CSS243



Category: CSS243

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS243

1 / 50

1.

The business of spying is
structured in a
form

2 / 50

2.

_______ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

3 / 50

3.

Theory was popularized by
Paul and Patricia
Brantingham in the 1980s.

4 / 50

4. are also known as assets

5 / 50

5.

Non coercion or Non-violent
is the approach of ____.

6 / 50

6.

Pillars of intelligence
Analysis are many but one
these is not included

7 / 50

7.

_________ is a structured
conversation designed to
achieve a purpose

8 / 50

8.

In asymmetric aggression,
most times, the weak
parties usually adopt _____
in the perpetuation of their
violent actions against the
enemy-party which is
actually stronger

9 / 50

9.

The technical forms of
intelligence disciplines
include the following except
one

10 / 50

10.

__________ approach was
a departure from the statecentered security system
that dominated the world
system during the early
cold war era.

11 / 50

11.

Goal intelligence is not a
category of

12 / 50

12.

The use of satellite images
for the collection of
intelligence is _________

13 / 50

13.

Intelligence
can be described as a
process of gathering and
assembling information
through several methods
for the purpose of
producing intelligence

14 / 50

14.

IMINT stands for
of Intelligence.

15 / 50

15.

Couriers are support
personnel who assist the
in managing their
clandestine communication
by securing them (the
communications) against
enemy’s interceptions or
detection.

16 / 50

16.

The out come of an
intelligence is the

17 / 50

17.

is the product resulting from
the collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

18 / 50

18.

LASNT stands for
intelligence.

19 / 50

19.

is a good tool in information
supping which are used by
both criminals and law
enforcement agents

20 / 50

20.

is unwanted sexual activity
like touching some
sensitive parts of the victim.

21 / 50

21.

__________ involves
collection of intelligence
through public sources like
archival resources
government documents
academic and professional
material media e.t.c

22 / 50

22.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

23 / 50

23.

involves putting questions
to person(s) with the aim

24 / 50

24.

Counter
involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

25 / 50

25.

The jounces of intelligence
are many to include the
following except one

26 / 50

26.

are device that can secretly
hide information or things,
they look like ordinary
object

27 / 50

27.

General Adoption
Syndrome (GAS) describes
the stages an individual
encounters in stressful
conditions except one

28 / 50

28.

Approach to security
management opine that
security can best be
managed through noncoercive or non-violence
process, owing to the fact
that violence would only
give birth to further
violence.

29 / 50

29.

_________ taught the
whole world that
commercial planes could be
used as the

30 / 50

30.

is not appropriate to
security management

31 / 50

31.

The methods of
interrogation includes the
following except one .Pick
the odd one

32 / 50

32.

The set of people used for
espionage include all
except one

33 / 50

33.

Pluralist approach emerged
in the ________

34 / 50

34.

Crime has become
alternative route through
which people can meet
their needs

35 / 50

35.

One of these is not a
dimension of intelligence

36 / 50

36.

One of these is not
protective discipline for
counter intelligence

37 / 50

37.

The out come of an
intelligence is the
___________

38 / 50

38.

Health Security involves
against HIV-AIDS
pandemics and other
diseases like malaria that
accounts for a very high
mortality rate.

39 / 50

39.

Analysis is the process
through which security
organization (or any other
organization) gives a
detailed explanation and
catalogue of the purposes,
expectations, duties,
fetures, behaviours and
relevant skills that a
particular job evokes on the
job-seekers.

40 / 50

40.

________ approach
became popular in security
studies in the 1970s

41 / 50

41.

Tactical Intelligence
involves devolution of
responsibility among the
hierarchy of personnel in an
intelligence service such
that information are
collected, collated,
analyzed and evaluated for
the use by the
or top management for
short term policy agenda

42 / 50

42.

Security is type of security
which involves protecting
every individual from any
physical violence.

43 / 50

43.

Private security is owned by
______

44 / 50

44.

________ is a good jounce
of motivation in which
security personnel have
opportunities to move
upwardly one rank to the
other

45 / 50

45.

_________ is the product
resulting from the
collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

46 / 50

46.

Intelligence tends to focus
basically on gathering,
analyzing, and evaluating
about the capabilities
vulnerabilities and aims of
foreign countries.

47 / 50

47.

Another source of domestic
violence is social

48 / 50

48.

Theory focuses basically on
the grand function of
violence rather than the
origin of violence or the
relationship between the
human nature and war or
violence.

49 / 50

49.

RF/ENPINT stands for
frequency/ Electromagnetic
pulse intelligence.

50 / 50

50.

Offensive Counter
intelligence
include all activities that are
targeted towards arresting
the mischief of the enemyparties.

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link