CSS243



Category: CSS243

0

CSS243

1 / 70

1.

The 9/11 terrorist incident
took place in the

2 / 70

2.

Intelligence tends to focus
basically on gathering,
analyzing, and evaluating
about the capabilities
vulnerabilities and aims of
foreign countries.

3 / 70

3.

________ Stage describes
the phase where the
individual’s defense
mechanism becomes
active.

4 / 70

4.

is the product resulting from
the collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

5 / 70

5.

is not appropriate to
security management

6 / 70

6.

The process of gathering
and assembling information
through several methods
for the purpose of
production intelligence is
______

7 / 70

7.

The technical forms of
intelligence disciplines
include the following except
one

8 / 70

8.

taught the whole world that
commercial planes could be
used as the

9 / 70

9.

Approaches to Public
Relation Management in
security sectors are the
following except one

10 / 70

10.

Examples of ________
includes invisible ink,
chaffing and winnowing

11 / 70

11.

Traditionally,
management was the
unilateral function of the
state.

12 / 70

12.

is illegal beating that may
lead to injuring another
person.

13 / 70

13.

In combating crime, several
countries have formed ____
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

14 / 70

14.

Choose the one that is not
appropriates to security
management

15 / 70

15.

are those that voluntarily
gives information to law
enfprcement agaents.

16 / 70

16.

The set of people used for
espionage include all
except one

17 / 70

17.

Theory was popularized by
Paul and Patricia
Brantingham in the 1980s.

18 / 70

18.

Counter
involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

19 / 70

19.

Choose the one that is not
appropriate to security
management

20 / 70

20.

security management was
the unilateral function of the
state especially if we
consider the intellectual
view(s) of some political
theorists like

21 / 70

21.

The features of job
description includes but one

22 / 70

22.

Violence is often referred to
as a form of violence
involving child abuse, elder
abuse, and other form of
aggressive behavior
between two or more
people within the same
family or household

23 / 70

23.

On the Job training is form
of training acquired
simultaneously as the
security personnel carry –
out their duties

24 / 70

24.

is not a category of
intelligence

25 / 70

25.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

26 / 70

26.

operation are often targeted
towards collecting strategic
information for intelligence
purpose

27 / 70

27.

information from him/her
through infliction of extreme
physical pain.

28 / 70

28.

Fire is one of the causes of
traumatic disorder

29 / 70

29.

_________ is that which
poses significant threat to
employee’s health and
consequently to the health
of an organization

30 / 70

30.

Non coercion or Non-violent
is the approach of ____.

31 / 70

31.

Getting information from a
criminal suspect is through
infliction of
physical pain

32 / 70

32.

Theory believed that
violence was inherent in
mankind, meaning that
aggression formed part of
human nature.

33 / 70

33.

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

34 / 70

34.

is a structured conversation
designed to achieve a
purpose. The purpose
ranges from (ordinary)
information research job
offer.

35 / 70

35.

________ is the scheduling
system of work, which
impinges excessive
physical and psychological
costs to the worker

36 / 70

36.

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

37 / 70

37.

Crime has become
alternative route through
which people can meet
their needs

38 / 70

38.

Security is type of security
which involves protecting
every individual from any
physical violence.

39 / 70

39.

intelligence enables us to
appreciate the need to look
at intelligence from dual
perspective: our strengths
and vulnerabilities or
weaknesses

40 / 70

40.

Physical Security is the
duty of
services to ensure
protection of their physical
infrastructure against
attacks by enemies that
operate within and outside.

41 / 70

41.

Identify the one that is not a
category of intelligence

42 / 70

42.

Intelligence personnel,
Government institutions,
Mass Media,
communication technology
e. t.c. are _________.

43 / 70

43.

According to _________
approach, economic factors
and struggle for the control
of State resources are the
bases for security relations
among states

44 / 70

44.

________ approach
became popular in security
studies in the 1970s

45 / 70

45.

has become alternative
route through which people
can meet their needs?

46 / 70

46.

General Adoption
Syndrome (GAS) describes
the stages an individual
encounters in stressful
conditions except one

47 / 70

47.

Couriers are support
personnel who assist the
in managing their
clandestine communication
by securing them (the
communications) against
enemy’s interceptions or
detection.

48 / 70

48.

________the systematic
assessment of job in
relation to strengths and
weaknesses of any
employee or group of
employees.

49 / 70

49.

Analysis is the process
through which security
organization (or any other
organization) gives a
detailed explanation and
catalogue of the purposes,
expectations, duties,
fetures, behaviours and
relevant skills that a
particular job evokes on the
job-seekers.

50 / 70

50.

Identify the one that is not a
category of intelligence

51 / 70

51.

Private security is owned by
______

52 / 70

52.

Intelligence
can be described as a
process of gathering and
assembling information
through several methods
for the purpose of
producing intelligence

53 / 70

53.

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence.

54 / 70

54.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

55 / 70

55.

taught the whole world that
commercial planes could be
used as the

56 / 70

56.

Approach to security
management was a
departure from the statecentered security system
that dominated the world
system during the early
cold era.

57 / 70

57. are also known as assets

58 / 70

58.

Espionage usually involves
the art of
or secretly collecting
information through the use
of human sources

59 / 70

59.

In his model of cycle of
violence, Lenore Walker
presented
to explain the impact that a
domestic violence will have
on the relationship between
the perpetrator and victim.

60 / 70

60.

n combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

61 / 70

61.

is not appropriate to
security management

62 / 70

62.

involves putting questions
to person(s) with the aim

63 / 70

63.

intelligence is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

64 / 70

64.

method of performance
appraisal or evaluation
mainly focuses on particular
behaviour or act of
employee (s) as it concerns
job performance.

65 / 70

65.

The scope of the
does not include making of
arrest of armed robbers or
terrorists or homicide
suspect but only to arrest
and prosecute the
offenders of economic and
financial crimes like money
laundering, stealing of
public funds among others

66 / 70

66.

______ is basically that
violent struggle between
two or more state/non state
actors, or groups of actors,
who possess a
considerable level of
unequal relation in the
power equilibrium.

67 / 70

67.

The element of staffing are
the following except one

68 / 70

68.

The methods of
interrogation includes the
following except one .Pick
the odd one

69 / 70

69.

NUCINT Stand for
_________

70 / 70

70.

Pillars of intelligence
Analysis are many but one
of these is not included

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link