CSS243



Category: CSS243

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS243

1 / 50

1.

________the systematic
assessment of job in
relation to strengths and
weaknesses of any
employee or group of
employees.

2 / 50

2.

SWOT analysis stands for
Strength,
Opportunity, and Threat.

3 / 50

3.

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

4 / 50

4.

The out come of an
intelligence is the

5 / 50

5.

information from him/her
through infliction of extreme
physical pain.

6 / 50

6.

Counter intelligence aspect
draws its attention on
identifying vulnerable areas
in one’s intelligence
organization(s) which can
be explored by foreign
intelligence services (FIS).

7 / 50

7.

Operations are clandestine
or secret) ways of making
(illegitimate) entry into the
information facility (ies) of
any target party for
intelligence purpose(s)

8 / 50

8.

Pillars of intelligence
Analysis are many but one
of these is not included

9 / 50

9.

is a structured conversation
designed to achieve a
purpose. The purpose
ranges from (ordinary)
information research job
offer.

10 / 50

10.

The set of people used for
espionage include all
except one

11 / 50

11.

In combating crime, several
countries have formed ____
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

12 / 50

12.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

13 / 50

13.

Approach to security
management opine that
security can best be
managed through noncoercive or non-violence
process, owing to the fact
that violence would only
give birth to further
violence.

14 / 50

14.

In contemporary times,
definition of security goes
beyond the traditional
ways of protecting the state
against internal and
external aggression.

15 / 50

15.

The out come of an
intelligence is the
___________

16 / 50

16.

Espionage usually involves
the art of
or secretly collecting
information through the use
of human sources

17 / 50

17.

Choose the one that does
not belong to the type of
training

18 / 50

18.

The following are the
several forms of MASINT
except one ._______ Tick
the odd one

19 / 50

19.

Tactical Intelligence
involves devolution of
responsibility among the
hierarchy of personnel in an
intelligence service such
that information are
collected, collated,
analyzed and evaluated for
the use by the
or top management for
short term policy agenda

20 / 50

20.

In his model of cycle of
violence, Lenore Walker
presented
to explain the impact that a
domestic violence will have
on the relationship between
the perpetrator and victim.

21 / 50

21.

The major difference
between private secuirty
and publicsecurity is the
possession of ____

22 / 50

22.

is a process of interrogating
a person (suspect) to
getting information

23 / 50

23.

________ Stage describes
the phase where the
individual’s defense
mechanism becomes
active.

24 / 50

24.

___________ involves
putting questions to
persons with the aim of
getting information which
can help, which can aid
intelligence

25 / 50

25.

is the product resulting from
the collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

26 / 50

26.

The gathering of
intelligence through
interception or seizing of
electronic communications
is __________

27 / 50

27.

is illegal beating that may
lead to injuring another
person.

28 / 50

28.

is not appropriate to
security management

29 / 50

29.

______ symbolized
protection from the threat of
disease, hunger,
unemployed, crime, social
conflict, Political repression
and environment hazard.

30 / 50

30.

The business of spying is
structured in a
form

31 / 50

31.

Choose the one that is not
appropriate to security
management

32 / 50

32.

One of these is not an
element of compensation
and rewards

33 / 50

33.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

34 / 50

34.

Theory believed that
violence was inherent in
mankind, meaning that
aggression formed part of
human nature.

35 / 50

35.

In
Approach to security
management, economic
factors and struggle for the
control of state resources
are the bases for security
relations among states.

36 / 50

36.

Identify the one that is not a
principle of personnel
management

37 / 50

37.

Goal intelligence is not a
category of

38 / 50

38.

________ held that in some
cases, stress can be
desirable to both an
organization and individua
ls.

39 / 50

39.

operation are often targeted
towards collecting strategic
information for intelligence
purpose

40 / 50

40.

One of these is not
protective discipline for
counter intelligence

41 / 50

41.

is not a category of
intelligence

42 / 50

42.

Counter
involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

43 / 50

43.

Intelligence tends to focus
basically on gathering,
analyzing, and evaluating
about the capabilities
vulnerabilities and aims of
foreign countries.

44 / 50

44.

Another source of domestic
violence is social

45 / 50

45.

Human intelligence
(HUMINT) and Open
source intelligence (OSINT)
are ___________.

46 / 50

46.

intelligence enables us to
appreciate the need to look
at intelligence from dual
perspective: our strengths
and vulnerabilities or
weaknesses

47 / 50

47.

Choose the one that is not
appropriates to security
management

48 / 50

48.

OSINT stands for
Source Intelligence.

49 / 50

49.

are device that can secretly
hide information or things,
they look like ordinary
object

50 / 50

50.

________ approach
became popular in security
studies in the 1970s

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link