ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS241
1 / 50
During the westphalia period the treat security usually involves
2 / 50
Approaches to Public Relation Management in security sectors are the following except one.
3 / 50
usually involvos submerging of land by overflowing water
4 / 50
s a refined, analysed and evaluated information data gathered through either over (open) or clandestine (secret) means or both
5 / 50
____ ___ can be described as that aspect of security designed purposely to provide protection for specific purposely to provide protection for specific infrastructure particularly those infrastructure considered critical
6 / 50
The following are the forms of violence crimes except pick the incorrect options
7 / 50
___________ is also known as war-gaming.
8 / 50
Hurricane entail sea surface temperatures of at least
9 / 50
_______ is the crime of seizing property through violence or intimidation
10 / 50
Non traditional security threats includes one
11 / 50
usually involves submerging of land by overflowing water
12 / 50
The situation of domestic violence is rampant among the families where one of the partners indulges in very high consumption of ___ ___
13 / 50
Identify the one that is not types of security
14 / 50
Affiliation and religion have become fundamental elements of post ____ Nigeria
15 / 50
threats are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset
16 / 50
querries involve conducting our investigation by moving from unknown to known
17 / 50
Nigeria has continued to pose a huge _risk to the country
18 / 50
Avoid looking at the robbers on the face so as to avoid the issue of threat of
19 / 50
s a type of tropical cyclone which is a generic term for a low pressure system that generally forms in the tropics
20 / 50
Microkenel can be described as a computer kernel that enables relevant
21 / 50
After robbery, you should call the
22 / 50
23 / 50
The word security emanated from the Greek word se-curari meaning
24 / 50
usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats.
25 / 50
__________ is the collection of intelligence through the use of satellite images
26 / 50
___ ____ is usually involves submerging of land by overflowing water
27 / 50
__________ Simulation affords health care providers an opportunity to examine their capacity to respond to emergency situations.
28 / 50
___ something which simulates a system or environment in order to predict actual behaviour
29 / 50
The following are the proponent s of the youth bulge theory except one
30 / 50
can be described as a tool designed to find previously unknown knowledge through links, associations, and patterns in data
31 / 50
The following account for the causes of domestic violence except one
32 / 50
Identify one that is not the theory of violence below
33 / 50
terrorism is a ________ term.
34 / 50
___ ____ are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset
35 / 50
________ can be defined as a means of protecting information systems from any illegitimate access and uses, theft, amendment or malicious attack
36 / 50
_____ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
37 / 50
something which simulates a system or environment in order to predict actual behaviour
38 / 50
39 / 50
False _____ errors are those errors that bother on the possibility of wrongfully labelling an innocent person as a crime suspect/criminal due to mistakes in the result of our automated data analysis.
40 / 50
___ ___ is a place that involves an aspect of transportation
41 / 50
Thomas Hobbes (1962) who argued that the essence of a state is to guarantee the ___ ___ property and ensure law
42 / 50
The approaches of securities are___ ___ ___
43 / 50
crisis in North Nigerian states where some antiWestern education Muslim fanatics engaged security agents in bloody battle is called ___ ___
44 / 50
During the westphalia period the treat security usually involved____ ____
45 / 50
45. War gaming is a ___ ___
46 / 50
believes that the best way through which we can control crime is to examine the nature of the crime the conditions that produces such crimes as well as the impact of the crimes
47 / 50
Anti-Virus designed purposely to identify _________
48 / 50
__ has become alternative route through which people can meet their needs?
49 / 50
Individual can carry out a just violence if the Government is
50 / 50
____ are spies used in espionage intelligence collection
Restart quiz
Rate this quiz