ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
who defines security threat as development that threaten the sovereignty of the state________
2 / 50
A hurricane is a type of tropical ____________
3 / 50
One of the various approaches which involves a network of activities is ________
4 / 50
computer security provides a platform which enhance quality attributes like_____
5 / 50
Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities
6 / 50
An effective public warnings in responding to disaster reduces _______
7 / 50
Terrorism is a ferocious use of violence, a form of
8 / 50
The introduction of system has really impacted positively on the task of data mining
9 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
10 / 50
Seaports are major shipping places that are vulnerable to security _________
11 / 50
Another name for demonstration is
12 / 50
who said that enemies may hide destructive objects in containers which they later use against a country _________
13 / 50
defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence
14 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
15 / 50
The threat which involve the malicious activities of man is known as
16 / 50
The threat which involves entrapment of the environment with various forms of pollution is
17 / 50
Another name for Knowledge Discovery in Database (KDD) is
18 / 50
security threat is classified into_______ divisions
19 / 50
The qualitative risk analysis is the effort to determine the ______probability
20 / 50
One of the effects of Environmental pollution is ________
21 / 50
the geological security threat is an aspect of
22 / 50
Tsunami is usually mounted by some geological conditions like_______
23 / 50
The terrorist attacks into the world trade center was linked to_________
24 / 50
The climatic forms of security threats have impact not only on man but on _______
25 / 50
The measures that ensure every individual entitlement to employment and living wage is_________
26 / 50
s the direct application that comes form considering the inherent geography in crime
27 / 50
On food security,about -of urban dwellers go about with empty stomach_______
28 / 50
The measures and actions taken by a company to protects its corporate image and establish regulations is_______
29 / 50
The internal or external threat that challenges the authority of the state is _________
30 / 50
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
31 / 50
Climatic hazards basically include hurricane, flood and
32 / 50
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
33 / 50
The first phase to the incidence of hurricane is_____________
34 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
35 / 50
The introduction of mobile computing with global positioning system (GPS) technologies has made it possible to detect any incidence of
36 / 50
In physical security,-is installed for surveillance and notification_________
37 / 50
s essential to tactical analysis necessary for crime forecasting and geographic profiling
38 / 50
what is the measures used to provide physical protecton of resourses against deliberate and accidental threats_______
39 / 50
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
40 / 50
The process by which an organisation protects and secure its system is_________
41 / 50
Etymologically, the word Assassin emanated from the Arabic word
42 / 50
is the process of analysing data from different perspectives and summarising it into useful information.
43 / 50
If there is no provision of sufficient security at the seaport,this causes _______in that country
44 / 50
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
45 / 50
the use of poisonous gases on any targeted persons and ecosystem is
46 / 50
is a subfield in criminology and security studies
47 / 50
The quality of the decision we make after our automated analysis largely determine the amount of success we record in the course of our
48 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
49 / 50
Preparedness is the key element of civil security which has the view to_____violence
50 / 50
The central focus of computer security is the techniques that enhance the correct________
Restart quiz
Rate this quiz