ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
A threat where the offenders use deadly weapons in the course of carrying out their dastardly act is called
2 / 50
security threat is classified into_______ divisions
3 / 50
Terrorism is a ferocious use of violence, a form of
4 / 50
The central focus of computer security is the techniques that enhance the correct________
5 / 50
The first phase to the incidence of hurricane is_____________
6 / 50
According to DeRosa, the process which involves transforming the data to make them useful is known as
7 / 50
Terrorism became a regular vocabulary in the year______
8 / 50
who defines security threat as development that threaten the sovereignty of the state________
9 / 50
The progressive destruction and less capable of sustaining vegetation is_________
10 / 50
The emergence of the cold war started in the yea
11 / 50
It is a fact that food security is not luxury but_______
12 / 50
Chloroacetophenone (CN) is a chemical agent used for
13 / 50
computer security provides a platform which enhance quality attributes like_____
14 / 50
Hurricane is an example of_____threat
15 / 50
The threat which includes flood and cyclone is
16 / 50
Etymologically,the word "tsunami" emanate from the______ language
17 / 50
Piracy usually involves a very violent act perpetrated by private parties of no affiliation
18 / 50
The threat which involves entrapment of the environment with various forms of pollution is
19 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
20 / 50
helps us in our analysis of data to have more information about the subject and gives a clearer picture of the subject.
21 / 50
The introduction of mobile computing with global positioning system (GPS) technologies has made it possible to detect any incidence of
22 / 50
The end of the Cold War in ____ has widened the scope of security
23 / 50
In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko, Iba, IjoraBadia are examples of in criminal locations
24 / 50
According to ______ civil security includes a better interdepartmental coordination
25 / 50
In physical security,-is installed for surveillance and notification_________
26 / 50
Link analysis is very popular among practitioners
27 / 50
The terrorist attacks into the world trade center was linked to_________
28 / 50
The climatic forms of security threats have impact not only on man but on _______
29 / 50
0ne of the two issues that determine the existence of risk is the _______
30 / 50
The use of crime mapping through installation of security gadgets like CCTV's and secret camera's are helpful to identify
31 / 50
During these periods in pirates caught were paraded before the public and later subject to execution.
32 / 50
The period in which threat to security usually involved state to state aggression is
33 / 50
The continual activites that make protection of mechanisms in information security is _______
34 / 50
Another word for "tsunami" is _______
35 / 50
Tsunami is usually mounted by some geological conditions like_______
36 / 50
During the Westphalia period, the major threat to the political sovereignty of any State usually emanated from ____State
37 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
38 / 50
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
39 / 50
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
40 / 50
One vital element of the subject based query is
41 / 50
Infrastucture security is designed to provide protection for critical infrastructures such as __________
42 / 50
Among the Greeks,earthquake is said to be caused by____________
43 / 50
0ne type of the anti-virus softwares in the market today is_______
44 / 50
The climatic change and environment pollution in Africa has increased _________
45 / 50
The act of having an understanding of crime distribution and information about the demography is known as
46 / 50
Piracy in the 17th and 18th centuries attracted penalty against the offenders
47 / 50
The transportation of a woman against her will for ransom is labelled
48 / 50
s a method through which we analyse crime
49 / 50
A hurricane is a type of tropical ____________
50 / 50
The type of demonstration that can lead to the breakdown of law and order is
Restart quiz
Rate this quiz