ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
The business of spying is structured in a form
2 / 50
_______ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
3 / 50
Theory was popularized by Paul and Patricia Brantingham in the 1980s.
4 / 50
4. are also known as assets
5 / 50
Non coercion or Non-violent is the approach of ____.
6 / 50
Pillars of intelligence Analysis are many but one these is not included
7 / 50
_________ is a structured conversation designed to achieve a purpose
8 / 50
In asymmetric aggression, most times, the weak parties usually adopt _____ in the perpetuation of their violent actions against the enemy-party which is actually stronger
9 / 50
The technical forms of intelligence disciplines include the following except one
10 / 50
__________ approach was a departure from the statecentered security system that dominated the world system during the early cold war era.
11 / 50
Goal intelligence is not a category of
12 / 50
The use of satellite images for the collection of intelligence is _________
13 / 50
Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence
14 / 50
IMINT stands for of Intelligence.
15 / 50
Couriers are support personnel who assist the in managing their clandestine communication by securing them (the communications) against enemy’s interceptions or detection.
16 / 50
The out come of an intelligence is the
17 / 50
is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
18 / 50
LASNT stands for intelligence.
19 / 50
is a good tool in information supping which are used by both criminals and law enforcement agents
20 / 50
is unwanted sexual activity like touching some sensitive parts of the victim.
21 / 50
__________ involves collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
22 / 50
This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
23 / 50
involves putting questions to person(s) with the aim
24 / 50
Counter involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
25 / 50
The jounces of intelligence are many to include the following except one
26 / 50
are device that can secretly hide information or things, they look like ordinary object
27 / 50
General Adoption Syndrome (GAS) describes the stages an individual encounters in stressful conditions except one
28 / 50
Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence.
29 / 50
_________ taught the whole world that commercial planes could be used as the
30 / 50
is not appropriate to security management
31 / 50
The methods of interrogation includes the following except one .Pick the odd one
32 / 50
The set of people used for espionage include all except one
33 / 50
Pluralist approach emerged in the ________
34 / 50
Crime has become alternative route through which people can meet their needs
35 / 50
One of these is not a dimension of intelligence
36 / 50
One of these is not protective discipline for counter intelligence
37 / 50
The out come of an intelligence is the ___________
38 / 50
Health Security involves against HIV-AIDS pandemics and other diseases like malaria that accounts for a very high mortality rate.
39 / 50
Analysis is the process through which security organization (or any other organization) gives a detailed explanation and catalogue of the purposes, expectations, duties, fetures, behaviours and relevant skills that a particular job evokes on the job-seekers.
40 / 50
________ approach became popular in security studies in the 1970s
41 / 50
Tactical Intelligence involves devolution of responsibility among the hierarchy of personnel in an intelligence service such that information are collected, collated, analyzed and evaluated for the use by the or top management for short term policy agenda
42 / 50
Security is type of security which involves protecting every individual from any physical violence.
43 / 50
Private security is owned by ______
44 / 50
________ is a good jounce of motivation in which security personnel have opportunities to move upwardly one rank to the other
45 / 50
_________ is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
46 / 50
Intelligence tends to focus basically on gathering, analyzing, and evaluating about the capabilities vulnerabilities and aims of foreign countries.
47 / 50
Another source of domestic violence is social
48 / 50
Theory focuses basically on the grand function of violence rather than the origin of violence or the relationship between the human nature and war or violence.
49 / 50
RF/ENPINT stands for frequency/ Electromagnetic pulse intelligence.
50 / 50
Offensive Counter intelligence include all activities that are targeted towards arresting the mischief of the enemyparties.
Restart quiz
Rate this quiz