CSS241



Category: CSS241

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS241

1 / 50

1.

The word security
emanated from the Greek
word se-curari meaning ___
___

2 / 50

2.

_____ is a good tool in
information supping which
are used by both criminals
and law enforcement
agents

3 / 50

3.

It is very important to install
system,

4 / 50

4.

is usually involves
submerging of land by
overflowing water

5 / 50

5.

Anti-Virus designed
purposely to identify
_________

6 / 50

6.

The approaches of
securities are___ ___ ___

7 / 50

7.

lack of
has really undermined the
capacity of the police to
perform its functions

8 / 50

8.

________ is usually
involves submerging of land
by overflowing water

9 / 50

9.

One of the causes of job
stress is

10 / 50

10.

The following are the forms
of violence crimes except
pick the incorrect options

11 / 50

11.

Data mining can also be
described as the process of
patterns from data

12 / 50

12.

Job design is a principle of
management

13 / 50

13.

is the act of watching or
observing people or objects

14 / 50

14.

Approaches to Public
Relation Management in
security sectors are the
following except one.

15 / 50

15.

Data mining uses a tool that
makes use of automated
analysis techniques

16 / 50

16.

Research finding has
shown that couples that
both provide to the family
on equal terms experience
less incidence of

17 / 50

17.

___ ____ can be defined as
a means of protecting
information systems from
any illegitimate access and
uses, theft, amendment or
malicious attack

18 / 50

18.

___ ____ is usually
involves submerging of land
by overflowing water

19 / 50

19.

Earthquakes are recorded
with

20 / 50

20.

Simulation helps to reduce
the situation of crisis in
patients as stressed by
(2004)

21 / 50

21.

__________ is the
collection of intelligence
through the use of satellite
images

22 / 50

22.

Marxist theory is one of the
theories of crime control.

23 / 50

23.

is the form of violence
crime in which a person
carries out violence against
another person within the
same household?

24 / 50

24.

The school of thought in
theories of violence are the
following except one

25 / 50

25.

Simulation helps to reduce
the situation of crisis in
patients as stressed by
(2004)

26 / 50

26.

Nigeria has continued to
pose a huge
_risk to the country

27 / 50

27.

During the westphalia
period the treat security
usually involved____ ____

28 / 50

28.

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

29 / 50

29.

Identify one that is not the
theory of violence below

30 / 50

30.

After car jacking, one
should seek

31 / 50

31. War gaming is a

32 / 50

32.

________ can be defined
as a means of protecting
information systems from
any illegitimate access and
uses, theft, amendment or
malicious attack

33 / 50

33. Idealism; meaning ___

34 / 50

34.

Thomas Hobbes (1962)
argued that the essence of
a state is to guarantee the
___ ___ property and
ensure law

35 / 50

35.

Idealism, Pluralism and
Realism are some of
approaches of

36 / 50

36.

False _____ errors are
those errors that bother on
the possibility of wrongfully
labelling an innocent
person as a crime
suspect/criminal due to
mistakes in the result of our
automated data analysis.

37 / 50

37.

Both theories believe that
high birth rate is the major
source of violence or war
but their views are slightly
different from each othe

38 / 50

38.

___ is a type of tropical
cyclone which is a generic
term for a low pressure
system that generally forms
in the tropics

39 / 50

39.

is a methods which involves
one secretly listening to a
private conversation or
discussion

40 / 50

40.

The approaches of
securities are________

41 / 50

41.

Another safety tip is to have
a comprehensive
for your vehicle.

42 / 50

42.

Threats which can damage
infrastructure basically
include the following
except___ ___

43 / 50

43.

Microkenel can be
described as a computer
kernel that enables relevant

44 / 50

44.

____ are device that can
secretly hide information or
things, they look like
ordinary object

45 / 50

45.

Approaches to Public
Relation Management in
security sectors are the
following except one

46 / 50

46.

Affiliation and religion have
become fundamental
elements of post
Nigeria

47 / 50

47.

The following are the forms
of violence crimes except
______ pick the incorrect
options

48 / 50

48.

Which tool is used to
prevent any strange or
unintended person from
comprehending the content
of a message

49 / 50

49.

something which simulates
a system or environment in
order to predict actual
behaviour

50 / 50

50.

architecture is also a very
viable approach to
computer and information
security.

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link