Vous êtes sur la page 1sur 4

Republic of the Philippines

BATANGAS STATE UNIVERSITY


Batangas City

Practice Examination
LEA 104 – Police Intelligence

Name: Course/ Yr. & Section: Date:

I. Multiple Choice. Select the letter of the correct answer that corresponds to each of the following questions.

_____1. It is a communicated knowledge by others obtaining by personal study, investigation, research, analysis, and
observation.
a. Information c. Sources
b. Document d. Informant
_____2. This refers to the gathering of information or documents procured openly without regard as to whether the subject
or target becomes knowledgeable of the purpose.
a. Covert intelligence c. Open Sources
b. Overt Intelligence d. Close Sources
_____3. It is a controlled group of people who worked through the direction of the agent handler.
a. Assets c. Informant Net
b. Informants d. Confidential Informants
_____4. This refers to a person who gives information to the police voluntarily or without any considerations.
a. Informer c. Investigator
b. Informant d. Witness
_____5. The following are types of informants except for
a. Voluntary informant c. Criminal Informant
b. Special Informant d. Witness Informant
_____6. This is a person who casually imparts information to an officer with no intention of providing subsequent
information.
a. Incidental Informant c. Accidental Informant
b. Recruited Informant d. Automatic Informant
_____7. He is an informant who gives information freely and willfully as a witness to a certain act.
a. Anonymous Informant c. Voluntary Informant
b. Special Informant d. Confidential Informant
_____8. This refers to those who give information to the police for price or reward.
a. Informer c. Witness
b. Informant d. Voluntary Informant
_____9. The following are categories of recruited informants, except
a. Spontaneous Informant c. Special Employee
b. Ordinary run of the Mill Informants d. none of these
_____10. Which of the following is a common motive of informants?
a. Reward c. Repentance
b. Revenge d. all of these
_____11. This is particularly desirable to be able to identify and recruit an informant who has access to many criminal in-
group or subversive organization.
a. Investigation c. Approach
b. Selection d. Testing
_____12. This refers to informant who gives information through telephone with the hope of not being identified
a. Anonymous Informant c. Voluntary Informant
b. Special Informant d. Confidential Informant
_____13. It refers to informants who are of specific operational nature.
a. Spontaneous Informant c. Special Employee
b. Ordinary run of the Mill Informants d. none of these
_____14. This refers to informant who gives information concerning specialized cases only and it is regarded a special
treatment by the operatives.
a. Anonymous Informant c. Voluntary Informant
b. Special Informant d. Confidential Informant
_____15. This refers to a person who is selected, cultivated and developed into a continuous source of info.
a. Incidental Informant c. Accidental Informant
b. Recruited Informant d. Automatic Informant
_____16. This refers to the secret procurement of information which is obtained without the knowledge of the
person/persons safeguarding vital intelligence interest.
a. Covert intelligence c. Open Sources
b. Overt Intelligence d. Close Sources
_____17. This is important in intelligence work as one often runs into the problems of stolen identities, false IDs and
aliases.
a. Observation c. Investigation
b. Identification d. Description
_____18. This refers to the collection and processing of raw intelligence from a clandestine agent working in the field.
a. Human Intelligence c. Measurement and Signature Intelligence
b. Imagery Intelligence d. Open Source Intelligence
_____19. He is the one who sent overseas undercover as a diplomat or attaché.
a. Junior officer c. legal junior officer
b. Intelligence officer d. spy master
_____20. This refers to a homosexual compromise situation.
a. Honey-traps c. done-traps
b. Drone-traps d. mouse-traps
_____21. This involves inventories of the full range of accessible, acknowledgeable, and unclassified private sector
information sources.
a. Human Intelligence c. Measurement and Signature Intelligence
b. Imagery Intelligence d. Open Source Intelligence
_____22. This refers to discussing an intelligence officer as an attaché or liaison officer at an embassy or overseas post.
a. Investigation c. Intelligence
b. Undercover d. Official Cover
_____23. The use of beautiful women as baits is known as
a. Honey-traps c. dend-drop
b. Drone-traps d. dead drop
_____24. HUMINT means
a. Human Intelligence c. Humid Intelligence
b. Humanitarian Intelligence d. all of these
_____25. This is the most important source of information.
a. People c. Records
b. Document d. Events
_____26. These are the basic collection platform for any well-rounded intelligence system.
a. Records c. People
b. Spies d. Investigators
_____27. This allows someone to circulate in areas where they are not ordinarily welcome.
a. Investigation c. Intelligence
b. Undercover Work d. all of these
_____28. This makes excellent material for recruitment.
a. Investigator c. war criminal
b. Refugee d. b and c
_____29. This position is usually an executive position, which means they get to stay home at headquarters most of the
time.
a. Junior officer c. legal junior officer
b. Intelligence officer d. spy master
_____30. This is a collective term bringing together disparate elements that do not fit within the definitions of Signal
Intelligence, Imagery Intelligence or Human Intelligence.
a. Human Intelligence c. Measurement and Signature Intelligence
b. Imagery Intelligence d. Open Source Intelligence
_____31. In this technique, threatened with exposure for violating currency laws of the host nation.
a. Criminal law violations c. Security violations
b. Currency violations d. Black marketing
_____32. Intelligence has _________ categories.
a. Four c. six
b. Five d. seven
_____33. This is the first rule of clandestine intelligence.
a. Go before the game c. Go after the big game
b. Go after the big fish d. none of these
_____34. These are people who have made a plea bargain with law enforcement.
a. Undercovers c. double agents
b. Recruits d. Inadvertent spies
_____35. The following are stages of undercover work, except
a. Last Stage c. middle stage
b. Late stage d. early stage
_____36. In this technique, targets are threatened with exposure for buying contraband goods and services.
c. Criminal law violations c. Security violations
d. Currency violations d. Black marketing
_____37. These are people looking for a source of extra income
a. Walk-ins c. double agents
b. Recruits d. Inadvertent spies
_____38. This is the last step of recruiting infiltrators that is usually done by the agency.
a. Termination c. Training
b. Recruiting d. Handling
_____39. This is generally used to attract a recruit’s attention, and sooner or later it’s all going to come down to this.
a. Drugs c. Sex
b. Women d. Money
_____40. This refers to someone in deeper disguise who is acting like a businessman, journalist, tourist, or college
professor on an exchange program.
a. Investigation c. Non-Official Cover
b. Undercover d. Official Cover
_____41. This generally refers to an intelligence document and has a classified meaning.
a. Name c. Code word
b. Courier d. Case officer
_____42. This refers to the drug of choice, but anything that will build rapport and encourage talking is suitable.
a. Rugby c. Wine
b. Alcohol d. Shabu
_____43. This means personality profiling.
a. Evaluation c. Training
b. Recruiting d. Handling
_____44. This refers to someone with actual access to the information you need.
a. Access Agent c. Primary Agent
b. Case Officer d. Recruiting spies
_____45. This specialty is also called PHOTINT.
a. Human Intelligence c. Measurement and Signature Intelligence
b. Imagery Intelligence d. Open Source Intelligence
_____46. This usually involves the passing of control from oneself to another, usually superior, case officer.
a. Evaluation c. Training
b. Recruiting d. Handling
_____47. This takes the form of meeting and getting to know the target.
a. Evaluation c. Training
b. Recruiting d. Handling
_____48. This agent knows somebody who is more important, and serves as a gateway or portal to others.
a. Access Agent c. Primary Agent
b. Case Officer d. Recruiting spies
_____49. This involves teaching the spy how to use specialized equipment and codes.
a. Evaluation c. Training
b. Recruiting d. Handling
_____50. This means looking for people who have access.
a. Evaluating c. Spotting
b. Recruiting d. Testing
_____51. This seeks to overcome enemy attempts to use human sources to collect information or to conduct sabotage and
subversion which includes CI Special Operations, Liaison, Counter Security, and CI Screening.
c. Counter Human Intelligence c. Counter Imagery Intelligence
d. Counter Signal Intelligence d. Criminal Intelligence
_____52. This is the term used formerly when referring to Priority Intelligence Requirement (PIR).
a. Essential of Information Element c. Essential Element of Information
b. Information of Essential Element d. Element Essential of Information
_____53. This means that the total sum of efforts to counsel the national policies, diplomatic decisions, military data and
any other information of a secret nature affecting the security of the nation from unauthorized persons.
a. Security Intelligence c. Counter-espionage
b. Counter Intelligence d. Military Security
_____54. This may include security tag or pass card, challenge or password and reconnaissance.
a. Denial Measure c. Deception Measure
b. Detection Measure d. Defiance Measure
_____55. These are only necessary in the evaluation of an intelligence process based on the existing situation-current
domestic and foreign situations and national objectives.
a. Knowledge and Skills c. Judgment and Experience
b. Talent and Competence d. Dedication and Commitment
_____56. These are those measures, which seek to conceal information from the enemy.
a. Passive Measures c. Evaluation Measures
b. Active Measures d. Prevention Measures
_____57. This assess friendly operations to identify patterns, profiles and develop, recommend and analyze counter
measures.
a. Counter Human Intelligence c. Counter Imagery Intelligence
b. Counter Signal Intelligence d. Criminal Intelligence
_____58. This is an intelligence required by higher or adjacent echelons of the government or military establishment.
a. Executive c. Operational
b. Contributory d. Collateral
_____59. This may refer to visibility, cloudy, temperature, precipitation (rain) or wind.
a. People c. Enemy
b. Weather d. Terrain
_____60. This determines the future courses of action required by the executives to plan future military operations and
policies.
a. Basic c. Estimative
b. Current d. Operative
_____61. These are temporary in nature and narrower in scope. These are information required to be in the scope with the
current objectives.
a. Basic c. Estimative
b. Current d. Operative
_____62. This may refer to living condition of the people, sources of income, education of the people, government
livelihood projects, or extent of enemy influence to the people.
a. People c. Enemy
b. Weather d. Terrain
_____63. This includes action taken to determine enemy SIGINT and related EW capabilities and activities. These actions
include surveillance radar, photo thermal and infrared systems.
a. Counter Human Intelligence c. Counter Imagery Intelligence
b. Counter Signal Intelligence d. Criminal Intelligence
_____64. This is an additional intelligence required in planning and carrying out effectively the decision or policy
announced.
a. Executive c. Operational
b. Contributory d. Collateral
_____65. This may refer to relief and drainage system, vegetation, surface material or man-made features.
a. People c. Enemy
b. Weather d. Terrain
_____66. These are those measures, which seek actively, block the enemy’s efforts to gain information or engage in
espionage, subversion or sabotage.
a. Passive Measures c. Evaluation Measures
b. Active Measures d. Prevention Measures
_____67. This is an item of intelligence or information of the characteristics of the area of operations and the enemy, which
the commander feels he needs before he can reasonably arrive at a decision.
a. Information Requirement c. Sources of Information
b. Collecting Agencies d. Priority Intelligence Requirement
_____68. This may include secrecy discipline, document security, camouflage and concealment, communication security,
military censorship, counter reconnaissance.
a. Denial Measure c. Deception Measure
b. Detection Measure d. Defiance Measure
_____69. In this type of intelligence, negative intelligence becomes a dynamic and active effort. Its purpose is to investigate
actual or theoretical violation of espionage laws.
a. Security Intelligence c. Counter-espionage
b. Counter Intelligence d. Military Security
_____70. This is regarding the enemy and its environment, which needs to be collected and processed in order to meet the
Priority Intelligence Requirement of a Chief or Head.
a. Information Requirement c. Sources of Information
b. Collecting Agencies d. Priority Intelligence Requirement
_____71. This may include ruse – use of escape and evasion, dummy position and fabricated information.
a. Denial Measure c. Deception Measure
b. Detection Measure d. Defiance Measure
_____72. This is a category of counter-intelligence that encompasses the measures taken by a command to protect itself
against espionage, enemy operation, sabotage, subversion or surprise.
a. Security Intelligence c. Counter-espionage
b. Counter Intelligence d. Military Security
_____73. These are general reference materials for use in the planning regarding the enemies, area of operations,
capabilities – static comprehensive.
a. Basic c. Estimative
b. Current d. Operative
_____74. This is also called counter-intelligence investigation. This is an activity that constitutes the value of the CI
workload, worldwide and includes specific investigation of individual and incidence which for the most part are conducted
in an overt but discreet manner.
a. CI Analyst c. CI Officer
b. CI Operation d. CI Operative
_____75. This is a kind of intelligence required by the commander to provide for planning and conduct of tactical and
administrative operative operation in counter insurgency.
a. Strategic Intelligence c. Line Intelligence
b. Counter Intelligence d. Counter-espionage

Prepared by:

_________________________
Mr. Jeffery C. Arrieta
Faculty Member, CAS

Vous aimerez peut-être aussi