ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
________the systematic assessment of job in relation to strengths and weaknesses of any employee or group of employees.
2 / 50
SWOT analysis stands for Strength, Opportunity, and Threat.
3 / 50
This is the kind of intelligence carried out in support of prosecution of any criminal suspects
4 / 50
The out come of an intelligence is the
5 / 50
information from him/her through infliction of extreme physical pain.
6 / 50
Counter intelligence aspect draws its attention on identifying vulnerable areas in one’s intelligence organization(s) which can be explored by foreign intelligence services (FIS).
7 / 50
Operations are clandestine or secret) ways of making (illegitimate) entry into the information facility (ies) of any target party for intelligence purpose(s)
8 / 50
Pillars of intelligence Analysis are many but one of these is not included
9 / 50
is a structured conversation designed to achieve a purpose. The purpose ranges from (ordinary) information research job offer.
10 / 50
The set of people used for espionage include all except one
11 / 50
In combating crime, several countries have formed ____ community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
12 / 50
This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
13 / 50
Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence.
14 / 50
In contemporary times, definition of security goes beyond the traditional ways of protecting the state against internal and external aggression.
15 / 50
The out come of an intelligence is the ___________
16 / 50
Espionage usually involves the art of or secretly collecting information through the use of human sources
17 / 50
Choose the one that does not belong to the type of training
18 / 50
The following are the several forms of MASINT except one ._______ Tick the odd one
19 / 50
Tactical Intelligence involves devolution of responsibility among the hierarchy of personnel in an intelligence service such that information are collected, collated, analyzed and evaluated for the use by the or top management for short term policy agenda
20 / 50
In his model of cycle of violence, Lenore Walker presented to explain the impact that a domestic violence will have on the relationship between the perpetrator and victim.
21 / 50
The major difference between private secuirty and publicsecurity is the possession of ____
22 / 50
is a process of interrogating a person (suspect) to getting information
23 / 50
________ Stage describes the phase where the individual’s defense mechanism becomes active.
24 / 50
___________ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
25 / 50
is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
26 / 50
The gathering of intelligence through interception or seizing of electronic communications is __________
27 / 50
is illegal beating that may lead to injuring another person.
28 / 50
is not appropriate to security management
29 / 50
______ symbolized protection from the threat of disease, hunger, unemployed, crime, social conflict, Political repression and environment hazard.
30 / 50
The business of spying is structured in a form
31 / 50
Choose the one that is not appropriate to security management
32 / 50
One of these is not an element of compensation and rewards
33 / 50
34 / 50
Theory believed that violence was inherent in mankind, meaning that aggression formed part of human nature.
35 / 50
In Approach to security management, economic factors and struggle for the control of state resources are the bases for security relations among states.
36 / 50
Identify the one that is not a principle of personnel management
37 / 50
Goal intelligence is not a category of
38 / 50
________ held that in some cases, stress can be desirable to both an organization and individua ls.
39 / 50
operation are often targeted towards collecting strategic information for intelligence purpose
40 / 50
One of these is not protective discipline for counter intelligence
41 / 50
is not a category of intelligence
42 / 50
Counter involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
43 / 50
Intelligence tends to focus basically on gathering, analyzing, and evaluating about the capabilities vulnerabilities and aims of foreign countries.
44 / 50
Another source of domestic violence is social
45 / 50
Human intelligence (HUMINT) and Open source intelligence (OSINT) are ___________.
46 / 50
intelligence enables us to appreciate the need to look at intelligence from dual perspective: our strengths and vulnerabilities or weaknesses
47 / 50
Choose the one that is not appropriates to security management
48 / 50
OSINT stands for Source Intelligence.
49 / 50
are device that can secretly hide information or things, they look like ordinary object
50 / 50
________ approach became popular in security studies in the 1970s
Restart quiz
Rate this quiz