CSS243



Category: CSS243

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS243

1 / 50

1.

Pluralist approach emerged
in the ________

2 / 50

2.

Operations are clandestine
or secret) ways of making
(illegitimate) entry into the
information facility (ies) of
any target party for
intelligence purpose(s)

3 / 50

3.

information from him/her
through infliction of extreme
physical pain.

4 / 50

4.

taught the whole world that
commercial planes could be
used as the

5 / 50

5.

OWVL stands for One-Way
Voice

6 / 50

6.

________ held that in some
cases, stress can be
desirable to both an
organization and individua
ls.

7 / 50

7.

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

8 / 50

8.

In asymmetric aggression,
most times, the weak
parties usually adopt _____
in the perpetuation of their
violent actions against the
enemy-party which is
actually stronger

9 / 50

9.

Human intelligence
(HUMINT) and Open
source intelligence (OSINT)
are ___________.

10 / 50

10.

One of these is not
protective discipline for
counter intelligence

11 / 50

11.

Couriers are support
personnel who assist the
in managing their
clandestine communication
by securing them (the
communications) against
enemy’s interceptions or
detection.

12 / 50

12.

_________ is that which
poses significant threat to
employee’s health and
consequently to the health
of an organization

13 / 50

13.

One of these is not an
element of compensation
and rewards

14 / 50

14.

Violence is often referred to
as a form of violence
involving child abuse, elder
abuse, and other form of
aggressive behavior
between two or more
people within the same
family or household

15 / 50

15.

General Adoption
Syndrome (GAS) describes
the stages an individual
encounters in stressful
conditions except one

16 / 50

16.

The business of spying is
structured in a
form

17 / 50

17.

__________ are device
that can secretly hide
information or things, they
look like ordinary object.

18 / 50

18.

Pillars of intelligence
Analysis are many but one
these is not included

19 / 50

19.

is not appropriate to
security management

20 / 50

20.

Intelligence personnel,
Government institutions,
Mass Media,
communication technology
e. t.c. are _________.

21 / 50

21.

One of these is not a
dimension of intelligence

22 / 50

22.

Identify the one that is not a
category of intelligence

23 / 50

23.

Counter intelligence aspect
draws its attention on
identifying vulnerable areas
in one’s intelligence
organization(s) which can
be explored by foreign
intelligence services (FIS).

24 / 50

24.

Intelligence tends to focus
basically on gathering,
analyzing, and evaluating
about the capabilities
vulnerabilities and aims of
foreign countries.

25 / 50

25.

________ approach
became popular in security
studies in the 1970s

26 / 50

26. are also known as assets

27 / 50

27.

LASNT stands for
intelligence.

28 / 50

28.

security management was
the unilateral function of the
state especially if we
consider the intellectual
view(s) of some political
theorists like

29 / 50

29.

_________ is the product
resulting from the
collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

30 / 50

30.

Measurement and
Signatures Intelligence
(MASINT) is scientific and
intelligence

31 / 50

31.

is illegal beating that may
lead to injuring another
person.

32 / 50

32.

Examples of ________
includes invisible ink,
chaffing and winnowing

33 / 50

33.

is a concept that has
attracted huge attention
among the scholars in
peace and conflict studies,
criminology and security
studies as well psychology.

34 / 50

34.

Identify the one that is not a
category of intelligence

35 / 50

35.

__________ approach was
a departure from the statecentered security system
that dominated the world
system during the early
cold war era.

36 / 50

36.

These are the methods of
performance appraisal
except one

37 / 50

37.

The out come of an
intelligence is the ______

38 / 50

38.

Getting information from a
criminal suspect is through
infliction of
physical pain

39 / 50

39.

The out come of an
intelligence is the

40 / 50

40.

Approaches to Public
Relation Management in
security sectors are the
following except one

41 / 50

41.

method of performance
appraisal or evaluation
mainly focuses on particular
behaviour or act of
employee (s) as it concerns
job performance.

42 / 50

42.

The set of people used for
espionage include all
except one

43 / 50

43.

Every employee has a role
to play in the actualization
of the ultimate
of the organization

44 / 50

44.

Private security is owned by
______

45 / 50

45.

Goal intelligence is not a
category of

46 / 50

46.

__________ is the
collection of intelligence
through the use of satellite
images

47 / 50

47.

Choose the one that is not
appropriates to security
management

48 / 50

48.

The use of satellite images
for the collection of
intelligence is _________

49 / 50

49.

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

50 / 50

50.

________ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link