ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
security threat is classified into_______ divisions
2 / 50
Element of preparedness in civil security approaches includes________
3 / 50
The word terrorism was popularised by the jacobins who ruled____________
4 / 50
Hydrogen cyanide (AC) is a chemical agent that acts on the
5 / 50
One of the various approaches which involves a network of activities is ________
6 / 50
One vital element of the subject based query is
7 / 50
Tsunami is usually mounted by some geological conditions like_______
8 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
9 / 50
The end of the Cold War in ____ has widened the scope of security
10 / 50
the use of poisonous gases on any targeted persons and ecosystem is
11 / 50
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
12 / 50
The threat which includes flood and cyclone is
13 / 50
s essential to tactical analysis necessary for crime forecasting and geographic profiling
14 / 50
Traditionally, the state is the custodian and ultimate beneficiary of the monopoly use of violence as advocated by
15 / 50
During these periods in pirates caught were paraded before the public and later subject to execution.
16 / 50
Violent criminal behaviors designed primarily to generate fear in the community for political purposes is
17 / 50
The end of the cold war in has widened the scope of security studies
18 / 50
The period in which threat to security usually involved state to state aggression is
19 / 50
The process by which an organisation protects and secure its system is_________
20 / 50
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
21 / 50
Piracy usually involves a very violent act perpetrated by private parties of no affiliation
22 / 50
Chloroacetophenone (CN) is a chemical agent used for
23 / 50
The deliberate act of destroying another person's property by fire is
24 / 50
s a method through which we analyse crime
25 / 50
On food security,about -of urban dwellers go about with empty stomach_______
26 / 50
s an essential tool of crime analysis
27 / 50
The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called
28 / 50
Another word for "tsunami" is _______
29 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
30 / 50
helps us in our analysis of data to have more information about the subject and gives a clearer picture of the subject.
31 / 50
A hurricane is a type of tropical ____________
32 / 50
History has shown that the first public virus removal was performed by____
33 / 50
Thunderstorm is an example________threat
34 / 50
The qualitative risk analysis is the effort to determine the ______probability
35 / 50
During the Westphalia period, the major threat to the political sovereignty of any State usually emanated from ____State
36 / 50
The type of demonstration that can lead to the breakdown of law and order is
37 / 50
A threat where the offenders use deadly weapons in the course of carrying out their dastardly act is called
38 / 50
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
39 / 50
Terrorism is coined from the word_____
40 / 50
The continual activites that make protection of mechanisms in information security is _______
41 / 50
When contaminations cannot be processed and neutralised by environment we experienced _______ pollution
42 / 50
1. According to ______the State is the custodian and ultimate beneficiary of the monopoly use of violence
43 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
44 / 50
Basically, any intentional and unintentional criminal actions are
45 / 50
who said that enemies may hide destructive objects in containers which they later use against a country _________
46 / 50
According to DeRosa, the process which involves transforming the data to make them useful is known as
47 / 50
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
48 / 50
Another name for Knowledge Discovery in Database (KDD) is
49 / 50
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
50 / 50
The internal or external threat that challenges the authority of the state is _________
Restart quiz
Rate this quiz