ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS241
1 / 50
Approaches to Public Relation Management in security sectors are the following except one
2 / 50
___ is a type of tropical cyclone which is a generic term for a low pressure system that generally forms in the tropics
3 / 50
Job design is a principle of management
4 / 50
The following are the theories of crime control except one
5 / 50
The following are the proponent s of the youth bulge theory except one
6 / 50
Karl marx is one of the proponents of the youth bulge theory
7 / 50
Anti virus software was performed by___
8 / 50
Threats which can damage infrastructure basically include the following except___ ___
9 / 50
The following are the forms of violence crimes except ______ pick the incorrect options
10 / 50
Microkenel can be described as a computer kernel that enables relevant
11 / 50
can be described as a tool designed to find previously unknown knowledge through links, associations, and patterns in data
12 / 50
Which tool is used to prevent any strange or unintended person from comprehending the content of a message
13 / 50
usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats.
14 / 50
terrorism is a ________ term.
15 / 50
Both theories believe that high birth rate is the major source of violence or war but their views are slightly different from each othe
16 / 50
An earthquake is also known as___
17 / 50
believes that crimes control can be carried out through the application of large pin maps to illustrate the area where crimes occurred
18 / 50
The situation of domestic violence is rampant among the families where one of the partners indulges in very high consumption of ___ ___
19 / 50
Affiliation and religion have become fundamental elements of post Nigeria
20 / 50
is a process of gathering and assembling information through several methods for the purpose of production intelligence
21 / 50
During the westphalia period the treat security usually involves
22 / 50
Avoid looking at the robbers on the face so as to avoid the issue of threat of
23 / 50
The following are the forms of violence crimes except pick the incorrect options
24 / 50
The following account for the causes of domestic violence except one
25 / 50
s a refined, analysed and evaluated information data gathered through either over (open) or clandestine (secret) means or both
26 / 50
According to ___________ (2004) simulation helps to reduce the situation of crisis in patients
27 / 50
information warfare as “struggles for control over information activities”.
28 / 50
can be described as the act of seizing and forcefully taking possession of the victim’s vehicle by the crime offender through the use of dangerous weapons especially gun
29 / 50
s the indent consequence of communication breakdown in the cycle of domestic violence
30 / 50
Idealism, Pluralism and Realism are some of approaches of
31 / 50
The following are causes of job stress except
32 / 50
Earthquakes are recorded with ___
33 / 50
Nigeria has continued to pose a huge_______risk to the country
34 / 50
_____ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
35 / 50
36 / 50
__ has become alternative route through which people can meet their needs?
37 / 50
The concept of security has undergone a transition from conceptualization to a nontraditional meaning.
38 / 50
___ ____ are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset
39 / 50
40 / 50
___ something which simulates a system or environment in order to predict actual behaviour
41 / 50
Job design is a principle of management.
42 / 50
The methods of including suggestibility, Reid, Deception and torture
43 / 50
_____ is a good tool in information supping which are used by both criminals and law enforcement agents
44 / 50
44. War gaming is a
45 / 50
Research finding has shown that couples that both provide ___ ___to the family on equal terms experience less incidence of violence
46 / 50
Data-mining and are very important tools of security threat management as well as intelligence collection and analysis
47 / 50
Non traditional security threats includes one
48 / 50
49 / 50
is the act of watching or observing people or objects
50 / 50
____ are device that can secretly hide information or things, they look like ordinary object
Restart quiz
Rate this quiz