guards
D. None of these
C. decrease the security personnel to be hired
174. This is usually done to prevent the hiring of
D. give alternate job to employees
unwanted personnel
180. The exposure and teaching of employees on
A. Exit interview C. Background investigation
security and its relevance to their
B. Performance Evaluation D. None of these
work is part of
175. Making the employees aware of their security
A. Security training C. Security education program
responsibilities while employed is
B. Seminar workshop D. Security orientation
known as
181. The exclusive right to patent protection is valid
A. Security Training C. Security orientation
for a period of
B. Security Education D. Proprietary information
A. 10 years C. 15 years
176. This includes all the security measures
B. 17 years D. 20 years
designed to prevent unsuitable individuals
182. Any weakness that can be exploited by an
or persons of doubtful loyalty and integrity from
adversary to gain access to an asset is
employment or retention as employees.
A. Security hazard C. Vulnerabilities
A. Security System C. Security management
B. Security Problems D. Adversaries
B. Background investigation D. Personnel security
183. The following are examples of natural
177. In the security point of view, what happens
hazards, except;
when the company employees rely too
A. Floods caused by typhoon C. Earthquake
much on the assigned security personnel?
B. Incendiary fire D. Lightning storm
A. The security personnel will double their effort.
184. The type of pilferer who steals with
B. It results in vulnerability and susceptibility of the
preconceive plan and takes away anything for
concerned company to security
economic gain is information from people who personally knows the
applicant and from records of the
A. Casual pilferer C. Systematic pilferer
barangay, police and other concerned agencies.
B. Accidental pilferer D. occasional pilferer
A. Background Investigation C. Profiling
185. Security hazards are generally classified into
B. Positive vetting D. Undercover Assignment
A. Natural and Man-made C. Natural and Artificial
192. The use of Polygraph Machine for lie detection
B. Fake and Original D. Divine and Natural
is a technique in Personnel
186. Any formula, pattern, device or compilation of
Security Investigation under
information which is used in one’s
A. Profiling C. Deception Detection Technique
business and which gives him an opportunity to
gain an advantage against competitors B. Undercover Assignment D. Positive vetting
who do not know or use it is 193. A technique of Personnel Security
Investigation where the purpose is to confirm
A. Trade Secrets C. Patent
from the applicant during the interview information
B. Proprietary information D. Classified Documents
collected from the background
187. This is a grant given by the government to an
investigation previously conducted.
inventor, conveying or securing to
A. Profiling C. Deception Detection Technique
him the exclusive right to make, use, or sell his
invention for a term of years. B. Undercover Assignment D. Positive vetting
A. Trade Secrets C. Patent 194. To complete the background investigation,
information must be collected from
B. Proprietary information D. Classified Documents
National Agencies such as, except;
188. In security education, the following are used to
remind employees of their security A. National Bureau of Investigation
responsibilities, except; B. Philippine Statistics Authority
A. Posters C. Fliers C. Intelligence Service of the Armed Forces of the
Philippines
B. Manuals D. Advertisement
D. Municipal Trial Court
189. The first phase of security education program
is 195. In this technique, the person collecting
information should disguise so that his
A. Initial interview C. Orientation and Training
official identity and purpose remains to be
B. Refresher Conference D. Security Reminders
unknown.
190. Security survey comes before security
A. Profiling C. Deception Detection Technique
inspection. The statement is
B. Undercover Assignment D. Positive vetting
A. Correct C. Wrong
196. These are materials containing marks or
B. Partially Correct D. Partly Wrong
symbols that convey meaning to another.
191. This technique of Personnel Security
A. Classified Information C. Document
Investigation serves to verify information
B. Document Security D. Information
appearing on the application form submitted by the
applicant by confirming the 198. These are confidential information since only
few authorized persons are allowed
to know types of barriers were used by Roger?
A. Classified Information C. Need to know a. Energy and animal barriers
B. Document Security D. Information b. Animals and structural barriers
199. The formula used in the manufacture of a c. Structural and energy barriers
product is particularly known as
d. Structural, human, energy barriers
A. Classified Information C. Document
203. A medium or structure which defines the
B. Trade secret D. Information physical limits of an installation or area to
200. When a student came to know the questions restrict or impede access thereto.
in an examination which he is about
a. Security lights
to take without the consent of his teacher, there is
b. Animal barriers
A. Need to know C. Classified Matter
c. Structural barriers
B. Leakage D. Compromise
d. Perimeter barrier
201. Who among the following should not have the
204. Which of the most commonly used full-view
need to know proprietary
fences will caused severe injury if
information?
scaled by intruder since it is made by high strength
A. Proprietor C. Manager steel with sharp blades?
B. Employees D. Janitors a. Barbwire
201. A critical on-site examination and analysis of b. Chain-linked
an industrial plant, business, a home
c. Wire fence
or public or private institution to determine what
d. Concertina
protection is needed and to make
205. Which of the following principles of physical
recommendations for improving the overall level of
security is involved when a facility
security of that installation is
piles up several barriers from first line of physical
A. Security Survey C. Security Inspection
defense to the third line?
B. Security Investigation D. Onsite Inquiry
a. Defense-in-depth is barrier after barrier.
201. What form of perimeter security provides the
b. The type of access necessary depends upon the
best psychological deterrence during
number of variable factors and
the hours of darkness?
therefore maybe achieved in number of ways.
a. Locks
c. There is no impenetrable barrier
b. perimeter fence
d. Each installation is different.
c. protective alarm
206. This increases the protective height and
d. protective lighting prevents easy access to the fence.
202. Roger placed three dogs to help him in the a. Chain linked
security of their house since they don’t
b. Fence post
have a fence, he also installed security lights
c. Top Guard
surrounding the house. What specific
d. Guard control station
207. It is the use of barriers in order to prevent b. Second line of security
outsiders from gaining access to assets
c. Third line of security
in order to prevent loss.
d. Fourth line of security
a. Document Security b. Personnel Security
212. It is the employment of mechanical, electrical,
c. Physical Security d. Personal Security electronic energy imposes a
208. Refers to any physical structure whether deterrent to entry by the potential intruder or to
natural or man–made capable or provide warning to guard personnel.
restricting, deterring, delaying or preventing illegal a. Energy barrier
and unauthorized access to an
b. Structural barrier
installation.
c. Natural barrier
a. Security Lighting
d. None of them
b. Dogs
213. To prevent employees to steal from the
c. Physical Plant company, before hiring they are thoroughly
d. Barriers screened and interviewed, only worthy and loyal
applicants are given opportunity to take
209. These are wide beam units, primarily used to
extend the illumination in long the position. What area of security is involved?
horizontal strips to protect the approaches to the a. Personnel security
perimeter barrier.
b. Personal security
a. search lights
c. Physical security
b. flood lights
d. Document security
c. Fresnel lights
214. The cashier is stealing money from the cash
d. Spot light register and keep on doing so
210. Barriers can be opened, destroyed and because the owner is not conducting a regular
conquered no matter how good you think inventory of goods sold in the store.
they are. Which of the principles of physical Which are of security should be modified and
security is described by this statement? develop in order to prevent further loss?
a. There is no impenetrable barrier. a. Personal Security b. Physical Security
b. The type of access necessary depends upon the c. Document Security d. Personnel Security
number of variable factors and
215. In the case of a house without a fence, the
therefore maybe achieved in number of ways. intruder makes his entry by picking the
c. Defense-in-depth is barrier after barrier. lock of the door, upon entering the house the
security alarm activates which prompted
d. Each installation is different.
the intruder to escape. What line of physical
211. Security lighting system placed at the top of
defense of the house was surpassed by the
the perimeter fence is counted as
intruder?
__________________
a. First line
a. First line of security
b. Third line
c. First degree b. Personal, documentary and perimeter
d. Second line c. Personnel, physical and document
216. A type of security applied for the protection of d. Data, Information and Physical
top-ranking officials of the
221. This is normally provided at main perimeter
government or private entity, visiting persons of entrances to secure areas located
illustrious standing and foreign
out-of-doors, and manned by guards on full-time
dignitaries. basis.
a. Bank security b. Hotel security a. Top Guard
c. VIP security d. School security b. Tower Guard
217. This lighting arrangement is focused on the c. Guard control station
pile of items, rather than the
d. Fence post
background. The width of the lighted strip can be
222. The protection of process, formulas, patents,
controlled and adjusted to suit the
and other operational activities of an
security needs.
installation.
a. Controlled lighting
a. Communication Security b. None of the above
b. Glare projection
c. Bank Security d. Operational Security
c. Supplemental lighting
223. A type of security applied to business groups
d. Continuous lighting engaged in industries like
218. This system is manually operated and is manufacturing, assembling, research and
usually made up of movable search or development, processing, warehousing and
floodlights that can be located in selected or special even agriculture.
locations which will require lighting
a. Document Security b. Industrial Security
only for short period of time.
c. Communication Security d. None of the above
a. Movable or Portable lighting
224. The use of security guards on the entrance of
b. Portable lighting the installation is an example
c. Emergency lighting of_____________________
d. Continuous lighting a. Document Security b. Physical Security
219. This involves the protection of documents and c. Personnel Security d. Personal Security
classified papers from loss, access
225. It has a similar physical appearance to
by unauthorized persons, damage, theft and mercury vapor but provides a light source of
compromise through disclosure.
higher luminous efficiency and better color
a. Personal Security b. Personnel Security rendition.
c. Document Security d. Physical security a. Metal halide
220. The three areas of security are b. Mercury vapor lamp
________________.
c. Fluorescent lamp
a. Personal, document and physical
d. High pressure sodium vapor
226. It involves the protection of assets by A. Security C. Industrial Security
proactive measures of screening applicants
B. Safety D. Industrial Security Management
to be hired in the company.
232. The business of providing security and
a. Personnel Security b. Physical Security protection to private individuals, business
c. Document Security d. Personal Security and enterprises, or government and non-
government industries.
227. This system is used in times of power failure
or other emergencies when other A. Security C. Industrial Security
systems are inoperative. B. Safety D. Industrial Security Management
a. Emergency lighting 233. The law governing the organization and
management of private security agencies.
b. Search light
A. R. A 6975 C. R. A. 8551
c. Street light
B. R. A. 5487 D. R. A. 4857
d. Portable light
234. The law that gives the PNP the power to
228. It involves measures adopted by a certain
supervise and control the training and
company in order to secure the integrity
operation of Private security agencies.
and secrecy of their valued information.
A. R. A 6975 C. R. A. 8551
a. Physical Security
B. R. A. 5487 D. R. A. 4857
b. Personnel Security
235. The main reason why perimeter barrier
c. Personal Security
openings are needed to be monitored is
d. Document Security
A. It could be used as entry points by intruders
229. Roger is planning to build a fence surrounding
B. It could be used as escape route
his house, he wanted to have a
C. It is a security eyesore
fence that will not allow visual access so he can
have the privacy that he wanted, which D. It should be repaired immediately
of the following fence is best for him? 236. The unobstructed area on both sides of the
perimeter barrier known as clear zone
a. Full-view fence
should be maintained because of the following
b. Combination fence
reasons, except;
c. Solid fence
A. for better patrol movement
d. Chain linked fence
B. for better observation
230. Which of the following is not an asset in
C. for the intruder to be easily seen as he has no
hotels?
means to hide
a. Money
D. None of these
b. Guest or customers
238. To complete the background investigation,
c. hotel facilities information must be collected from

d. none of the above National Agencies such as, except;

231. A condition where there is freedom from A. National Bureau of Investigation


danger or harm.
B. Philippine Statistics Authority A. Security Training C. Security orientation
C. Intelligence Service of the Armed Forces of the B. Security Education D. Proprietary information
Philippines
246. This includes all the security measures
D. Municipal Trial Court designed to prevent unsuitable individuals
239. In this technique of investigation, the person or persons of doubtful loyalty and integrity from
collecting information should disguise employment or retention as employees.
so that his official identity and purpose remains to A. Security System C. Security management
be unknown.
B. Background investigation D. Personnel security
A. Profiling C. Deception Detection Technique
247. In the security point of view, what happens
B. Undercover Assignment D. Positive vetting when the company employees rely too
240. These are materials containing marks or much on the assigned security personnel?
symbols that convey meaning to another.
A. The security personnel will double their effort.
A. Classified Information C. Document
B. It results in vulnerability and susceptibility of the
B. Document Security D. Information concerned company to security
241. The formula used in the manufacture of a hazards.
product is particularly known as
C. More security personnel will be hired
A. Classified Information C. Document
D. Additional Protective measures will be needed
B. Trade secret D. Information
248. The ultimate purpose of security education is
242. Who among the following should not have the to
need to know proprietary
A. make everybody security conscious
information?
B. prepare the employees to be alternate guards
A. Proprietor C. Manager
C. decrease the security personnel to be hired
B. Employees D. Janitors
D. give alternate job to employees
243. It is considered as the weakest link in the
249. The exclusive right to patent protection is valid
security chain
for a period of
A. Personnel C. Protective lighting
A. 10 years C. 15 years
B. Locks and Keys D. Security Alarms
B. 17 years D. 20 years
244. Security education programs include the
250. An information which in some special way
following, except;
relates to the status or activities of the
A. Orientation on the employee’s role in the
possessor and over which the possessor asserts
prevention and/or reduction of loss
ownership.
B. Fire prevention programs and drills
A. Sensitive information C. Classified Information
C. Natural Disaster/Calamity drills
B. Patented information D. Proprietary Information
D. None of these
251. An individual, group, organization, or
245. Making the employees aware of their security government that conducts activities
responsibilities while employed is
detrimental to the individual, private or government
known as entity is known as
A. Enemy C. Competitor A. Risk Avoidance C. Risk Reduction
B. Adversary D. Opponent B. Risk Transfer D. Risk Spreading
252. The term referring to any information, facility, 259. The set of policies, procedures and rules and
material, information, or activity which regulations designed to reduce to an
has a positive value to its owner whether it is an absolute minimum the possibility of espionage,
individual, private or government entity. sabotage and compromise of classified
A. Resources C. Asset information of an office or a whole establishment.
B. Property D. Documents A. Policies C. Procedures
253. The action taken or the physical security used B. Security management D. Security System
to reduce or eliminate one or more
260. A critical on-site examination and analysis of
vulnerabilities an industrial plant, business, a home
A. Physical security C. Security Measures or public or private institution to determine what
protection is needed and to make
B. Security barriers D. Countermeasures
recommendations for improving the overall level of
254. A risk management alternative done through
security of that installation is
compartmentation and
A. Security Survey C. Security Inspection
decentralization to limit the impact of the potential
lost B. Security Investigation D. Onsite Inquiry
A. Risk Avoidance C. Risk Reduction 261. A conference or dialogue between the survey
team and management officials of a
B. Risk Self-assumption D. Risk Spreading
plant before a security survey is conducted.
255. In the field of industrial security, any situation
or condition that can cause damage A. Exit Conference C. Entrance Conference
or loss of life and property is B. Orientation D. Discussion
A. Security hazard C. Vulnerabilities 262. An onsite inquiry to check on the degree of
compliance of the facility with the
B. Security Problems D. Adversaries
recommended countermeasures given during the
256. The following are examples of natural
survey.
hazards, except;
A. Security Survey C. Security Inspection
A. Floods caused by typhoon C. Earthquake
B. Security Investigation D. Onsite Inquiry
B. Incendiary fire D. Lightning storm
263. This refers to the susceptibility of the plant or
257. The type of pilferer who steals with
establishment to damage, loss or
preconceive plan and takes away anything for
disruption of operation due to various hazards, like
economic gain is
the location of the building, the
A. Casual pilferer C. Systematic pilferer
machines, or presence of possible poisons.
B. Accidental pilferer D. occasional pilferer
A. Relative Criticality C. Relative Vulnerability
258. Availing a property or life insurance is actually
B. Probability D. Criticality
a risk management alternative
264. Any formula, pattern, device or compilation of
commonly known as
information which is used in one’s
business and which gives him an opportunity to 270. The term referring to the license certificate,
gain an advantage against competitors issued by the Chief, Philippine National
who do not know or use it is Police or his duly authorized representative,
authorizing a person to engage in
A. Trade Secrets C. Patent
employing security guard or detective, or a juridical
B. Proprietary information D. Classified Documents
person to establish, engage, direct,
265. This is a grant given by the government to an
manage or operate an individual or a private
inventor, conveying or securing to
detective agency or private security
him the exclusive right to make, use, or sell his
agency or company security force after payment of
invention for a term of years.
the prescribed dues or fees.
A. Trade Secrets C. Patent
A. License to Operate C. Professional License
B. Proprietary information D. Classified Documents
B. License to Exercise Profession D. License to
266. In security education, the following are used to Guard
remind employees of their security
271. This refers to the association of all licensed
responsibilities, except; security agencies and company

A. Posters C. Fliers security forces.

B. Manuals D. Advertisement A. PADPAO B. PNP SOSIA

267. The law that governs the organization and C. PNP SUSIA D. PNP SAGSD
operation of private security agency
272. The division of the PNP responsible for
throughout the Philippines supervising the training and operation of

A. R. A. 6975 C. R. A. 1530 security agencies.

B. R. A. 8551 D. R. A. 5487 A. PADPAO B. PNP SOSIA

268. Any person who offers or renders personal C. PNP SUSIA D. PNP SAGSD
service to watch or secure either a
273. A written order or schedule issued by a
residence or business establishment or both for superior officer usually the private security
hire or compensation, and with a
agency or branch manager or operations officer
license to exercise profession is assigning the performance of private

A. Police Officer C. Security Guard security or detective services/duties.

B. Body Guard D. Security Personnel A. Lawful Order C. Command

269. The document issued by the Chief, Philippine B. Duty Detail Order D. Operational Command
National Police or his duly
274. The group of selected men, trained or grouped
authorized representative recognizing a person to into a functional unit for the
be qualified to perform his duties as
purpose of protecting operational processes from
private security or training personnel. those disruptions which would impede

A. Professional License C. License to Operate efficiency or halt operation of a particular plant,


facility, installation or special activity.
B. License to Exercise Profession D. License to
Guard A. Security guards C. Security Guard Force
B. Guard Forces D. Armed Forces
275. New applicants of license to operate security C. the SG can assist the peace officer otherwise he
agency shall have a minimum capital could be held liable for harboring a
amounting to fugitive
A. 1,000 B. 10,000 D. none of them is correct
C. 100,000 D. 1,000,000 282. After the tour of duty of Security Guard Pablo
Talon, what shall he do with his
276. The following are exempt from pre licensing
training course, except; firearm?
A. Retired Military Personnel C. Retired Police A. Bring the firearm to his residence
Personnel
B. Deposit the firearm inside the drawer of the
B. ROTC Graduate D. College Graduate guards table
277. What is the minimum age requirement of a C. Returns the firearm for safekeeping in the
protection agent based on SOSIA order company’s depositary
dated Oct. 15, 2018? D. Turns over to the next security guard on duty.
A. 18 Y.O B. 21 Y.O. 283. A security force maintained and operated by
any private company/corporation
C. 23 Y.O. D. 25 Y.O.
utilizing any of its own employees to watch, secure
278. The required ratio of firearm to security guard
or guard its business establishment
is
premises, compound or properties is called
A. 2:1 C. 1:1
A. Company Guard Force C. Private Security
B. 1:2 D. 1:3
Agency
279. The owner of a security agency must at least
B. Government Guard Unit D. All of these
be
284. No licensed security agency shall operate,
A. 18 Y.O. B. 21 Y. O.
promote and enter into an agreement of
C. 23 Y.O. D. 25 Y. O.
“merger“ with any person or a group of persons for
280. If the agency has a total of 300 firearms the purpose of organizing a branch
licensed under the agency's name, they
unit or subsidiary under separate control and
are also allowed to stock up to how many rounds of ownership which is also known as
ammunition.
A. Merger System C. Branch System
A. 12,000 rounds C. 7,500 rounds
B. Kabit System D. Branch-out System
B. 15,000 rounds D. 10,000 rounds
285. Under normal conditions, which of the
281. Patrolman Pogi is in pursuit of a criminal. He following firearms should not be issued to
then requested SG Lomi to assist him
private security guards?
in the pursuit. Which of the following circumstances
A. Cal. 45 C. Cal. 38
will be observed?
B. Magnum .22 D. 12 Gauge Shotgun
A. the SG can assist the peace officer provided it is
within the territorial jurisdiction of his 286. Under the law, a Private Security Agency
should apply for regular license only
(SG)area of duty.
when in possession of at least 70 licensed firearms
B. the SG can assist the peace officer because it is
and a minimum of
mandated by law
A. 100 Guards C. 200 Guards 294. The equivalent rank of a security manager is
B. 150 Guards D. 1000 Guards A. Security Director C. Staff Director
287. The required type of training while applying for B. Executive Director D. Deputy Director
a new security guard’s license is
295. Which of the following is the fourth (4th)
A. In Service Training C. Pre Licensing Training General order?
B. Refresher Training D. Specialized Training A. To report all violations of regulations and orders I
am instructed to enforce
288. A security unit maintained and operated by
any government entity other than B. To relay all calls from posts more distant from
the security house where I am
military and/or a police which is established and
maintained for the purpose of securing stationed
the office or compound and/or extension of such C. To quit my post only when properly relieved
government entity.
D. To talk to no one except in the line of duty
A. Private Security Agency C. Company Security
296. How many witnesses are needed when a
Agency
security guard will search a person he
B. Government Security Unit D. Philippine National
arrested?
Police
A. one B. At least two
289. The maximum number of private security
personnel in a given agency shall be C. More than two D. three or more
A. 200 B. 500 297. A security guard making arrest may not inform
the person to be arrested of his
C. 1000 D. 2000
intention to arrest and the cause of arrest if
290. License to operate security agency shall be
valid for how many years A. the person to be arrested flees
A. 365 days B. 1 Year B. the person to be arrested forcibly resists
C. 730 days D. 2 years C. the giving of such information will imperil the
arrest
291. Application for renewal of License to Operate
security agency shall be filed at least D. All of these
A. 60 days before expiry date of LTO. C. At the day 298. This shall refer to training and academic
of expiration programs and courses duly approved or
B. 30 days before expiry date of LTO D. One month prescribed by the Philippine National Police and
before expiry of LTO adopted by the Technical Education
292. A private detective must be a holder of and Skills Development Authority for security
personnel.
A. High school diploma C. Baccalaureate Degree
A. Private Security Training C. Pre Licensing
B. Master’s Degree D. Doctoral Degree
Training
293. Under the staffing pattern, this security guard
B. Refresher Training D. Specialized Training
is responsible for the entire detailed
299. This training refers to the periodic and non-
security officers within a certain establishment.
periodic programs and courses
A. Officer in charge C. Shift in charge
designed with the objective of reinvigorating and/or
B. Post in charge D. Chief Inspector developing basic skills and
knowledge gained previously or gained while in the
exercise of his/her profession as a
matter of experience, to enhance current in-service
and future individual and/or
collective exercise of security profession.
A. Private Security Training C. Pre Licensing
Training
B. Refresher Training D. Specialized Training
300. The following are examples of specialized
training programs except;
A. Armored Car Crew Training Course,
B. Bomb Disposal Training Course,
C. Bank Security Training Course,
D. Security Supervisor Development Course

You might also like