ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
Infrastucture security is designed to provide protection for critical infrastructures such as __________
2 / 50
It is a fact that food security is not luxury but_______
3 / 50
is a subfield in criminology and security studies
4 / 50
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
5 / 50
The activities of disloyal employees can affect the collapse of any if adequate mitigation measures are not taken
6 / 50
s essential to tactical analysis necessary for crime forecasting and geographic profiling
7 / 50
Traditionally, the state is the custodian and ultimate beneficiary of the monopoly use of violence as advocated by
8 / 50
If there is no provision of sufficient security at the seaport,this causes _______in that country
9 / 50
Chloroacetophenone (CN) is a chemical agent used for
10 / 50
The mild application of intimidation and violence to bus passengers by criminal gangs is known as
11 / 50
Etymologically,the word "tsunami" emanate from the______ language
12 / 50
enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation
13 / 50
Adamsite (DM) is a chemical agent used as
14 / 50
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
15 / 50
The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called
16 / 50
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
17 / 50
The end of the Cold War in ____ has widened the scope of security
18 / 50
In physical security,-is installed for surveillance and notification_________
19 / 50
Basically, any intentional and unintentional criminal actions are
20 / 50
In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______
21 / 50
what involves safety against HIV-AIDS pandemicsis__________
22 / 50
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
23 / 50
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
24 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
25 / 50
The internal or external threat that challenges the authority of the state is _________
26 / 50
The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called
27 / 50
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
28 / 50
Etymologically, the word Assassin emanated from the Arabic word
29 / 50
The act of having an understanding of crime distribution and information about the demography is known as
30 / 50
Before the advent of internet ,computer virus were usually spread through __________
31 / 50
is the tool to probe further as a search light to what may constitute an act of criminality
32 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
33 / 50
One of the various approaches which involves a network of activities is ________
34 / 50
is very useful to assist crime analysis to locate the hot spots or locations where particular crimes often take place.
35 / 50
Authentication is a technique in which we create___________
36 / 50
The period in which threat to security usually involved state to state aggression is
37 / 50
The process by which an organisation protects and secure its system is_________
38 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
39 / 50
The measures that ensure every individual entitlement to employment and living wage is_________
40 / 50
Piracy in the 17th and 18th centuries attracted penalty against the offenders
41 / 50
computer security provides a platform which enhance quality attributes like_____
42 / 50
Terrorism is a ______ threat
43 / 50
The continual activites that make protection of mechanisms in information security is _______
44 / 50
computer security is described as an aspectof _____security
45 / 50
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
46 / 50
Another name for demonstration is
47 / 50
Climatic hazards basically include hurricane, flood and
48 / 50
Another word for "tsunami" is _______
49 / 50
The transportation of a woman against her will for ransom is labelled
50 / 50
A threat that takes place on the road, streets, or even bridges is
Restart quiz
Rate this quiz