CSS243



Category: CSS243

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS243

1 / 50

1.

Operations are clandestine
or secret) ways of making
(illegitimate) entry into the
information facility (ies) of
any target party for
intelligence purpose(s)

2 / 50

2.

________ Stage describes
the phase where the
individual’s defense
mechanism becomes
active.

3 / 50

3.

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

4 / 50

4.

Violence is often referred to
as a form of violence
involving child abuse, elder
abuse, and other form of
aggressive behavior
between two or more
people within the same
family or household

5 / 50

5.

Tactical Intelligence
involves devolution of
responsibility among the
hierarchy of personnel in an
intelligence service such
that information are
collected, collated,
analyzed and evaluated for
the use by the
or top management for
short term policy agenda

6 / 50

6.

underscores the strategic
importance that selfsustenance in food
production has on the
security of any nation

7 / 50

7.

One of these is not
protective discipline for
counter intelligence

8 / 50

8.

Every employee has a role
to play in the actualization
of the ultimate
of the organization

9 / 50

9.

n combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

10 / 50

10.

Traumatic disorder are
caused by the following
except one

11 / 50

11.

involves putting questions
to person(s) with the aim

12 / 50

12.

In contemporary times,
definition of security goes
beyond the traditional
ways of protecting the state
against internal and
external aggression.

13 / 50

13.

The technical forms of
intelligence disciplines
include the following except
one

14 / 50

14.

________ is a good jounce
of motivation in which
security personnel have
opportunities to move
upwardly one rank to the
other

15 / 50

15.

Approach to security
management was a
departure from the statecentered security system
that dominated the world
system during the early
cold era.

16 / 50

16.

________ held that in some
cases, stress can be
desirable to both an
organization and individua
ls.

17 / 50

17.

is the product resulting from
the collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

18 / 50

18.

__________ is the
collection of intelligence
through the use of satellite
images

19 / 50

19.

One of the principles of
security is that everyone is
a potential _____

20 / 50

20.

are those that voluntarily
gives information to law
enfprcement agaents.

21 / 50

21.

These are the methods of
performance appraisal
except one

22 / 50

22.

__________ approach was
a departure from the statecentered security system
that dominated the world
system during the early
cold war era.

23 / 50

23.

RF/ENPINT stands for
frequency/ Electromagnetic
pulse intelligence.

24 / 50

24.

IMINT stands for
of Intelligence.

25 / 50

25.

MASINT stands for
measurement and
intelligence.

26 / 50

26.

In combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

27 / 50

27.

security management was
the unilateral function of the
state especially if we
consider the intellectual
view(s) of some political
theorists like

28 / 50

28.

Counter intelligence aspect
draws its attention on
identifying vulnerable areas
in one’s intelligence
organization(s) which can
be explored by foreign
intelligence services (FIS).

29 / 50

29.

Pillars of intelligence
Analysis are many but one
of these is not included

30 / 50

30.

Goal intelligence is not a
category of

31 / 50

31.

The 9/11 terrorist incident
took place in the

32 / 50

32.

One of these is not a
dimension of intelligence

33 / 50

33.

Theory focuses basically on
the grand function of
violence rather than the
origin of violence or the
relationship between the
human nature and war or
violence.

34 / 50

34.

Identify the one that is not a
category of intelligence

35 / 50

35.

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

36 / 50

36.

The following are the
several forms of MASINT
except one ._______ Tick
the odd one

37 / 50

37.

_________ is that which
poses significant threat to
employee’s health and
consequently to the health
of an organization

38 / 50

38.

The features of job
description includes but one

39 / 50

39.

Counter
involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

40 / 50

40.

is not appropriate to
security management

41 / 50

41.

Intelligence tends to focus
basically on gathering,
analyzing, and evaluating
about the capabilities
vulnerabilities and aims of
foreign countries.

42 / 50

42.

Fire is one of the causes of
traumatic disorder

43 / 50

43.

management is hat part of
management concerned
with people at work and
with their relationship within
an enterprise.

44 / 50

44.

The use of satellite images
for the collection of
intelligence is _________

45 / 50

45.

OSINT stands for
Source Intelligence.

46 / 50

46.

is a concept that has
attracted huge attention
among the scholars in
peace and conflict studies,
criminology and security
studies as well psychology.

47 / 50

47.

General Adoption
Syndrome (GAS) describes
the stages an individual
encounters in stressful
conditions except one

48 / 50

48.

_________ taught the
whole world that
commercial planes could be
used as the

49 / 50

49.

Crime has become
alternative route through
which people can meet
their needs

50 / 50

50.

_________ taught the
whole world that
commercial planes could be
used as terrorist target

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link