CSS243



Category: CSS243

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS243

1 / 50

1.

Counter
involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

2 / 50

2.

One of the principles of
security is that everyone is
a potential _____

3 / 50

3.

NUCINT Stand for
_________

4 / 50

4.

One of these is not an
element of compensation
and rewards

5 / 50

5.

The business of spying is
structured in a
form

6 / 50

6.

__________ involves
collection of intelligence
through public sources like
archival resources
government documents
academic and professional
material media e.t.c

7 / 50

7.

In combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

8 / 50

8.

______ is basically that
violent struggle between
two or more state/non state
actors, or groups of actors,
who possess a
considerable level of
unequal relation in the
power equilibrium.

9 / 50

9. are also known as assets

10 / 50

10.

In
Approach to security
management, economic
factors and struggle for the
control of state resources
are the bases for security
relations among states.

11 / 50

11.

is the product resulting from
the collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

12 / 50

12.

Analysis is the process
through which security
organization (or any other
organization) gives a
detailed explanation and
catalogue of the purposes,
expectations, duties,
fetures, behaviours and
relevant skills that a
particular job evokes on the
job-seekers.

13 / 50

13.

________ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

14 / 50

14.

information from him/her
through infliction of extreme
physical pain.

15 / 50

15.

One of these is not
protective discipline for
counter intelligence

16 / 50

16.

is a process of interrogating
a person (suspect) to
getting information

17 / 50

17.

Crime has become
alternative route through
which people can meet
their needs

18 / 50

18.

SWOT analysis stands for
Strength,
Opportunity, and Threat.

19 / 50

19.

Fire is one of the causes of
traumatic disorder

20 / 50

20.

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

21 / 50

21.

Identify the one that is not a
category of intelligence

22 / 50

22.

In contemporary times,
definition of security goes
beyond the traditional
ways of protecting the state
against internal and
external aggression.

23 / 50

23.

Traumatic stress disorder
happens as a result of
__________

24 / 50

24.

Choose the one that does
not belong to the type of
training

25 / 50

25.

Health Security involves
against HIV-AIDS
pandemics and other
diseases like malaria that
accounts for a very high
mortality rate.

26 / 50

26.

The use of satellite images
for the collection of
intelligence is _________

27 / 50

27.

Goal intelligence is not a
category of

28 / 50

28.

Security is type of security
which involves protecting
every individual from any
physical violence.

29 / 50

29.

MASINT stands for
measurement and
intelligence.

30 / 50

30.

________ Stage describes
the phase where the
individual’s defense
mechanism becomes
active.

31 / 50

31.

In combating crime, several
countries have formed ____
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

32 / 50

32.

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

33 / 50

33.

Private security is owned by
______

34 / 50

34.

LASNT stands for
intelligence.

35 / 50

35.

Counter intelligence aspect
draws its attention on
identifying vulnerable areas
in one’s intelligence
organization(s) which can
be explored by foreign
intelligence services (FIS).

36 / 50

36.

Choose the one that is not
appropriate to security
management

37 / 50

37.

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence.

38 / 50

38.

OSINT stands for
Source Intelligence.

39 / 50

39.

Another source of domestic
violence is social

40 / 50

40.

Approach to security
management opine that
security can best be
managed through noncoercive or non-violence
process, owing to the fact
that violence would only
give birth to further
violence.

41 / 50

41.

Traditionally,
management was the
unilateral function of the
state.

42 / 50

42.

OWVL stands for One-Way
Voice

43 / 50

43.

intelligence enables us to
appreciate the need to look
at intelligence from dual
perspective: our strengths
and vulnerabilities or
weaknesses

44 / 50

44.

Pillars of intelligence
Analysis are many but one
these is not included

45 / 50

45.

management is hat part of
management concerned
with people at work and
with their relationship within
an enterprise.

46 / 50

46.

General Adoption
Syndrome (GAS) describes
the stages an individual
encounters in stressful
conditions except one

47 / 50

47.

_________ is the product
resulting from the
collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

48 / 50

48.

Theory of violence is of the
view that violence is a
function of class struggle.

49 / 50

49.

The features of job
description includes but one

50 / 50

50.

__________ are device
that can secretly hide
information or things, they
look like ordinary object.

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link