CSS246



Category: CSS246

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS246

1 / 50

1.

Private security personnel and
are
fundamental to the successful governance
of the company.

2 / 50

2.

Blasting and carrying away of the entire
safe are the methods most commonly used
by

3 / 50

3.

A critical on-site examination to ascertain
the present security status, identity deficits
or excess, determine the protection need
and make _________ recommendations to
immprove the overall security of the
operation

4 / 50

4.

Private Security Companies serve as an
additional _____________ Resource in the
fight against crime

5 / 50

5.

The private security addresses the ability
or neglect of the
_to provide
protection for its citizens

6 / 50

6.

The security of hardware and its
componenets are essential for the overall

7 / 50

7.

Act (Cap 367) of
Guides the
licensing, control and adminstration adn
prohibited activities offences and penalties
rregarding PGCs.

8 / 50

8.

These specific and confused forms are
counterfeiting,
and bootlegging

9 / 50

9.

As Stemming (1988) argues for the
commercial user of private security, any
policing strategy must be proven

10 / 50

10. CCTV means_____________

11 / 50

11.

External threat to security resulting from
inetrnatiional hostilities and aggression that
characterized the cold war era has been
replaced with

12 / 50

12.

The structure of a security business must
be consistent with its

13 / 50

13. Spying is also referred to as

14 / 50

14.

One of the problems facing private security
guards in Nigeria is __________

15 / 50

15.

In direct response to the government's
decision to increase the licence fees for
guarding companies, other assocications
were founded in

16 / 50

16.

The oldest of these private security
associations is

17 / 50

17.

The computer program that replicate
themselves and harm the computer system
on a network without the knowledge of the
system is called

18 / 50

18.

The type of conflict that arises in a dyadic
relationship is known as ____________

19 / 50

19.

___________is essentially an exhaustive
physical examination of the premises and a
thorough inpsection of all operational
systems and procedures

20 / 50

20.

Security checklist is usually the backbone
of the security

21 / 50

21.

This trend has been followed in
_____________especially where the state
lack the technical know-how so far as
security matters are concerned.

22 / 50

22.

According to the National Legal Systems
'regular' private security guards operate
under governance of the ministry of

23 / 50

23.

__generally
refers to the security departments that exist
within businesses or corporations

24 / 50

24.

Risk management are principally
concerned with the protection and
conservation of corporate

25 / 50

25.

Private security personnel are in reality not
different from ordinary

26 / 50

26. One of the operationalization of riskmanagement alternatives include

27 / 50

27.

Generally human insecurity has been one
of the major factors that have been a
serious threat to

28 / 50

28.

Cognitive strategies of coflict management
is otherwise called _____________

29 / 50

29. PGCs stands for

30 / 50

30.

Private security officer is required to make
arrest

31 / 50

31.

A second critieria for obtaining license to
perform private guarding activities is

32 / 50

32.

Magna Carta of England (1215), the United
State Declaration of Independence (1776),
the French Declaration of the Rights of
man and the citizen (1789), the American
Bills of Rights and the Universal
Declaration of Human Rights are all
connected to the struggle for

33 / 50

33.

In Nigreia, the private guards act of 1986
prohibits privae security companies from

34 / 50

34.

private security companies
_____________ Serve as sources of
intelligence gathering

35 / 50

35.

Example of critical infrastructure include
___________

36 / 50

36.

Armoured car guards usually protect
_____________And_____________During
transit

37 / 50

37.

The first private security outfit providing
uniformed guards in Nigeria is

38 / 50

38.

The legal powers, rights and
_of private
security personnel are obscurely and
confusingly located across a range of fields

39 / 50

39.

is the
retention of decision-making authority by a
high-level manager

40 / 50

40.

The concept of risk management allows
risks to be handled in a _____________
Manner using long held management
principles

41 / 50

41.

Sources of conflict in an organization is
divided into 3, these are structural conflict,
role conflict and ___________

42 / 50

42.

The recomendation of licensing of PSC
has to be made by

43 / 50

43.

On the other hand, delegating jobs
increases the need for
managerial_____________ and
_____________

44 / 50

44.

The framework of jobs and departments
that make up any organization must be
directed towards achieving the
organization's

45 / 50

45.

Using technologically advanced listening
devices, eaves dropping can be done on
traditional telephone lines and even
satellite
networks.

46 / 50

46.

The first private security company
providing uniformed guards in Nigeria was
established in the year

47 / 50

47.

Self defence, crime combat, escort/public
security are some of the arguements for
the carriage of arms by
gaurds

48 / 50

48.

A good hybrid system consists of
_Components

49 / 50

49.

A crucial element of security management
is coordinating the many
_____________Within and outside the firm
so that the organizationn runs smoothly

50 / 50

50.

One of the basic criteria for obtaining
license to perform private guarding
activities is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link