CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

2 / 50

2.

security threat is classified
into_______ divisions

3 / 50

3.

Terrorism is a ferocious use
of violence, a form of

4 / 50

4.

The central focus of
computer security is the
techniques that enhance
the correct________

5 / 50

5.

The first phase to the
incidence of hurricane
is_____________

6 / 50

6.

According to DeRosa, the
process which involves
transforming the data to
make them useful is known
as

7 / 50

7.

Terrorism became a regular
vocabulary in the
year______

8 / 50

8.

who defines security threat
as development that
threaten the sovereignty of
the state________

9 / 50

9.

The progressive destruction
and less capable of
sustaining vegetation
is_________

10 / 50

10.

The emergence of the cold
war started in the yea

11 / 50

11.

It is a fact that food security
is not luxury but_______

12 / 50

12.

Chloroacetophenone (CN)
is a chemical agent used
for

13 / 50

13.

computer security provides
a platform which enhance
quality attributes like_____

14 / 50

14.

Hurricane is an example
of_____threat

15 / 50

15.

The threat which includes
flood and cyclone is

16 / 50

16.

Etymologically,the word
"tsunami" emanate from
the______ language

17 / 50

17.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

18 / 50

18.

The threat which involves
entrapment of the
environment with various
forms of pollution is

19 / 50

19.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

20 / 50

20.

helps us in our analysis of
data to have more
information about the
subject and gives a clearer
picture of the subject.

21 / 50

21.

The introduction of mobile
computing with global
positioning system (GPS)
technologies has made it
possible to detect any
incidence of

22 / 50

22.

The end of the Cold War in
____ has widened the
scope of security

23 / 50

23.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

24 / 50

24.

According to ______ civil
security includes a better
interdepartmental
coordination

25 / 50

25.

In physical security,-is
installed for surveillance
and notification_________

26 / 50

26.

Link analysis is very
popular among
practitioners

27 / 50

27.

The terrorist attacks into the
world trade center was
linked to_________

28 / 50

28.

The climatic forms of
security threats have
impact not only on man but
on _______

29 / 50

29.

0ne of the two issues that
determine the existence of
risk is the _______

30 / 50

30.

The use of crime mapping
through installation of
security gadgets like
CCTV's and secret
camera's are helpful to
identify

31 / 50

31.

During these periods in
pirates caught were
paraded before the public
and later subject to
execution.

32 / 50

32.

The period in which threat
to security usually involved
state to state aggression is

33 / 50

33.

The continual activites that
make protection of
mechanisms in information
security is _______

34 / 50

34.

Another word for "tsunami"
is _______

35 / 50

35.

Tsunami is usually mounted
by some geological
conditions like_______

36 / 50

36.

During the Westphalia
period, the major threat to
the political sovereignty of
any State usually emanated
from ____State

37 / 50

37.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

38 / 50

38.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

39 / 50

39.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

40 / 50

40.

One vital element of the
subject based query is

41 / 50

41.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

42 / 50

42.

Among the
Greeks,earthquake is said
to be caused
by____________

43 / 50

43.

0ne type of the anti-virus
softwares in the market
today is_______

44 / 50

44.

The climatic change and
environment pollution in
Africa has increased
_________

45 / 50

45.

The act of having an
understanding of crime
distribution and information
about the demography is
known as

46 / 50

46.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

47 / 50

47.

The transportation of a
woman against her will for
ransom is labelled

48 / 50

48.

s a method through which
we analyse crime

49 / 50

49.

A hurricane is a type of
tropical ____________

50 / 50

50.

The type of demonstration
that can lead to the
breakdown of law and order
is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link