ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS243
1 / 50
Pluralist approach emerged in the ________
2 / 50
Operations are clandestine or secret) ways of making (illegitimate) entry into the information facility (ies) of any target party for intelligence purpose(s)
3 / 50
information from him/her through infliction of extreme physical pain.
4 / 50
taught the whole world that commercial planes could be used as the
5 / 50
OWVL stands for One-Way Voice
6 / 50
________ held that in some cases, stress can be desirable to both an organization and individua ls.
7 / 50
This is the kind of intelligence carried out in support of prosecution of any criminal suspects
8 / 50
In asymmetric aggression, most times, the weak parties usually adopt _____ in the perpetuation of their violent actions against the enemy-party which is actually stronger
9 / 50
Human intelligence (HUMINT) and Open source intelligence (OSINT) are ___________.
10 / 50
One of these is not protective discipline for counter intelligence
11 / 50
Couriers are support personnel who assist the in managing their clandestine communication by securing them (the communications) against enemy’s interceptions or detection.
12 / 50
_________ is that which poses significant threat to employee’s health and consequently to the health of an organization
13 / 50
One of these is not an element of compensation and rewards
14 / 50
Violence is often referred to as a form of violence involving child abuse, elder abuse, and other form of aggressive behavior between two or more people within the same family or household
15 / 50
General Adoption Syndrome (GAS) describes the stages an individual encounters in stressful conditions except one
16 / 50
The business of spying is structured in a form
17 / 50
__________ are device that can secretly hide information or things, they look like ordinary object.
18 / 50
Pillars of intelligence Analysis are many but one these is not included
19 / 50
is not appropriate to security management
20 / 50
Intelligence personnel, Government institutions, Mass Media, communication technology e. t.c. are _________.
21 / 50
One of these is not a dimension of intelligence
22 / 50
Identify the one that is not a category of intelligence
23 / 50
Counter intelligence aspect draws its attention on identifying vulnerable areas in one’s intelligence organization(s) which can be explored by foreign intelligence services (FIS).
24 / 50
Intelligence tends to focus basically on gathering, analyzing, and evaluating about the capabilities vulnerabilities and aims of foreign countries.
25 / 50
________ approach became popular in security studies in the 1970s
26 / 50
26. are also known as assets
27 / 50
LASNT stands for intelligence.
28 / 50
security management was the unilateral function of the state especially if we consider the intellectual view(s) of some political theorists like
29 / 50
_________ is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign
30 / 50
Measurement and Signatures Intelligence (MASINT) is scientific and intelligence
31 / 50
is illegal beating that may lead to injuring another person.
32 / 50
Examples of ________ includes invisible ink, chaffing and winnowing
33 / 50
is a concept that has attracted huge attention among the scholars in peace and conflict studies, criminology and security studies as well psychology.
34 / 50
35 / 50
__________ approach was a departure from the statecentered security system that dominated the world system during the early cold war era.
36 / 50
These are the methods of performance appraisal except one
37 / 50
The out come of an intelligence is the ______
38 / 50
Getting information from a criminal suspect is through infliction of physical pain
39 / 50
The out come of an intelligence is the
40 / 50
Approaches to Public Relation Management in security sectors are the following except one
41 / 50
method of performance appraisal or evaluation mainly focuses on particular behaviour or act of employee (s) as it concerns job performance.
42 / 50
The set of people used for espionage include all except one
43 / 50
Every employee has a role to play in the actualization of the ultimate of the organization
44 / 50
Private security is owned by ______
45 / 50
Goal intelligence is not a category of
46 / 50
__________ is the collection of intelligence through the use of satellite images
47 / 50
Choose the one that is not appropriates to security management
48 / 50
The use of satellite images for the collection of intelligence is _________
49 / 50
involve collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c
50 / 50
________ is a process of gathering and assembling information through several methods for the purpose of production intelligence.
Restart quiz
Rate this quiz