Vous êtes sur la page 1sur 88

REVIEW ON INDUSTRIAL SECURITY

MANAGEMENT
• It is the broadest branch of security which is
concerned with the physical measures adopted to
prevent unauthorized access to equipment,
facilities, materials, and documents, and to
safeguard them against espionage, sabotage
damage and theft.
A. Industrial security
B. Physical security
C. Communication Security
D. VIP Security
– The extent and degree of risks to security is
dependent on the following:
A. Relative criticality of operation
B. Relative vulnerability
C. Relative susceptibility
D. Both A and B are correct
• Each key operates its own lock only. Ex.
houses, cars, rooms, etc.
A. Change key
B. Master key
C. Control key
D. Grand key
• The space and motion detectors derive their
operating principles from –
A. Short wave clique
B. High wave
C. Doppler effect
D. None of these
• Who is exempted from pre-licensing training
course?
A. AFP and PNP retirees
B. AFP and PNP reservist
C. Graduates of ROTC Basic/Advance Course
D. All of these
• Who performs security audit and survey?
A. the security manager or operator
B. the chief inspector
C. qualified security experts
D. any security officer
• This is the set of policies, procedures and rules and
regulations designed to reduce to an absolute
minimum the possibility of espionage, sabotage
and compromise of classified information of an
office or a whole establishment.
A. Security System
B. Security Survey
C. Survey
D. Inspection
– Those devices installed to help detect fires
or detect anything that causes fire such as
smoke or unusual rising of temperature.
A. Destructive fire Alarms
B. Fire Alarms
C. All type of Fire Alarms
D. Smoke and Fire Alarms
– This uses ultrasound (sound of very high
frequency) to detect motion.
A. Infrared Rays
B. Microwave
C. Ultrasonic
D. Video
• A component of communications security that
results from all measures designed to protect
transmission from the interception, traffic analysis,
and imitative deception.
A. Cryptographic Security
B. Physical Security
C. Transmission Security
D. Speech security
• In perimeter barrier, lighting signal and
alarm system are classified as_______.
A. personnel security
B. document security
C. assets protection
D. physical security
 It is an unobstructed area maintained on
both sides of the perimeter barrier.
A. Clear zone
B. Perimeter area
C. Strolling area
D. Patrolling zone
 These are independent structures designed to control
physical and visual access between outside areas.
A. fences
B. perimeter barriers
C. walls
D. grills or bars
• A type of protective lighting being used in
prisons and correctional institutions to
illuminate walls and outside barriers. This is
called
A. Glare Projection type
B. Controlled Lighting
C. Continuous Lighting
D. Standby Lighting
– An individual, group, organization, or
government that conducts activities detrimental
to the individual, private or government entity is
known as -
A. Enemy
B. Competitor
C. Enemy Agent
D. Adversary
– What is the term referring to any information,
facility, material, information, or activity which
has a positive value to its owner whether it is an
individual, private or government entity?
A. Asset
B. Resources
C. Property
D. Strength
– What is the alarm system where in
buildings or compounds, all possible point
of entry can be wired by using electrically
charge strips of tinfoil wire?
A. Breaking an Electrical Circuit through a Metallic Foil or
Wire
B. Interruption of Light Beam of Photo
C. Detecting Sound and Vibration through an Audio
Detection Device
D. Vibration Detection Device
• The most familiar type of outdoor security
lighting designed to provide two specific
results: glare projection or controlled lighting
refers to
A. Standby lighting
B. Continuous Lighting
C. Emergency Lighting
D. Portable Lighting
• A circuit which transmit the message to the
signaling apparatus. This is called
A. Sensor
B. Trigger Device
C. Transmission Line
D. Enunciator
• What is the government agency that issue
security licenses to security guard?
A. PNP FED
B. PNP SAGSD
C. PNP PADPAO
D. PNP Directorates
– The application for license to exercise
security profession and/or permit to
operate a private security agency shall be
filed with the office of the -
A. Chief, PNP thru the Chief, PNP-SAGSD
B. Securities and Exchange Commission
C. Sec., DILG
D. Chief, PNP-SOSIA
– A written order or schedule issued by a superior
officer usually the private security agency or
branch manger or operations officer assigning
the performance of private security or detective
service duties.
A. Duty Detail Order
B. License to Exercise Profession
C. License to Operate
D. None of these
• This is designed to protect valuable assets
from burglary or fire.
A. security storage
B. security cabinet
C. protective container
D. all of the above
• The least expensive in terms of energy
consumed and has the advantage of
providing instant illumination when the
switch is on refers to
A. Metal Halide
B. Fluorescent
C. Mercury Vapor Lamp
D. Incandescent Lamp
• A kind of alarm which detects any sound
caused by attempted force entry. This is
called
A. Vibration Detection Device
B. Laser Beam Alarm
C. Electric Eye Device
D. Audio Detection Device
• What lighting system is used in times of
power failure or other emergencies when
other systems are inoperative?
A. Standby lighting
B. Floodlights
C. Movable lighting
D. Emergency lighting
• What metallic container is used for the
safekeeping of documents or small items in
an office or installation?
A. safe
B. Pillbox
C. Vault
D. file room
• The signaling system that activates the alarm
refers to
A. sensor
B. transmission line
C. trigger device
D. enunciator
• These are highly focused incandescent lamp
and are designed to pinpoint potential
trouble spots. These are called
A. Floodlights
B. Searchlights
C. Streetlights
D. Fresnel lights
• A type of fence which is constructed in such
a way that visual access is denied through
the fence. This is called
A. Solid Fence
B. Full-View Fence
C. Barbed Wire Fence
D. Concertina Wire
• What is the final line of defense of an
installation?
A. security cabinet
B. gates
C. walls
D. ceilings
• These are features constructed by man
regardless of their original intent that tends
to delay the intruder. These are called
A. Energy Barriers
B. System Barriers
C. Structural Barriers
D. Human Barriers
• What is the Private Security Agency Law of
the Philippines?
A. Republic Act 5487
B. Republic Act 4136
C. Republic Act 9165
D. Republic Act 7924
– The dominant or identifying color for
company security force is –
A. navy blue
B. light gray
C. white
D. light blue
• Which among the following is considered as
a first line of defense?
A. doors
B. windows
C. fence
D. all of these
• What is the cubicle in a building constructed a little
lighter than a vault but of bigger size to
accommodate limited people to work on the
records inside?
A. vault
B. cabinet
C. file room
D. safe
• Security Officer A conduct an in – depth study in
company Delta to determine what are the security
measure’s are existing and what are still to be
installed. Which of the following activity he is
conducting?
A. security education
B. security check
C. security survey
D. security interrogation
– The piping has water with pressure, and the
water sprinkler will operate when head is
opened and water will continue to flow until
shut-off.
A. Wet Pipe System
B. Dry Pipe System
C. Pressurized Pipe System
D. Water-filled Pipe
– What are the mechanical devices of
supplying water which can be manual or
motor-driven?
A. Fire hydrant
B. Fire plug
C. Fire Truck
D. Fire Pump
– These detectors trigger an alarm ahead of the
heat-actuated device or detector.
A. Fire detectors
B. Heat detectors
C. Flame detectors
D. Smoke detectors
– The simplest form of lock is the -
A. ward lock
B. Yale lock
C. cylinder lock
D. combination lock
– This is information that in some special way
relates to the status or activities of the possessor
and over which the possessor asserts ownership.
A. sensitive information
B. classified information
C. patented information
D. proprietary information
• Physical security is a _________ place
between the intruder and the target
A. barrier
B. obstruction
C. protection
D. threat
• A private security agency should have a
minimum of ______ licensed private security
under its employ before a regular license
shall be granted.
A. 30
B. 1,000
C. 200
D. 60
• Company guard force shall have a minimum
of _____ licensed private security personnel
under its employ before a regular license
shall be granted.
A. 30
B. 1,000
C. 200
D. 60
• The application for renewal of license to
operate shall be filed at least _____ days
before expiry date of license to operate.
A. 30 days
B. 120 days
C. 60 days
D. 180 days
• The following are examples of Local Agency
Check except:
A. Court Clearance
B. Local Police Clearance
C. Barangay Clearance
D. Intelligence Service Clearance
• What is the process of using devices in
detecting lies during the interview stage?
A. Undercover Investigation
B. Profiling
C. Deception Detection Technique
D. Positive Vetting
• A combination mechanism which uses
numbers, letters or other symbols as
reference point which enable an operator to
align them manually.
A. Padlock
B. Combination Lock
C. Card-operated Lock
D. Code-operated lock
• Security guards is otherwise called the
following except
A. Private security guard
B. security guard
C. watchman
D. none of these
• What type of license is issued after
complying with licensing requirements by a
person who wants to engage in security
management?
A. Regular License to Operate
B. Temporary License to Operate
C. Regular License to Exercise Profession
D. Temporary License to Exercise Profession
• Security force maintained and operated by
any private company or corporation for its
own security requirements only.
A. Private Security Agency
B. Company Guard Force
C. Government Security Unit
D. all of these
• An English term used to denote a lock picker.
A. Peter Pan
B. Peterman
C. Picker
D. all of these
• The chance or likelihood that a loss will take
place refers to
A. Probability
B. Criticality
C. Susceptibility
D. Vulnerability
• A person who steals due to his inability to
resist the unexpected opportunity and has
little fear of detection.
A. Casual Pilferer
B. Systematic Pilferer
C. Espionage Agent
D. none of these
• What is the mandatory indoctrination on
security for all new personnel before their
assignment to their respective jobs?
A. Security Training
B. Security Education
C. Security Analysis
D. Security Investigation
• A system which consists of ringing up a visual
or audible alarm near the object to be
protected.
A. Central Station System
B. Auxiliary Alarm
C. Local Alarm
D. Proprietary System
• The weakest link in the security chain of an
organization refers to
A. documents
B. perimeter barriers
C. protective cabinets
D. personnel
• A person who steals with preconceived plans
and takes away any or all types of items or
supplies for economic gain.
A. Espionage Agent
B. Casual Pilferer
C. Saboteur
D. Systematic Pilferer
• A type of inspection usually conducted in a
random manner.
A. Formal Inspection
B. Structured Inspection
C. Unstructured Inspection
D. Informal Inspection
• This is a check of how well existing security
measures and regulations are being carried
out within a detachment or establishment.
A. security survey
B. security inspection
C. security audit
D. security assessment
Security officer A conduct an in – depth study in
company Delta to determine what are the
security measures are existing and what are still
to be installed. Which of the following activity
he is conducting?
A. security education
B. security check
C. security survey
D. security interrogation
The eradication of risk totally from the
organization is called

A. Risk Reduction
B. Risk Avoidance
C. Risk Spreading
D. Risk Transfer
The exclusive right to patent protection expires
after

A. 7 years
B. 27 years
C. 17 years
D. 37 years
Information concerning document, cryptographic
devices, developed projects and materials
following the categories of Top Secret, Secret,
Confidential and Restricted.
a. Classified text
b. Classified Information
c. Asset
d. Proprietary Information
What is the process whereby a subject’s reaction in
a future critical situation is predicted by observing
his behavior, or by interviewing him, or analyzing
his responses to a questionnaire?
a. Positive Vetting
b. Profiling
c. Undercover Investigation
d. Exit Interview
What type of pass system provides an extra
measure of security by requiring that an exchange
take place at the entrance of each restricted area?
a. Multilinear Pass System
b. Pass Exchange System
c. Single Pass System
d. Multiple Exchange System
What is the identifying color of a document
classified as Secret?

a. blue
b. green
c. red
d. white
A situation which takes place through the loss of
security which results from unauthorized persons
obtaining knowledge of classified matters.
a. Risk
b. Compromise
c. Declassify
d. Security Hazard
A type of protective lighting being used in
prisons and correctional institutions to
illuminate walls and outside barriers.
a. Glare Projection type
b. Controlled Lighting
c. Continuous Lighting
d. Standby Lighting
An inquiry conducted to determine the
character, morality, reputation of an individual
to determine his suitability for employment.
a. personnel security investigation
b. personnel security
c. security education
d. background check
A kind of alarm which detects any sound caused
by attempted force entry.
a. Vibration Detection Device
b. Laser Beam Alarm
c. Electric Eye Device
d. Audio Detection Device
What is the process of using devices in detecting
sham during the interview stage?
a. Undercover Investigation
b. Profiling
b. Deception Detection Technique
d. Positive Vetting
Compartmentation or decentralization of risk to
limit the impact of the potential loss refers to
a. Risk Transfer
b. Risk Spreading
c. Risk Self-Assumption
d. Risk Avoidance
A mechanical, electrical, hydraulic or electronic
device designed to prevent entry into a building,
room, container or hiding place.
a. Keys
b. Cabinet
c. Locks
d. Alarm
The examination of the level of risk in the
organization refers to

a. Risk Management
b. Risk Analysis
c. Risk Administration
d. Risk Interpretation
Writing a memorandum refers to the process of

a. Classification
b. Creation
c. Disposition
d. Retention
What is the process of assigning information or
material, one of the four security categories after
determination has been made that the information
requires the security protection as provided?
a. Declassify
b. Classify
c. Regarding
d. Compartmentation
What lighting system is used in times of power
failure or other emergencies when other
systems are inoperative?
a. Standby lighting
b. Floodlights
c. Movable lighting
d. Emergency lighting
What is the cubicle in a building constructed a little
lighter than a vault but of bigger size to
accommodate limited people to work on the
records inside?
a. Vault
b. Cabinet
c. file room
d. Safe
A document issued by the Chief of the PNP or his
duly authorized representative authorizing a
person to perform his duties as private security or
training personnel.
a. License to Exercise Security Profession
b. License to Operate
c. Duty Detail Order
d. any of these
Security force maintained and operated by any
private company or corporation for its own
security requirements only.
a. Private Security Agency
b. Company Guard Force
c. Government Security Unit
d. all of these
What is the final line of defense of an
installation?

a. security cabinet
b. Gates
c. walls
d. ceilings
A house-like structure above the perimeter
barriers refers to
a. Top Guard
b. Guard Control Stations
c. Tower Guard
d. Sidewalk Elevators
An action taken by a physical entity to reduce or
eliminate one or more vulnerabilities is called
a. Risk Reduction
b. Risk Avoidance
c. Risk Management
d. Countermeasures
Advantage wherein planning is assigned to a team
a. more sources of information
b. there are more personnel in making an ideal
incremental plan
c. coordination with other units
d. team will know and owns the plan and
everyone knows their role or task in the
implementation of the plan
Planning which involves face to face interaction with
those people who will be affected by the plan?

a. transactive planning
b. radical
c. incremental
d. advocacy

Vous aimerez peut-être aussi