ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence
2 / 50
The terrorist attacks into the world trade center was linked to_________
3 / 50
Adamsite (DM) is a chemical agent used as
4 / 50
what involves safety against HIV-AIDS pandemicsis__________
5 / 50
One of themajor environmental threats is ___________
6 / 50
is the tool to probe further as a search light to what may constitute an act of criminality
7 / 50
is often applied at various levels of law enforcement in any community to know the situations of crime and ways to reduce it
8 / 50
Piracy usually involves a very violent act perpetrated by private parties of no affiliation
9 / 50
A threat where the offenders use deadly weapons in the course of carrying out their dastardly act is called
10 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
11 / 50
Violent criminal behaviors designed primarily to generate fear in the community for political purposes is
12 / 50
The capacity of any human and non-human elements to destroy the vital interests of others considered as targets is _____
13 / 50
The process through which we use computer to develop a large database is known as
14 / 50
The end of the Cold War in ____ has widened the scope of security
15 / 50
The continual activites that make protection of mechanisms in information security is _______
16 / 50
The threat which includes flood and cyclone is
17 / 50
The transportation of a woman against her will for ransom is labelled
18 / 50
who said that enemies may hide destructive objects in containers which they later use against a country _________
19 / 50
0ne type of the anti-virus softwares in the market today is_______
20 / 50
In Nigeria, where the number of police personnel is very inadequate to provide any meaningful security calls for
21 / 50
In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______
22 / 50
The threats include hurricane, earthquake, drought and flood.
23 / 50
The use of crime mapping through installation of security gadgets like CCTV's and secret camera's are helpful to identify
24 / 50
The measures that ensure every individual entitlement to employment and living wage is_________
25 / 50
In physical security,-is installed for surveillance and notification_________
26 / 50
One vital element of the subject based query is
27 / 50
Piracy in the 17th and 18th centuries attracted penalty against the offenders
28 / 50
Infrastucture security is designed to provide protection for critical infrastructures such as __________
29 / 50
Another name for demonstration is
30 / 50
Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities
31 / 50
An effective public warnings in responding to disaster reduces _______
32 / 50
These tools above are effective tools for applications in crime prevention and
33 / 50
Insurgency is a form of security threat
34 / 50
The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called
35 / 50
The measures and actions taken by a company to protects its corporate image and establish regulations is_______
36 / 50
The leading factor to the problem of climatic change is the emission of _______ into the atmosphere
37 / 50
Due to the Revolution in modern technology some computers demandinformation before an access is______
38 / 50
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
39 / 50
s a method through which we analyse crime
40 / 50
A hurricane is a type of tropical ____________
41 / 50
The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______
42 / 50
Another name for earthquake is____________
43 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
44 / 50
During these periods in pirates caught were paraded before the public and later subject to execution.
45 / 50
According to ______ civil security includes a better interdepartmental coordination
46 / 50
The progressive destruction and less capable of sustaining vegetation is_________
47 / 50
The internal or external threat that challenges the authority of the state is _________
48 / 50
In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko, Iba, IjoraBadia are examples of in criminal locations
49 / 50
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
50 / 50
Element of preparedness in civil security approaches includes________
Restart quiz
Rate this quiz