CSS243



Category: CSS243

0

CSS243

1 / 70

1.

Private security is owned by
______

2 / 70

2.

SWOT analysis stands for
Strength,
Opportunity, and Threat.

3 / 70

3.

Pluralist approach emerged
in the ________

4 / 70

4.

is not appropriate to
security management

5 / 70

5.

_________ is that which
poses significant threat to
employee’s health and
consequently to the health
of an organization

6 / 70

6.

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

7 / 70

7.

________ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

8 / 70

8.

involves putting questions
to person(s) with the aim

9 / 70

9.

In asymmetric aggression,
most times, the weak
parties usually adopt _____
in the perpetuation of their
violent actions against the
enemy-party which is
actually stronger

10 / 70

10.

Human intelligence
(HUMINT) and Open
source intelligence (OSINT)
are ___________.

11 / 70

11.

is a concept that has
attracted huge attention
among the scholars in
peace and conflict studies,
criminology and security
studies as well psychology.

12 / 70

12.

Offensive Counter
intelligence
include all activities that are
targeted towards arresting
the mischief of the enemyparties.

13 / 70

13.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

14 / 70

14.

_________ taught the
whole world that
commercial planes could be
used as the

15 / 70

15.

Traumatic stress disorder
happens as a result of
__________

16 / 70

16.

Approach to security
management was a
departure from the statecentered security system
that dominated the world
system during the early
cold era.

17 / 70

17.

_________ is the product
resulting from the
collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

18 / 70

18.

LASNT stands for
intelligence.

19 / 70

19.

is unwanted sexual activity
like touching some
sensitive parts of the victim.

20 / 70

20.

Approaches to Public
Relation Management in
security sectors are the
following except one

21 / 70

21.

Theory was popularized by
Paul and Patricia
Brantingham in the 1980s.

22 / 70

22.

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

23 / 70

23.

__________ are device
that can secretly hide
information or things, they
look like ordinary object.

24 / 70

24.

Traumatic disorder are
caused by the following
except one

25 / 70

25.

Identify the one that is not a
category of intelligence

26 / 70

26.

NUCINT Stand for
_________

27 / 70

27.

__________ is the
collection of intelligence
through the use of satellite
images

28 / 70

28.

MASINT stands for
measurement and
intelligence.

29 / 70

29.

In combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

30 / 70

30.

In
phase, there is tension
freezing; the atmosphere is
rented with affection,
apology, and end to the
violence.

31 / 70

31.

___________ involves
putting questions to
persons with the aim of
getting information which
can help, which can aid
intelligence

32 / 70

32.

In combating crime, several
countries have formed ____
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

33 / 70

33.

______ is basically that
violent struggle between
two or more state/non state
actors, or groups of actors,
who possess a
considerable level of
unequal relation in the
power equilibrium.

34 / 70

34.

are device that can secretly
hide information or things,
they look like ordinary
object

35 / 70

35.

Pillars of intelligence
Analysis are many but one
these is not included

36 / 70

36.

________ is the scheduling
system of work, which
impinges excessive
physical and psychological
costs to the worker

37 / 70

37.

_________ is a structured
conversation designed to
achieve a purpose

38 / 70

38.

Intelligence
can be described as a
process of gathering and
assembling information
through several methods
for the purpose of
producing intelligence

39 / 70

39.

operation are often targeted
towards collecting strategic
information for intelligence
purpose

40 / 70

40.

Non coercion or Non-violent
is the approach of ____.

41 / 70

41.

Identify the one that is not a
category of intelligence

42 / 70

42.

The following are causes of
job stress excep

43 / 70

43.

________ approach
became popular in security
studies in the 1970s

44 / 70

44.

Security is type of security
which involves protecting
every individual from any
physical violence.

45 / 70

45.

OWVL stands for One-Way
Voice

46 / 70

46.

_is a form of violent crime,
which involves unlawful
attack aimed at causing
bodily injury to another
party or person.

47 / 70

47.

At the ________ Stage, the
body respond when it
becomes aware of stress or
threat.

48 / 70

48.

General Adoption
Syndrome (GAS) describes
the stages an individual
encounters in stressful
conditions except one

49 / 70

49.

is a process of interrogating
a person (suspect) to
getting information

50 / 70

50.

IMINT stands for
of Intelligence.

51 / 70

51.

An approach to security
which advocates for more
cultural understanding to
security studies is

52 / 70

52.

Choose the one that does
not belong to the type of
training

53 / 70

53.

Measurement and
Signatures Intelligence
(MASINT) is scientific and
intelligence

54 / 70

54.

The following are causes of
job stress except

55 / 70

55.

information from him/her
through infliction of extreme
physical pain.

56 / 70

56.

The jounces of intelligence
are many to include the
following except one

57 / 70

57.

Every employee has a role
to play in the actualization
of the ultimate
of the organization

58 / 70

58.

Pillars of intelligence
Analysis are many but one
of these is not included

59 / 70

59.

The out come of an
intelligence is the
___________

60 / 70

60.

_________ taught the
whole world that
commercial planes could be
used as terrorist target

61 / 70

61.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

62 / 70

62.

________ held that in some
cases, stress can be
desirable to both an
organization and individua
ls.

63 / 70

63.

is not appropriate to
security management

64 / 70

64.

are those that voluntarily
gives information to law
enfprcement agaents.

65 / 70

65.

taught the whole world that
commercial planes could be
used as the

66 / 70

66.

is not a category of
intelligence

67 / 70

67.

Operations are clandestine
or secret) ways of making
(illegitimate) entry into the
information facility (ies) of
any target party for
intelligence purpose(s)

68 / 70

68.

Another source of domestic
violence is social

69 / 70

69.

Physical Security is the
duty of
services to ensure
protection of their physical
infrastructure against
attacks by enemies that
operate within and outside.

70 / 70

70.

theorists blame human
aggression or war situation
on a disparity between the
numbers of well educated,
well fed, angry "fighting
age" young males and the
number of positions
available to them in society
as a primary source of
violence

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link