ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
Theory was popularized by Paul and Patricia Brantingham in the 1980s.
2 / 50
________ approach became popular in security studies in the 1970s
3 / 50
Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence.
4 / 50
The gathering of intelligence through interception or seizing of electronic communications is __________
5 / 50
Every employee has a role to play in the actualization of the ultimate of the organization
6 / 50
Espionage usually involves the art of or secretly collecting information through the use of human sources
7 / 50
An approach to security which advocates for more cultural understanding to security studies is
8 / 50
management is hat part of management concerned with people at work and with their relationship within an enterprise.
9 / 50
The methods of interrogation includes the following except one .Pick the odd one
10 / 50
_______ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
11 / 50
The following are causes of job stress except
12 / 50
At the ________ Stage, the body respond when it becomes aware of stress or threat.
13 / 50
Approaches to Public Relation Management in security sectors are the following except one
14 / 50
________ is a good jounce of motivation in which security personnel have opportunities to move upwardly one rank to the other
15 / 50
is not appropriate to security management
16 / 50
___________ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
17 / 50
______ is basically that violent struggle between two or more state/non state actors, or groups of actors, who possess a considerable level of unequal relation in the power equilibrium.
18 / 50
__________ approach was a departure from the statecentered security system that dominated the world system during the early cold war era.
19 / 50
Violence is often referred to as a form of violence involving child abuse, elder abuse, and other form of aggressive behavior between two or more people within the same family or household
20 / 50
In asymmetric aggression, most times, the weak parties usually adopt _____ in the perpetuation of their violent actions against the enemy-party which is actually stronger
21 / 50
The out come of an intelligence is the
22 / 50
Couriers are support personnel who assist the in managing their clandestine communication by securing them (the communications) against enemy’s interceptions or detection.
23 / 50
Another source of domestic violence is social
24 / 50
MASINT stands for measurement and intelligence.
25 / 50
__________ are device that can secretly hide information or things, they look like ordinary object.
26 / 50
NUCINT Stand for _________
27 / 50
ACOUSTINT Stand for _________
28 / 50
_________ taught the whole world that commercial planes could be used as the
29 / 50
taught the whole world that commercial planes could be used as the
30 / 50
Approach to security management was a departure from the statecentered security system that dominated the world system during the early cold era.
31 / 50
Traditionally, management was the unilateral function of the state.
32 / 50
The process of gathering and assembling information through several methods for the purpose of production intelligence is ______
33 / 50
Security is type of security which involves protecting every individual from any physical violence.
34 / 50
The 9/11 terrorist incident took place in the
35 / 50
In Approach to security management, economic factors and struggle for the control of state resources are the bases for security relations among states.
36 / 50
Identify the one that is not a category of intelligence
37 / 50
Crime has become alternative route through which people can meet their needs
38 / 50
Counter intelligence aspect draws its attention on identifying vulnerable areas in one’s intelligence organization(s) which can be explored by foreign intelligence services (FIS).
39 / 50
Goal intelligence is not a category of
40 / 50
________the systematic assessment of job in relation to strengths and weaknesses of any employee or group of employees.
41 / 50
The technical forms of intelligence disciplines include the following except one
42 / 50
SWOT analysis stands for Strength, Opportunity, and Threat.
43 / 50
theorists blame human aggression or war situation on a disparity between the numbers of well educated, well fed, angry "fighting age" young males and the number of positions available to them in society as a primary source of violence
44 / 50
Health Security involves against HIV-AIDS pandemics and other diseases like malaria that accounts for a very high mortality rate.
45 / 50
IMINT stands for of Intelligence.
46 / 50
OSINT stands for Source Intelligence.
47 / 50
Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence
48 / 50
Operations are clandestine or secret) ways of making (illegitimate) entry into the information facility (ies) of any target party for intelligence purpose(s)
49 / 50
underscores the strategic importance that selfsustenance in food production has on the security of any nation
50 / 50
50. are also known as assets
Restart quiz
Rate this quiz