CSS243



Category: CSS243

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS243

1 / 50

1.

is not a category of
intelligence

2 / 50

2.

Approaches to Public
Relation Management in
security sectors are the
following except one

3 / 50

3.

OSINT stands for
Source Intelligence.

4 / 50

4.

_________ is that which
poses significant threat to
employee’s health and
consequently to the health
of an organization

5 / 50

5.

_________ is a structured
conversation designed to
achieve a purpose

6 / 50

6.

Theory believed that
violence was inherent in
mankind, meaning that
aggression formed part of
human nature.

7 / 50

7.

Offensive Counter
intelligence
include all activities that are
targeted towards arresting
the mischief of the enemyparties.

8 / 50

8.

In his model of cycle of
violence, Lenore Walker
presented
to explain the impact that a
domestic violence will have
on the relationship between
the perpetrator and victim.

9 / 50

9.

The methods of
interrogation includes the
following except one .Pick
the odd one

10 / 50

10.

________ Stage describes
the phase where the
individual’s defense
mechanism becomes
active.

11 / 50

11.

Analysis is the process
through which security
organization (or any other
organization) gives a
detailed explanation and
catalogue of the purposes,
expectations, duties,
fetures, behaviours and
relevant skills that a
particular job evokes on the
job-seekers.

12 / 50

12.

_________ taught the
whole world that
commercial planes could be
used as terrorist target

13 / 50

13.

Approach to security
management opine that
security can best be
managed through noncoercive or non-violence
process, owing to the fact
that violence would only
give birth to further
violence.

14 / 50

14.

In combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

15 / 50

15.

is a kind of intelligence
activity or function carried
out by the relevant service
or intelligence agency to
provide evidence in support
of prosecution of any
criminal suspects.

16 / 50

16.

Counter intelligence aspect
draws its attention on
identifying vulnerable areas
in one’s intelligence
organization(s) which can
be explored by foreign
intelligence services (FIS).

17 / 50

17.

The technical forms of
intelligence disciplines
include the following except
one

18 / 50

18.

is not appropriate to
security management

19 / 50

19.

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

20 / 50

20.

________ held that in some
cases, stress can be
desirable to both an
organization and individua
ls.

21 / 50

21.

Intelligence
can be described as a
process of gathering and
assembling information
through several methods
for the purpose of
producing intelligence

22 / 50

22.

method of performance
appraisal or evaluation
mainly focuses on particular
behaviour or act of
employee (s) as it concerns
job performance.

23 / 50

23.

Traumatic disorder are
caused by the following
except one

24 / 50

24.

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence.

25 / 50

25.

Fire is one of the causes of
traumatic disorder

26 / 50

26.

According to _________
approach, economic factors
and struggle for the control
of State resources are the
bases for security relations
among states

27 / 50

27.

is illegal beating that may
lead to injuring another
person.

28 / 50

28.

______ symbolized
protection from the threat of
disease, hunger,
unemployed, crime, social
conflict, Political repression
and environment hazard.

29 / 50

29.

are those that voluntarily
gives information to law
enfprcement agaents.

30 / 50

30.

Traumatic stress disorder
happens as a result of
__________

31 / 50

31.

______ is basically that
violent struggle between
two or more state/non state
actors, or groups of actors,
who possess a
considerable level of
unequal relation in the
power equilibrium.

32 / 50

32.

The major difference
between private secuirty
and publicsecurity is the
possession of ____

33 / 50

33.

The jounces of intelligence
are many to include the
following except one

34 / 50

34.

Non coercion or Non-violent
is the approach of ____.

35 / 50

35.

Operations are clandestine
or secret) ways of making
(illegitimate) entry into the
information facility (ies) of
any target party for
intelligence purpose(s)

36 / 50

36.

information from him/her
through infliction of extreme
physical pain.

37 / 50

37.

Tactical Intelligence
involves devolution of
responsibility among the
hierarchy of personnel in an
intelligence service such
that information are
collected, collated,
analyzed and evaluated for
the use by the
or top management for
short term policy agenda

38 / 50

38.

The out come of an
intelligence is the ______

39 / 50

39.

Every employee has a role
to play in the actualization
of the ultimate
of the organization

40 / 50

40.

ACOUSTINT Stand for
_________

41 / 50

41.

Theory was popularized by
Paul and Patricia
Brantingham in the 1980s.

42 / 50

42.

are device that can secretly
hide information or things,
they look like ordinary
object

43 / 50

43.

In combating crime, several
countries have formed ____
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

44 / 50

44.

The process of gathering
and assembling information
through several methods
for the purpose of
production intelligence is
______

45 / 50

45.

Traditionally,
management was the
unilateral function of the
state.

46 / 50

46.

The features of job
description includes but one

47 / 50

47.

The set of people used for
espionage include all
except one

48 / 50

48.

________ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

49 / 50

49.

management is hat part of
management concerned
with people at work and
with their relationship within
an enterprise.

50 / 50

50.

Choose the one that is not
appropriates to security
management

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link