ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
is a kind of intelligence activity or function carried out by the relevant service or intelligence agency to provide evidence in support of prosecution of any criminal suspects.
2 / 50
The element of staffing are the following except one
3 / 50
RF/ENPINT stands for frequency/ Electromagnetic pulse intelligence.
4 / 50
Pluralist approach emerged in the ________
5 / 50
In his model of cycle of violence, Lenore Walker presented to explain the impact that a domestic violence will have on the relationship between the perpetrator and victim.
6 / 50
__________ approach was a departure from the statecentered security system that dominated the world system during the early cold war era.
7 / 50
are those that voluntarily gives information to law enfprcement agaents.
8 / 50
Getting information from a criminal suspect is through infliction of physical pain
9 / 50
This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
10 / 50
The following are causes of job stress excep
11 / 50
Physical Security is the duty of services to ensure protection of their physical infrastructure against attacks by enemies that operate within and outside.
12 / 50
The set of people used for espionage include all except one
13 / 50
_________ is a structured conversation designed to achieve a purpose
14 / 50
________the systematic assessment of job in relation to strengths and weaknesses of any employee or group of employees.
15 / 50
__________ are device that can secretly hide information or things, they look like ordinary object.
16 / 50
Offensive Counter intelligence include all activities that are targeted towards arresting the mischief of the enemyparties.
17 / 50
Measurement and Signatures Intelligence (MASINT) is scientific and intelligence
18 / 50
taught the whole world that commercial planes could be used as the
19 / 50
__________ involves collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
20 / 50
theorists blame human aggression or war situation on a disparity between the numbers of well educated, well fed, angry "fighting age" young males and the number of positions available to them in society as a primary source of violence
21 / 50
In combating crime, several countries have formed community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
22 / 50
_______ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
23 / 50
The jounces of intelligence are many to include the following except one
24 / 50
Identify the one that is not a category of intelligence
25 / 50
_is a form of violent crime, which involves unlawful attack aimed at causing bodily injury to another party or person.
26 / 50
Espionage usually involves the art of or secretly collecting information through the use of human sources
27 / 50
28 / 50
is unwanted sexual activity like touching some sensitive parts of the victim.
29 / 50
is not a category of intelligence
30 / 50
General Adoption Syndrome (GAS) describes the stages an individual encounters in stressful conditions except one
31 / 50
______ symbolized protection from the threat of disease, hunger, unemployed, crime, social conflict, Political repression and environment hazard.
32 / 50
Counterintelligence (JC) refers to efforts made by organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them.
33 / 50
Choose the one that is not appropriates to security management
34 / 50
________ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
35 / 50
The 9/11 terrorist incident took place in the
36 / 50
On the Job training is form of training acquired simultaneously as the security personnel carry – out their duties
37 / 50
In contemporary times, definition of security goes beyond the traditional ways of protecting the state against internal and external aggression.
38 / 50
The business of spying is structured in a form
39 / 50
is not appropriate to security management
40 / 50
Theory was popularized by Paul and Patricia Brantingham in the 1980s.
41 / 50
is a process of interrogating a person (suspect) to getting information
42 / 50
Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence.
43 / 50
Non coercion or Non-violent is the approach of ____.
44 / 50
The methods of ______ including suggestibility, Reid, Deception and torture
45 / 50
ACOUSTINT Stand for _________
46 / 50
In asymmetric aggression, most times, the weak parties usually adopt _____ in the perpetuation of their violent actions against the enemy-party which is actually stronger
47 / 50
The major difference between private secuirty and publicsecurity is the possession of ____
48 / 50
OSINT stands for Source Intelligence.
49 / 50
Every employee has a role to play in the actualization of the ultimate of the organization
50 / 50
Restart quiz
Rate this quiz