CSS243
1 / 70
wrote that populations will continue to increase until they are limited by war, disease, or famine.
2 / 70
Pillars of intelligence Analysis are many but one of these is not included
3 / 70
One of these is not protective discipline for counter intelligence
4 / 70
The 9/11 terrorist incident took place in the
5 / 70
Another source of domestic violence is social
6 / 70
Security is type of security which involves protecting every individual from any physical violence.
7 / 70
Choose the one that does not belong to the type of training
8 / 70
___________ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
9 / 70
are those that voluntarily gives information to law enfprcement agaents.
10 / 70
_________ is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
11 / 70
On the Job training is form of training acquired simultaneously as the security personnel carry – out their duties
12 / 70
Crime has become alternative route through which people can meet their needs
13 / 70
Private security is owned by ______
14 / 70
One of the principles of security is that everyone is a potential _____
15 / 70
is a process of interrogating a person (suspect) to getting information
16 / 70
_________ taught the whole world that commercial planes could be used as terrorist target
17 / 70
Counterintelligence (JC) refers to efforts made by organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them.
18 / 70
Traditionally, management was the unilateral function of the state.
19 / 70
________ is the scheduling system of work, which impinges excessive physical and psychological costs to the worker
20 / 70
Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence.
21 / 70
Theory of violence is of the view that violence is a function of class struggle.
22 / 70
RF/ENPINT stands for frequency/ Electromagnetic pulse intelligence.
23 / 70
Couriers are support personnel who assist the in managing their clandestine communication by securing them (the communications) against enemy’s interceptions or detection.
24 / 70
______ symbolized protection from the threat of disease, hunger, unemployed, crime, social conflict, Political repression and environment hazard.
25 / 70
method of performance appraisal or evaluation mainly focuses on particular behaviour or act of employee (s) as it concerns job performance.
26 / 70
One of these is not an element of compensation and rewards
27 / 70
has become alternative route through which people can meet their needs?
28 / 70
28. are also known as assets
29 / 70
Theory believed that violence was inherent in mankind, meaning that aggression formed part of human nature.
30 / 70
Pillars of intelligence Analysis are many but one these is not included
31 / 70
Choose the one that is not appropriates to security management
32 / 70
is a structured conversation designed to achieve a purpose. The purpose ranges from (ordinary) information research job offer.
33 / 70
The following are causes of job stress except
34 / 70
is a process of gathering and assembling information through several methods for the purpose of production intelligence.
35 / 70
In contemporary times, definition of security goes beyond the traditional ways of protecting the state against internal and external aggression.
36 / 70
__________ approach was a departure from the statecentered security system that dominated the world system during the early cold war era.
37 / 70
The process of gathering and assembling information through several methods for the purpose of production intelligence is ______
38 / 70
Theory was popularized by Paul and Patricia Brantingham in the 1980s.
39 / 70
Espionage usually involves the art of or secretly collecting information through the use of human sources
40 / 70
involve collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
41 / 70
_________ taught the whole world that commercial planes could be used as the
42 / 70
management is hat part of management concerned with people at work and with their relationship within an enterprise.
43 / 70
IMINT stands for of Intelligence.
44 / 70
information from him/her through infliction of extreme physical pain.
45 / 70
is not a category of intelligence
46 / 70
In his model of cycle of violence, Lenore Walker presented to explain the impact that a domestic violence will have on the relationship between the perpetrator and victim.
47 / 70
The scope of the does not include making of arrest of armed robbers or terrorists or homicide suspect but only to arrest and prosecute the offenders of economic and financial crimes like money laundering, stealing of public funds among others
48 / 70
security management was the unilateral function of the state especially if we consider the intellectual view(s) of some political theorists like
49 / 70
In Approach to security management, economic factors and struggle for the control of state resources are the bases for security relations among states.
50 / 70
is a kind of intelligence activity or function carried out by the relevant service or intelligence agency to provide evidence in support of prosecution of any criminal suspects.
51 / 70
__________ are device that can secretly hide information or things, they look like ordinary object.
52 / 70
is a good tool in information supping which are used by both criminals and law enforcement agents
53 / 70
Fire is one of the causes of traumatic disorder
54 / 70
_________ is a structured conversation designed to achieve a purpose
55 / 70
Physical Security is the duty of services to ensure protection of their physical infrastructure against attacks by enemies that operate within and outside.
56 / 70
Goal intelligence is not a category of
57 / 70
Identify the one that is not a category of intelligence
58 / 70
involves putting questions to person(s) with the aim
59 / 70
Offensive Counter intelligence include all activities that are targeted towards arresting the mischief of the enemyparties.
60 / 70
According to _________ approach, economic factors and struggle for the control of State resources are the bases for security relations among states
61 / 70
The technical forms of intelligence disciplines include the following except one
62 / 70
intelligence enables us to appreciate the need to look at intelligence from dual perspective: our strengths and vulnerabilities or weaknesses
63 / 70
The jounces of intelligence are many to include the following except one
64 / 70
The major difference between private secuirty and publicsecurity is the possession of ____
65 / 70
The following are the several forms of MASINT except one ._______ Tick the odd one
66 / 70
Tactical Intelligence involves devolution of responsibility among the hierarchy of personnel in an intelligence service such that information are collected, collated, analyzed and evaluated for the use by the or top management for short term policy agenda
67 / 70
Analysis is the process through which security organization (or any other organization) gives a detailed explanation and catalogue of the purposes, expectations, duties, fetures, behaviours and relevant skills that a particular job evokes on the job-seekers.
68 / 70
taught the whole world that commercial planes could be used as the
69 / 70
Getting information from a criminal suspect is through infliction of physical pain
70 / 70
An approach to security which advocates for more cultural understanding to security studies is
Restart quiz
Rate this quiz