CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

Etymologically, the word
Assassin emanated from
the Arabic word

2 / 50

2.

Authentication is a
technique in which we
create___________

3 / 50

3.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

4 / 50

4.

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

5 / 50

5.

Chloroacetophenone (CN)
is a chemical agent used
for

6 / 50

6.

History has shown that the
first public virus removal
task was performed
in________

7 / 50

7.

Preparedness is the key
element of civil security
which has the view
to_____violence

8 / 50

8.

computer security is
described as an aspectof
_____security

9 / 50

9.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

10 / 50

10.

One great obstacle to the
use of most of the warning
facilities is the erratic nature
of ________in Nigeria

11 / 50

11.

A criminal offence which
occurs when a person
unlawfully obtains services
from a person is

12 / 50

12.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

13 / 50

13.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

14 / 50

14.

what involves safety
against HIV-AIDS
pandemicsis__________

15 / 50

15.

In physical security,-is
installed for surveillance
and notification_________

16 / 50

16.

The threat which includes
flood and cyclone is

17 / 50

17.

the use of poisonous gases
on any targeted persons
and ecosystem is

18 / 50

18.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

19 / 50

19.

The word terrorism was
popularised by the jacobins
who ruled____________

20 / 50

20.

The central focus of
computer security is the
techniques that enhance
the correct________

21 / 50

21.

The first phase to the
incidence of hurricane
is_____________

22 / 50

22.

The quality of the decision
we make after our
automated analysis largely
determine the amount of
success we record in the
course of our

23 / 50

23.

The measures and actions
taken by a company to
protects its corporate image
and establish regulations
is_______

24 / 50

24.

Tsunami is usually mounted
by some geological
conditions like_______

25 / 50

25.

Another name for
earthquake
is____________

26 / 50

26.

Another word for "tsunami"
is _______

27 / 50

27.

Insurgency is a form of
security threat

28 / 50

28.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

29 / 50

29.

The threat which usually
attract crowds with strong
emotional convictions to act
in unlawful ways is called

30 / 50

30.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

31 / 50

31.

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

32 / 50

32.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

33 / 50

33.

the geological security
threat is an aspect of

34 / 50

34.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

35 / 50

35. The Italian word for workto-rule strike is

36 / 50

36.

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

37 / 50

37.

One of the basic manmade
security threats is _____

38 / 50

38.

Element of preparedness in
civil security approaches
includes________

39 / 50

39.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

40 / 50

40.

The emergence of the cold
war started in the yea

41 / 50

41.

The act of having an
understanding of crime
distribution and information
about the demography is
known as

42 / 50

42.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

43 / 50

43.

Thunderstorm is an
example________threat

44 / 50

44.

One vital element of the
subject based query is

45 / 50

45.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

46 / 50

46.

Another name for
Knowledge Discovery in
Database (KDD) is

47 / 50

47.

One of the various
approaches which involves
a network of activities is
________

48 / 50

48.

The continual activites that
make protection of
mechanisms in information
security is _______

49 / 50

49.

The quantitative risk
analysis is the effort to
determine
the____probability

50 / 50

50.

The end of the cold war in
has widened the scope of
security studies

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link