CSS243



Category: CSS243

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS243

1 / 50

1.

________ is the scheduling
system of work, which
impinges excessive
physical and psychological
costs to the worker

2 / 50

2.

On the Job training is form
of training acquired
simultaneously as the
security personnel carry –
out their duties

3 / 50

3.

method of performance
appraisal or evaluation
mainly focuses on particular
behaviour or act of
employee (s) as it concerns
job performance.

4 / 50

4.

MASINT stands for
measurement and
intelligence.

5 / 50

5.

________the systematic
assessment of job in
relation to strengths and
weaknesses of any
employee or group of
employees.

6 / 50

6.

According to _________
approach, economic factors
and struggle for the control
of State resources are the
bases for security relations
among states

7 / 50

7.

______ symbolized
protection from the threat of
disease, hunger,
unemployed, crime, social
conflict, Political repression
and environment hazard.

8 / 50

8.

In combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

9 / 50

9.

Traumatic disorder are
caused by the following
except one

10 / 50

10.

Fire is one of the causes of
traumatic disorder

11 / 50

11.

Health Security involves
against HIV-AIDS
pandemics and other
diseases like malaria that
accounts for a very high
mortality rate.

12 / 50

12.

__________ are device
that can secretly hide
information or things, they
look like ordinary object.

13 / 50

13.

_______ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

14 / 50

14.

is a process of interrogating
a person (suspect) to
getting information

15 / 50

15.

Approach to security
management opine that
security can best be
managed through noncoercive or non-violence
process, owing to the fact
that violence would only
give birth to further
violence.

16 / 50

16.

Espionage usually involves
the art of
or secretly collecting
information through the use
of human sources

17 / 50

17.

These are the methods of
performance appraisal
except one

18 / 50

18.

_________ is a structured
conversation designed to
achieve a purpose

19 / 50

19.

Pluralist approach emerged
in the ________

20 / 50

20.

___________ involves
putting questions to
persons with the aim of
getting information which
can help, which can aid
intelligence

21 / 50

21.

Choose the one that does
not belong to the type of
training

22 / 50

22.

is not a category of
intelligence

23 / 50

23.

ACOUSTINT Stand for
_________

24 / 50

24.

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

25 / 50

25.

Every employee has a role
to play in the actualization
of the ultimate
of the organization

26 / 50

26.

Approach to security
management was a
departure from the statecentered security system
that dominated the world
system during the early
cold era.

27 / 50

27.

In contemporary times,
definition of security goes
beyond the traditional
ways of protecting the state
against internal and
external aggression.

28 / 50

28.

Traumatic stress disorder
happens as a result of
__________

29 / 50

29.

Approaches to Public
Relation Management in
security sectors are the
following except one

30 / 50

30.

security management was
the unilateral function of the
state especially if we
consider the intellectual
view(s) of some political
theorists like

31 / 50

31.

Private security is owned by
______

32 / 50

32.

management is hat part of
management concerned
with people at work and
with their relationship within
an enterprise.

33 / 50

33.

In asymmetric aggression,
most times, the weak
parties usually adopt _____
in the perpetuation of their
violent actions against the
enemy-party which is
actually stronger

34 / 50

34.

Security is type of security
which involves protecting
every individual from any
physical violence.

35 / 50

35.

The following are causes of
job stress excep

36 / 50

36.

The following are the
several forms of MASINT
except one ._______ Tick
the odd one

37 / 50

37.

The major difference
between private secuirty
and publicsecurity is the
possession of ____

38 / 50

38.

At the ________ Stage, the
body respond when it
becomes aware of stress or
threat.

39 / 50

39.

is unwanted sexual activity
like touching some
sensitive parts of the victim.

40 / 50

40.

Tactical Intelligence
involves devolution of
responsibility among the
hierarchy of personnel in an
intelligence service such
that information are
collected, collated,
analyzed and evaluated for
the use by the
or top management for
short term policy agenda

41 / 50

41.

is a concept that has
attracted huge attention
among the scholars in
peace and conflict studies,
criminology and security
studies as well psychology.

42 / 50

42.

The technical forms of
intelligence disciplines
include the following except
one

43 / 50

43.

taught the whole world that
commercial planes could be
used as the

44 / 50

44.

Another source of domestic
violence is social

45 / 50

45.

is the product resulting from
the collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

46 / 50

46.

Theory focuses basically on
the grand function of
violence rather than the
origin of violence or the
relationship between the
human nature and war or
violence.

47 / 50

47.

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

48 / 50

48.

The jounces of intelligence
are many to include the
following except one

49 / 50

49.

Physical Security is the
duty of
services to ensure
protection of their physical
infrastructure against
attacks by enemies that
operate within and outside.

50 / 50

50.

The use of satellite images
for the collection of
intelligence is _________

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link