ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
2 / 50
________ approach became popular in security studies in the 1970s
3 / 50
Human intelligence (HUMINT) and Open source intelligence (OSINT) are ___________.
4 / 50
Counter intelligence aspect draws its attention on identifying vulnerable areas in one’s intelligence organization(s) which can be explored by foreign intelligence services (FIS).
5 / 50
are device that can secretly hide information or things, they look like ordinary object
6 / 50
This is the kind of intelligence carried out in support of prosecution of any criminal suspects
7 / 50
Fire is one of the causes of traumatic disorder
8 / 50
The jounces of intelligence are many to include the following except one
9 / 50
Every employee has a role to play in the actualization of the ultimate of the organization
10 / 50
Choose the one that is not appropriate to security management
11 / 50
Traumatic stress disorder happens as a result of __________
12 / 50
Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence.
13 / 50
Security is type of security which involves protecting every individual from any physical violence.
14 / 50
Identify the one that is not a category of intelligence
15 / 50
The features of job description includes but one
16 / 50
17 / 50
taught the whole world that commercial planes could be used as the
18 / 50
is a good tool in information supping which are used by both criminals and law enforcement agents
19 / 50
In his model of cycle of violence, Lenore Walker presented to explain the impact that a domestic violence will have on the relationship between the perpetrator and victim.
20 / 50
OWVL stands for One-Way Voice
21 / 50
________the systematic assessment of job in relation to strengths and weaknesses of any employee or group of employees.
22 / 50
________ Stage describes the phase where the individual’s defense mechanism becomes active.
23 / 50
The technical forms of intelligence disciplines include the following except one
24 / 50
Pillars of intelligence Analysis are many but one these is not included
25 / 50
In phase, there is tension freezing; the atmosphere is rented with affection, apology, and end to the violence.
26 / 50
__________ involves collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
27 / 50
has become alternative route through which people can meet their needs?
28 / 50
Intelligence personnel, Government institutions, Mass Media, communication technology e. t.c. are _________.
29 / 50
is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
30 / 50
In combating crime, several countries have formed ____ community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
31 / 50
involve collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
32 / 50
Theory of violence is of the view that violence is a function of class struggle.
33 / 50
The scope of the does not include making of arrest of armed robbers or terrorists or homicide suspect but only to arrest and prosecute the offenders of economic and financial crimes like money laundering, stealing of public funds among others
34 / 50
___________ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
35 / 50
One of these is not a dimension of intelligence
36 / 50
According to _________ approach, economic factors and struggle for the control of State resources are the bases for security relations among states
37 / 50
________ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
38 / 50
Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence.
39 / 50
is a kind of intelligence activity or function carried out by the relevant service or intelligence agency to provide evidence in support of prosecution of any criminal suspects.
40 / 50
______ is basically that violent struggle between two or more state/non state actors, or groups of actors, who possess a considerable level of unequal relation in the power equilibrium.
41 / 50
42 / 50
Physical Security is the duty of services to ensure protection of their physical infrastructure against attacks by enemies that operate within and outside.
43 / 50
The business of spying is structured in a form
44 / 50
The following are causes of job stress except
45 / 50
In contemporary times, definition of security goes beyond the traditional ways of protecting the state against internal and external aggression.
46 / 50
is a structured conversation designed to achieve a purpose. The purpose ranges from (ordinary) information research job offer.
47 / 50
Pluralist approach emerged in the ________
48 / 50
OSINT stands for Source Intelligence.
49 / 50
The element of staffing are the following except one
50 / 50
are those that voluntarily gives information to law enfprcement agaents.
Restart quiz
Rate this quiz