ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
In physical security,-is installed for surveillance and notification_________
2 / 50
s the direct application that comes form considering the inherent geography in crime
3 / 50
Before the advent of internet ,computer virus were usually spread through __________
4 / 50
Preparedness is the key element of civil security which has the view to_____violence
5 / 50
One of the effects of Environmental pollution is ________
6 / 50
The threat which involve the malicious activities of man is known as
7 / 50
what is the measures used to provide physical protecton of resourses against deliberate and accidental threats_______
8 / 50
Chloroacetophenone (CN) is a chemical agent used for
9 / 50
The transportation of a woman against her will for ransom is labelled
10 / 50
The capacity of any human and non-human elements to destroy the vital interests of others considered as targets is _____
11 / 50
In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko, Iba, IjoraBadia are examples of in criminal locations
12 / 50
security threat is classified into_______ divisions
13 / 50
If there is no provision of sufficient security at the seaport,this causes _______in that country
14 / 50
The threats include hurricane, earthquake, drought and flood.
15 / 50
The end of the Cold War in ____ has widened the scope of security
16 / 50
Etymologically,the word "tsunami" emanate from the______ language
17 / 50
The word terrorism was popularised by the jacobins who ruled____________
18 / 50
A hurricane is a type of tropical ____________
19 / 50
The act of having an understanding of crime distribution and information about the demography is known as
20 / 50
The measures that ensure every individual entitlement to employment and living wage is_________
21 / 50
Terrorism is coined from the word_____
22 / 50
One of the basic manmade security threats is _____
23 / 50
climatic hazards are created by factors such as _________
24 / 50
The continual activites that make protection of mechanisms in information security is _______
25 / 50
Piracy usually involves a very violent act perpetrated by private parties of no affiliation
26 / 50
Hydrogen cyanide (AC) is a chemical agent that acts on the
27 / 50
Another name for earthquake is____________
28 / 50
Another name for sick-out strike is
29 / 50
computer security is described as an aspectof _____security
30 / 50
This is one of the forms of terrorism________
31 / 50
The mild application of intimidation and violence to bus passengers by criminal gangs is known as
32 / 50
An effective public warnings in responding to disaster reduces _______
33 / 50
The leading factor to the problem of climatic change is the emission of _______ into the atmosphere
34 / 50
helps us in our analysis of data to have more information about the subject and gives a clearer picture of the subject.
35 / 50
the use of poisonous gases on any targeted persons and ecosystem is
36 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
37 / 50
the geological security threat is an aspect of
38 / 50
0ne of the two issues that determine the existence of risk is the _______
39 / 50
Terrorism is a ______ threat
40 / 50
computer security provides a platform which enhance quality attributes like_____
41 / 50
Another name for Knowledge Discovery in Database (KDD) is
42 / 50
Etymologically, the word Assassin emanated from the Arabic word
43 / 50
The type of demonstration that can lead to the breakdown of law and order is
44 / 50
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
45 / 50
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
46 / 50
1. According to ______the State is the custodian and ultimate beneficiary of the monopoly use of violence
47 / 50
A criminal offence which occurs when a person unlawfully obtains services from a person is
48 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
49 / 50
Due to the Revolution in modern technology some computers demandinformation before an access is______
50 / 50
One vital element of the subject based query is
Restart quiz
Rate this quiz