CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

2 / 50

2.

It is a fact that food security
is not luxury but_______

3 / 50

3.

is a subfield in criminology
and security studies

4 / 50

4.

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

5 / 50

5.

The activities of disloyal
employees can affect the
collapse of any
if adequate mitigation
measures are not taken

6 / 50

6.

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

7 / 50

7.

Traditionally, the state is the
custodian and ultimate
beneficiary of the monopoly
use of violence as
advocated by

8 / 50

8.

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

9 / 50

9.

Chloroacetophenone (CN)
is a chemical agent used
for

10 / 50

10.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

11 / 50

11.

Etymologically,the word
"tsunami" emanate from
the______ language

12 / 50

12.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

13 / 50

13.

Adamsite (DM) is a
chemical agent used as

14 / 50

14.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

15 / 50

15.

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

16 / 50

16.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

17 / 50

17.

The end of the Cold War in
____ has widened the
scope of security

18 / 50

18.

In physical security,-is
installed for surveillance
and notification_________

19 / 50

19.

Basically, any intentional
and unintentional criminal
actions are 

20 / 50

20.

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

21 / 50

21.

what involves safety
against HIV-AIDS
pandemicsis__________

22 / 50

22.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

23 / 50

23.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

24 / 50

24.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

25 / 50

25.

The internal or external
threat that challenges the
authority of the state is
_________

26 / 50

26.

The threat which usually
attract crowds with strong
emotional convictions to act
in unlawful ways is called

27 / 50

27.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

28 / 50

28.

Etymologically, the word
Assassin emanated from
the Arabic word

29 / 50

29.

The act of having an
understanding of crime
distribution and information
about the demography is
known as

30 / 50

30.

Before the advent of
internet ,computer virus
were usually spread
through __________

31 / 50

31.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

32 / 50

32.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

33 / 50

33.

One of the various
approaches which involves
a network of activities is
________

34 / 50

34.

is very useful to assist
crime analysis to locate the
hot spots or locations
where particular crimes
often take place.

35 / 50

35.

Authentication is a
technique in which we
create___________

36 / 50

36.

The period in which threat
to security usually involved
state to state aggression is

37 / 50

37.

The process by which an
organisation protects and
secure its system
is_________

38 / 50

38.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

39 / 50

39.

The measures that ensure
every individual entitlement
to employment and living
wage is_________

40 / 50

40.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

41 / 50

41.

computer security provides
a platform which enhance
quality attributes like_____

42 / 50

42.

Terrorism is a ______
threat

43 / 50

43.

The continual activites that
make protection of
mechanisms in information
security is _______

44 / 50

44.

computer security is
described as an aspectof
_____security

45 / 50

45.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

46 / 50

46.

Another name for
demonstration is

47 / 50

47.

Climatic hazards basically
include hurricane, flood and

48 / 50

48.

Another word for "tsunami"
is _______

49 / 50

49.

The transportation of a
woman against her will for
ransom is labelled

50 / 50

50.

A threat that takes place on
the road, streets, or even
bridges is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link