CSS243



Category: CSS243

0

CSS243

1 / 70

1.

wrote that populations will
continue to increase until
they are limited by war,
disease, or famine.

2 / 70

2.

Pillars of intelligence
Analysis are many but one
of these is not included

3 / 70

3.

One of these is not
protective discipline for
counter intelligence

4 / 70

4.

The 9/11 terrorist incident
took place in the

5 / 70

5.

Another source of domestic
violence is social

6 / 70

6.

Security is type of security
which involves protecting
every individual from any
physical violence.

7 / 70

7.

Choose the one that does
not belong to the type of
training

8 / 70

8.

___________ involves
putting questions to
persons with the aim of
getting information which
can help, which can aid
intelligence

9 / 70

9.

are those that voluntarily
gives information to law
enfprcement agaents.

10 / 70

10.

_________ is the product
resulting from the
collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

11 / 70

11.

On the Job training is form
of training acquired
simultaneously as the
security personnel carry –
out their duties

12 / 70

12.

Crime has become
alternative route through
which people can meet
their needs

13 / 70

13.

Private security is owned by
______

14 / 70

14.

One of the principles of
security is that everyone is
a potential _____

15 / 70

15.

is a process of interrogating
a person (suspect) to
getting information

16 / 70

16.

_________ taught the
whole world that
commercial planes could be
used as terrorist target

17 / 70

17.

Counterintelligence (JC)
refers to efforts made by
organizations to prevent
hostile or enemy
intelligence organizations
from successfully gathering
and collecting intelligence
against them.

18 / 70

18.

Traditionally,
management was the
unilateral function of the
state.

19 / 70

19.

________ is the scheduling
system of work, which
impinges excessive
physical and psychological
costs to the worker

20 / 70

20.

Intelligence
can be described as a
process of gathering and
assembling information
through several methods
for the purpose of
producing intelligence.

21 / 70

21.

Theory of violence is of the
view that violence is a
function of class struggle.

22 / 70

22.

RF/ENPINT stands for
frequency/ Electromagnetic
pulse intelligence.

23 / 70

23.

Couriers are support
personnel who assist the
in managing their
clandestine communication
by securing them (the
communications) against
enemy’s interceptions or
detection.

24 / 70

24.

______ symbolized
protection from the threat of
disease, hunger,
unemployed, crime, social
conflict, Political repression
and environment hazard.

25 / 70

25.

method of performance
appraisal or evaluation
mainly focuses on particular
behaviour or act of
employee (s) as it concerns
job performance.

26 / 70

26.

One of these is not an
element of compensation
and rewards

27 / 70

27.

has become alternative
route through which people
can meet their needs?

28 / 70

28. are also known as assets

29 / 70

29.

Theory believed that
violence was inherent in
mankind, meaning that
aggression formed part of
human nature.

30 / 70

30.

Pillars of intelligence
Analysis are many but one
these is not included

31 / 70

31.

Choose the one that is not
appropriates to security
management

32 / 70

32.

is a structured conversation
designed to achieve a
purpose. The purpose
ranges from (ordinary)
information research job
offer.

33 / 70

33.

The following are causes of
job stress except

34 / 70

34.

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence.

35 / 70

35.

In contemporary times,
definition of security goes
beyond the traditional
ways of protecting the state
against internal and
external aggression.

36 / 70

36.

__________ approach was
a departure from the statecentered security system
that dominated the world
system during the early
cold war era.

37 / 70

37.

The process of gathering
and assembling information
through several methods
for the purpose of
production intelligence is
______

38 / 70

38.

Theory was popularized by
Paul and Patricia
Brantingham in the 1980s.

39 / 70

39.

Espionage usually involves
the art of
or secretly collecting
information through the use
of human sources

40 / 70

40.

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

41 / 70

41.

_________ taught the
whole world that
commercial planes could be
used as the

42 / 70

42.

management is hat part of
management concerned
with people at work and
with their relationship within
an enterprise.

43 / 70

43.

IMINT stands for
of Intelligence.

44 / 70

44.

information from him/her
through infliction of extreme
physical pain.

45 / 70

45.

is not a category of
intelligence

46 / 70

46.

In his model of cycle of
violence, Lenore Walker
presented
to explain the impact that a
domestic violence will have
on the relationship between
the perpetrator and victim.

47 / 70

47.

The scope of the
does not include making of
arrest of armed robbers or
terrorists or homicide
suspect but only to arrest
and prosecute the
offenders of economic and
financial crimes like money
laundering, stealing of
public funds among others

48 / 70

48.

security management was
the unilateral function of the
state especially if we
consider the intellectual
view(s) of some political
theorists like

49 / 70

49.

In
Approach to security
management, economic
factors and struggle for the
control of state resources
are the bases for security
relations among states.

50 / 70

50.

is a kind of intelligence
activity or function carried
out by the relevant service
or intelligence agency to
provide evidence in support
of prosecution of any
criminal suspects.

51 / 70

51.

__________ are device
that can secretly hide
information or things, they
look like ordinary object.

52 / 70

52.

is a good tool in information
supping which are used by
both criminals and law
enforcement agents

53 / 70

53.

Fire is one of the causes of
traumatic disorder

54 / 70

54.

_________ is a structured
conversation designed to
achieve a purpose

55 / 70

55.

Physical Security is the
duty of
services to ensure
protection of their physical
infrastructure against
attacks by enemies that
operate within and outside.

56 / 70

56.

Goal intelligence is not a
category of

57 / 70

57.

Identify the one that is not a
category of intelligence

58 / 70

58.

involves putting questions
to person(s) with the aim

59 / 70

59.

Offensive Counter
intelligence
include all activities that are
targeted towards arresting
the mischief of the enemyparties.

60 / 70

60.

According to _________
approach, economic factors
and struggle for the control
of State resources are the
bases for security relations
among states

61 / 70

61.

The technical forms of
intelligence disciplines
include the following except
one

62 / 70

62.

intelligence enables us to
appreciate the need to look
at intelligence from dual
perspective: our strengths
and vulnerabilities or
weaknesses

63 / 70

63.

The jounces of intelligence
are many to include the
following except one

64 / 70

64.

The major difference
between private secuirty
and publicsecurity is the
possession of ____

65 / 70

65.

The following are the
several forms of MASINT
except one ._______ Tick
the odd one

66 / 70

66.

Tactical Intelligence
involves devolution of
responsibility among the
hierarchy of personnel in an
intelligence service such
that information are
collected, collated,
analyzed and evaluated for
the use by the
or top management for
short term policy agenda

67 / 70

67.

Analysis is the process
through which security
organization (or any other
organization) gives a
detailed explanation and
catalogue of the purposes,
expectations, duties,
fetures, behaviours and
relevant skills that a
particular job evokes on the
job-seekers.

68 / 70

68.

taught the whole world that
commercial planes could be
used as the

69 / 70

69.

Getting information from a
criminal suspect is through
infliction of
physical pain

70 / 70

70.

An approach to security
which advocates for more
cultural understanding to
security studies is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link