CSS241



Category: CSS241

0

CSS241

1 / 70

1.

Non traditional security
threats includes one

2 / 70

2.

___ ___ is a place that
involves an aspect of
transportation

3 / 70

3.

Karl marx is one of the
proponents of the youth
bulge theory

4 / 70

4.

Hurricane entail sea
surface temperatures of at
least

5 / 70

5.

After car jacking, one
should seek

6 / 70

6.

__________ is the
collection of intelligence
through the use of satellite
images

7 / 70

7.

The following are the forms
of violence crimes except
pick the incorrect options

8 / 70

8.

___ ____ is usually
involves submerging of land
by overflowing water

9 / 70

9.

The concept of security has
undergone a transition from
conceptualization to a nontraditional meaning.

10 / 70

10. War gaming is a

11 / 70

11.

lack of
has really undermined the
capacity of the police to
perform its functions

12 / 70

12. War gaming is a

13 / 70

13.

is a methods which involves
one secretly listening to a
private conversation or
discussion

14 / 70

14.

_______ is the
consequence of a natural
hazard

15 / 70

15.

____ ___ can be described
as that aspect of security
designed purposely to
provide protection for
specific purposely to
provide protection for
specific infrastructure
particularly those
infrastructure considered
critical

16 / 70

16. War gaming is a ___ ___

17 / 70

17.

can be described as a tool
designed to find previously
unknown knowledge
through links, associations,
and patterns in data

18 / 70

18.

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

19 / 70

19.

The methods of
interrogation includes the
following except one .Pick
the odd one

20 / 70

20.

Job design is a principle of
management.

21 / 70

21.

___ ____ are persons,
things, events or ideas,
which pose accidentally or
deliberately some degree or
danger to an asset

22 / 70

22.

An earthquake is also
known as

23 / 70

23.

Identify the one that is not
types of security

24 / 70

24.

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

25 / 70

25.

_____ involves putting
questions to persons with
the aim of getting
information which can help,
which can aid intelligence

26 / 70

26.

The process of gathering
and assembling information
through several methods
for the purpose of
production intelligence is

27 / 70

27.

Nigeria has continued to
pose a huge
_risk to the country

28 / 70

28.

The following are the
theories of crime control
except one

29 / 70

29.

something which simulates
a system or environment in
order to predict actual
behaviour

30 / 70

30.

__________ simulation
usually involves a process
whereby simulated people
use simulated tools in a
simulated world.

31 / 70

31.

During the westphalia
period the treat security
usually involves

32 / 70

32.

Marxist theory is one of the
theories of crime control.

33 / 70

33.

Another safety tip is to have
a comprehensive
for your vehicle.

34 / 70

34.

Affiliation and religion have
become fundamental
elements of post
Nigeria

35 / 70

35.

___ ____ can be defined as
a means of protecting
information systems from
any illegitimate access and
uses, theft, amendment or
malicious attack

36 / 70

36.

The following are the forms
of violence crimes except
pick the incorrect options

37 / 70

37.

Thomas Hobbes (1962)
who argued that the
essence of a state is to
guarantee the ___ ___
property and ensure law

38 / 70

38.

The situation of domestic
violence is rampant among
the families where one of
the partners indulges in
very high consumption of
___ ___

39 / 70

39.

Intelligence personnel,
Government institutions,
Mass Media,
communication technology
e. t.(c) are

40 / 70

40.

It is very important to install
system,

41 / 70

41.

Terrorism trod its semantic
pathway to the English
usage in_______

42 / 70

42.

are support personnel who
assist the spies in
managing their clandestine
communication by
securiting them against
energy’s interception or
detection

43 / 70

43.

Avoid looking at the robbers
on the face so as to avoid
the issue of threat of

44 / 70

44.

threats are persons, things,
events or ideas, which pose
accidentally or deliberately
some degree or danger to
an asset

45 / 70

45.

Hurricane entails sea
surface temperatures of at
least ___ ____

46 / 70

46.

crisis in North Nigerian
states where some antiWestern education Muslim
fanatics engaged security
agents in bloody battle is
called ___ ___

47 / 70

47.

__ has become alternative
route through which people
can meet their needs?

48 / 70

48.

is the act of watching or
observing people or objects

49 / 70

49.

The approaches of
securities are___ ___ ___

50 / 70

50.

can be described as the act
of seizing and forcefully
taking possession of the
victim’s vehicle by the crime
offender through the use of
dangerous weapons
especially gun

51 / 70

51.

Thomas Hobbes (1962)
argued that the essence of
a state is to guarantee the
___ ___ property and
ensure law

52 / 70

52.

Anti virus software was
performed by___

53 / 70

53.

usually involvos
submerging of land by
overflowing water

54 / 70

54.

Simulation helps to reduce
the situation of crisis in
patients as stressed by
(2004)

55 / 70

55.

Affiliation and religion have
become fundamental
elements of post
Nigeria

56 / 70

56.

information warfare as
“struggles for control over
information activities”.

57 / 70

57.

___________ is also known
as war-gaming.

58 / 70

58.

After robbery, you should
call the

59 / 70

59.

Data-mining and
are very important tools of
security threat management
as well as intelligence
collection and analysis

60 / 70

60.

_____ is a good tool in
information supping which
are used by both criminals
and law enforcement
agents

61 / 70

61.

______ involves putting
questions to persons with
the aim of getting
information which can help,
which can aid intelligence

62 / 70

62.

Nigeria has continued to
pose a huge
_risk to the country

63 / 70

63.

usually involves
submerging of land by
overflowing water

64 / 70

64.

The approaches of
securities are________

65 / 70

65.

Which tool is used to
prevent any strange or
unintended person from
comprehending the content
of a message

66 / 70

66.

____ are device that can
secretly hide information or
things, they look like
ordinary object

67 / 70

67.

querries involve conducting
our investigation by moving
from unknown to known

68 / 70

68.

s a type of tropical cyclone
which is a generic term for
a low pressure system that
generally forms in the
tropics

69 / 70

69.

The following are causes of
job stress except

70 / 70

70.

Earthquakes are recorded
with

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link