ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
NUCINT Stand for _________
2 / 50
intelligence enables us to appreciate the need to look at intelligence from dual perspective: our strengths and vulnerabilities or weaknesses
3 / 50
___________ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
4 / 50
Choose the one that does not belong to the type of training
5 / 50
intelligence is the kind of intelligence carried out in support of prosecution of any criminal suspects
6 / 50
The technical forms of intelligence disciplines include the following except one
7 / 50
Operations are clandestine or secret) ways of making (illegitimate) entry into the information facility (ies) of any target party for intelligence purpose(s)
8 / 50
n combating crime, several countries have formed community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
9 / 50
The major difference between private secuirty and publicsecurity is the possession of ____
10 / 50
Counter intelligence aspect draws its attention on identifying vulnerable areas in one’s intelligence organization(s) which can be explored by foreign intelligence services (FIS).
11 / 50
This is the kind of intelligence carried out in support of prosecution of any criminal suspects
12 / 50
Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence.
13 / 50
_________ taught the whole world that commercial planes could be used as the
14 / 50
is a kind of intelligence activity or function carried out by the relevant service or intelligence agency to provide evidence in support of prosecution of any criminal suspects.
15 / 50
The methods of interrogation includes the following except one .Pick the odd one
16 / 50
Counterintelligence (JC) refers to efforts made by organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them.
17 / 50
This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
18 / 50
Pluralist approach emerged in the ________
19 / 50
method of performance appraisal or evaluation mainly focuses on particular behaviour or act of employee (s) as it concerns job performance.
20 / 50
The 9/11 terrorist incident took place in the
21 / 50
Identify the one that is not a principle of personnel management
22 / 50
Identify the one that is not a category of intelligence
23 / 50
_________ is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
24 / 50
The use of satellite images for the collection of intelligence is _________
25 / 50
26 / 50
Human intelligence (HUMINT) and Open source intelligence (OSINT) are ___________.
27 / 50
The business of spying is structured in a form
28 / 50
Violence is often referred to as a form of violence involving child abuse, elder abuse, and other form of aggressive behavior between two or more people within the same family or household
29 / 50
The following are the several forms of MASINT except one ._______ Tick the odd one
30 / 50
_________ is a structured conversation designed to achieve a purpose
31 / 50
Examples of ________ includes invisible ink, chaffing and winnowing
32 / 50
is a good tool in information supping which are used by both criminals and law enforcement agents
33 / 50
________ is a good jounce of motivation in which security personnel have opportunities to move upwardly one rank to the other
34 / 50
involve collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
35 / 50
__________ are device that can secretly hide information or things, they look like ordinary object.
36 / 50
Physical Security is the duty of services to ensure protection of their physical infrastructure against attacks by enemies that operate within and outside.
37 / 50
Tactical Intelligence involves devolution of responsibility among the hierarchy of personnel in an intelligence service such that information are collected, collated, analyzed and evaluated for the use by the or top management for short term policy agenda
38 / 50
The features of job description includes but one
39 / 50
Theory focuses basically on the grand function of violence rather than the origin of violence or the relationship between the human nature and war or violence.
40 / 50
Fire is one of the causes of traumatic disorder
41 / 50
One of these is not protective discipline for counter intelligence
42 / 50
One of these is not an element of compensation and rewards
43 / 50
Traumatic stress disorder happens as a result of __________
44 / 50
wrote that populations will continue to increase until they are limited by war, disease, or famine.
45 / 50
is illegal beating that may lead to injuring another person.
46 / 50
Choose the one that is not appropriates to security management
47 / 50
Theory of violence is of the view that violence is a function of class struggle.
48 / 50
Traditionally, management was the unilateral function of the state.
49 / 50
Traumatic disorder are caused by the following except one
50 / 50
________the systematic assessment of job in relation to strengths and weaknesses of any employee or group of employees.
Restart quiz
Rate this quiz