CSS241
1 / 70
Non traditional security threats includes one
2 / 70
___ ___ is a place that involves an aspect of transportation
3 / 70
Karl marx is one of the proponents of the youth bulge theory
4 / 70
Hurricane entail sea surface temperatures of at least
5 / 70
After car jacking, one should seek
6 / 70
__________ is the collection of intelligence through the use of satellite images
7 / 70
The following are the forms of violence crimes except pick the incorrect options
8 / 70
___ ____ is usually involves submerging of land by overflowing water
9 / 70
The concept of security has undergone a transition from conceptualization to a nontraditional meaning.
10 / 70
10. War gaming is a
11 / 70
lack of has really undermined the capacity of the police to perform its functions
12 / 70
12. War gaming is a
13 / 70
is a methods which involves one secretly listening to a private conversation or discussion
14 / 70
_______ is the consequence of a natural hazard
15 / 70
____ ___ can be described as that aspect of security designed purposely to provide protection for specific purposely to provide protection for specific infrastructure particularly those infrastructure considered critical
16 / 70
16. War gaming is a ___ ___
17 / 70
can be described as a tool designed to find previously unknown knowledge through links, associations, and patterns in data
18 / 70
usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats.
19 / 70
The methods of interrogation includes the following except one .Pick the odd one
20 / 70
Job design is a principle of management.
21 / 70
___ ____ are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset
22 / 70
An earthquake is also known as
23 / 70
Identify the one that is not types of security
24 / 70
25 / 70
_____ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
26 / 70
The process of gathering and assembling information through several methods for the purpose of production intelligence is
27 / 70
Nigeria has continued to pose a huge _risk to the country
28 / 70
The following are the theories of crime control except one
29 / 70
something which simulates a system or environment in order to predict actual behaviour
30 / 70
__________ simulation usually involves a process whereby simulated people use simulated tools in a simulated world.
31 / 70
During the westphalia period the treat security usually involves
32 / 70
Marxist theory is one of the theories of crime control.
33 / 70
Another safety tip is to have a comprehensive for your vehicle.
34 / 70
Affiliation and religion have become fundamental elements of post Nigeria
35 / 70
___ ____ can be defined as a means of protecting information systems from any illegitimate access and uses, theft, amendment or malicious attack
36 / 70
37 / 70
Thomas Hobbes (1962) who argued that the essence of a state is to guarantee the ___ ___ property and ensure law
38 / 70
The situation of domestic violence is rampant among the families where one of the partners indulges in very high consumption of ___ ___
39 / 70
Intelligence personnel, Government institutions, Mass Media, communication technology e. t.(c) are
40 / 70
It is very important to install system,
41 / 70
Terrorism trod its semantic pathway to the English usage in_______
42 / 70
are support personnel who assist the spies in managing their clandestine communication by securiting them against energy’s interception or detection
43 / 70
Avoid looking at the robbers on the face so as to avoid the issue of threat of
44 / 70
threats are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset
45 / 70
Hurricane entails sea surface temperatures of at least ___ ____
46 / 70
crisis in North Nigerian states where some antiWestern education Muslim fanatics engaged security agents in bloody battle is called ___ ___
47 / 70
__ has become alternative route through which people can meet their needs?
48 / 70
is the act of watching or observing people or objects
49 / 70
The approaches of securities are___ ___ ___
50 / 70
can be described as the act of seizing and forcefully taking possession of the victim’s vehicle by the crime offender through the use of dangerous weapons especially gun
51 / 70
Thomas Hobbes (1962) argued that the essence of a state is to guarantee the ___ ___ property and ensure law
52 / 70
Anti virus software was performed by___
53 / 70
usually involvos submerging of land by overflowing water
54 / 70
Simulation helps to reduce the situation of crisis in patients as stressed by (2004)
55 / 70
56 / 70
information warfare as “struggles for control over information activities”.
57 / 70
___________ is also known as war-gaming.
58 / 70
After robbery, you should call the
59 / 70
Data-mining and are very important tools of security threat management as well as intelligence collection and analysis
60 / 70
_____ is a good tool in information supping which are used by both criminals and law enforcement agents
61 / 70
______ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
62 / 70
63 / 70
usually involves submerging of land by overflowing water
64 / 70
The approaches of securities are________
65 / 70
Which tool is used to prevent any strange or unintended person from comprehending the content of a message
66 / 70
____ are device that can secretly hide information or things, they look like ordinary object
67 / 70
querries involve conducting our investigation by moving from unknown to known
68 / 70
s a type of tropical cyclone which is a generic term for a low pressure system that generally forms in the tropics
69 / 70
The following are causes of job stress except
70 / 70
Earthquakes are recorded with
Restart quiz
Rate this quiz