CSS243
1 / 70
Private security is owned by ______
2 / 70
SWOT analysis stands for Strength, Opportunity, and Threat.
3 / 70
Pluralist approach emerged in the ________
4 / 70
is not appropriate to security management
5 / 70
_________ is that which poses significant threat to employee’s health and consequently to the health of an organization
6 / 70
involve collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
7 / 70
________ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
8 / 70
involves putting questions to person(s) with the aim
9 / 70
In asymmetric aggression, most times, the weak parties usually adopt _____ in the perpetuation of their violent actions against the enemy-party which is actually stronger
10 / 70
Human intelligence (HUMINT) and Open source intelligence (OSINT) are ___________.
11 / 70
is a concept that has attracted huge attention among the scholars in peace and conflict studies, criminology and security studies as well psychology.
12 / 70
Offensive Counter intelligence include all activities that are targeted towards arresting the mischief of the enemyparties.
13 / 70
This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
14 / 70
_________ taught the whole world that commercial planes could be used as the
15 / 70
Traumatic stress disorder happens as a result of __________
16 / 70
Approach to security management was a departure from the statecentered security system that dominated the world system during the early cold era.
17 / 70
_________ is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
18 / 70
LASNT stands for intelligence.
19 / 70
is unwanted sexual activity like touching some sensitive parts of the victim.
20 / 70
Approaches to Public Relation Management in security sectors are the following except one
21 / 70
Theory was popularized by Paul and Patricia Brantingham in the 1980s.
22 / 70
This is the kind of intelligence carried out in support of prosecution of any criminal suspects
23 / 70
__________ are device that can secretly hide information or things, they look like ordinary object.
24 / 70
Traumatic disorder are caused by the following except one
25 / 70
Identify the one that is not a category of intelligence
26 / 70
NUCINT Stand for _________
27 / 70
__________ is the collection of intelligence through the use of satellite images
28 / 70
MASINT stands for measurement and intelligence.
29 / 70
In combating crime, several countries have formed community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
30 / 70
In phase, there is tension freezing; the atmosphere is rented with affection, apology, and end to the violence.
31 / 70
___________ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
32 / 70
In combating crime, several countries have formed ____ community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
33 / 70
______ is basically that violent struggle between two or more state/non state actors, or groups of actors, who possess a considerable level of unequal relation in the power equilibrium.
34 / 70
are device that can secretly hide information or things, they look like ordinary object
35 / 70
Pillars of intelligence Analysis are many but one these is not included
36 / 70
________ is the scheduling system of work, which impinges excessive physical and psychological costs to the worker
37 / 70
_________ is a structured conversation designed to achieve a purpose
38 / 70
Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence
39 / 70
operation are often targeted towards collecting strategic information for intelligence purpose
40 / 70
Non coercion or Non-violent is the approach of ____.
41 / 70
42 / 70
The following are causes of job stress excep
43 / 70
________ approach became popular in security studies in the 1970s
44 / 70
Security is type of security which involves protecting every individual from any physical violence.
45 / 70
OWVL stands for One-Way Voice
46 / 70
_is a form of violent crime, which involves unlawful attack aimed at causing bodily injury to another party or person.
47 / 70
At the ________ Stage, the body respond when it becomes aware of stress or threat.
48 / 70
General Adoption Syndrome (GAS) describes the stages an individual encounters in stressful conditions except one
49 / 70
is a process of interrogating a person (suspect) to getting information
50 / 70
IMINT stands for of Intelligence.
51 / 70
An approach to security which advocates for more cultural understanding to security studies is
52 / 70
Choose the one that does not belong to the type of training
53 / 70
Measurement and Signatures Intelligence (MASINT) is scientific and intelligence
54 / 70
The following are causes of job stress except
55 / 70
information from him/her through infliction of extreme physical pain.
56 / 70
The jounces of intelligence are many to include the following except one
57 / 70
Every employee has a role to play in the actualization of the ultimate of the organization
58 / 70
Pillars of intelligence Analysis are many but one of these is not included
59 / 70
The out come of an intelligence is the ___________
60 / 70
_________ taught the whole world that commercial planes could be used as terrorist target
61 / 70
62 / 70
________ held that in some cases, stress can be desirable to both an organization and individua ls.
63 / 70
64 / 70
are those that voluntarily gives information to law enfprcement agaents.
65 / 70
taught the whole world that commercial planes could be used as the
66 / 70
is not a category of intelligence
67 / 70
Operations are clandestine or secret) ways of making (illegitimate) entry into the information facility (ies) of any target party for intelligence purpose(s)
68 / 70
Another source of domestic violence is social
69 / 70
Physical Security is the duty of services to ensure protection of their physical infrastructure against attacks by enemies that operate within and outside.
70 / 70
theorists blame human aggression or war situation on a disparity between the numbers of well educated, well fed, angry "fighting age" young males and the number of positions available to them in society as a primary source of violence
Restart quiz
Rate this quiz