ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
is not a category of intelligence
2 / 50
Approaches to Public Relation Management in security sectors are the following except one
3 / 50
OSINT stands for Source Intelligence.
4 / 50
_________ is that which poses significant threat to employee’s health and consequently to the health of an organization
5 / 50
_________ is a structured conversation designed to achieve a purpose
6 / 50
Theory believed that violence was inherent in mankind, meaning that aggression formed part of human nature.
7 / 50
Offensive Counter intelligence include all activities that are targeted towards arresting the mischief of the enemyparties.
8 / 50
In his model of cycle of violence, Lenore Walker presented to explain the impact that a domestic violence will have on the relationship between the perpetrator and victim.
9 / 50
The methods of interrogation includes the following except one .Pick the odd one
10 / 50
________ Stage describes the phase where the individual’s defense mechanism becomes active.
11 / 50
Analysis is the process through which security organization (or any other organization) gives a detailed explanation and catalogue of the purposes, expectations, duties, fetures, behaviours and relevant skills that a particular job evokes on the job-seekers.
12 / 50
_________ taught the whole world that commercial planes could be used as terrorist target
13 / 50
Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence.
14 / 50
In combating crime, several countries have formed community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
15 / 50
is a kind of intelligence activity or function carried out by the relevant service or intelligence agency to provide evidence in support of prosecution of any criminal suspects.
16 / 50
Counter intelligence aspect draws its attention on identifying vulnerable areas in one’s intelligence organization(s) which can be explored by foreign intelligence services (FIS).
17 / 50
The technical forms of intelligence disciplines include the following except one
18 / 50
is not appropriate to security management
19 / 50
This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security
20 / 50
________ held that in some cases, stress can be desirable to both an organization and individua ls.
21 / 50
Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence
22 / 50
method of performance appraisal or evaluation mainly focuses on particular behaviour or act of employee (s) as it concerns job performance.
23 / 50
Traumatic disorder are caused by the following except one
24 / 50
is a process of gathering and assembling information through several methods for the purpose of production intelligence.
25 / 50
Fire is one of the causes of traumatic disorder
26 / 50
According to _________ approach, economic factors and struggle for the control of State resources are the bases for security relations among states
27 / 50
is illegal beating that may lead to injuring another person.
28 / 50
______ symbolized protection from the threat of disease, hunger, unemployed, crime, social conflict, Political repression and environment hazard.
29 / 50
are those that voluntarily gives information to law enfprcement agaents.
30 / 50
Traumatic stress disorder happens as a result of __________
31 / 50
______ is basically that violent struggle between two or more state/non state actors, or groups of actors, who possess a considerable level of unequal relation in the power equilibrium.
32 / 50
The major difference between private secuirty and publicsecurity is the possession of ____
33 / 50
The jounces of intelligence are many to include the following except one
34 / 50
Non coercion or Non-violent is the approach of ____.
35 / 50
Operations are clandestine or secret) ways of making (illegitimate) entry into the information facility (ies) of any target party for intelligence purpose(s)
36 / 50
information from him/her through infliction of extreme physical pain.
37 / 50
Tactical Intelligence involves devolution of responsibility among the hierarchy of personnel in an intelligence service such that information are collected, collated, analyzed and evaluated for the use by the or top management for short term policy agenda
38 / 50
The out come of an intelligence is the ______
39 / 50
Every employee has a role to play in the actualization of the ultimate of the organization
40 / 50
ACOUSTINT Stand for _________
41 / 50
Theory was popularized by Paul and Patricia Brantingham in the 1980s.
42 / 50
are device that can secretly hide information or things, they look like ordinary object
43 / 50
In combating crime, several countries have formed ____ community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations
44 / 50
The process of gathering and assembling information through several methods for the purpose of production intelligence is ______
45 / 50
Traditionally, management was the unilateral function of the state.
46 / 50
The features of job description includes but one
47 / 50
The set of people used for espionage include all except one
48 / 50
________ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
49 / 50
management is hat part of management concerned with people at work and with their relationship within an enterprise.
50 / 50
Choose the one that is not appropriates to security management
Restart quiz
Rate this quiz