ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
who defines security threat as development that threaten the sovereignty of the state________
2 / 50
A criminal offence which occurs when a person unlawfully obtains services from a person is
3 / 50
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
4 / 50
Seaports are major shipping places that are vulnerable to security _________
5 / 50
s an essential tool of crime analysis
6 / 50
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
7 / 50
A threat that takes place on the road, streets, or even bridges is
8 / 50
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
9 / 50
When contaminations cannot be processed and neutralised by environment we experienced _______ pollution
10 / 50
s the direct application that comes form considering the inherent geography in crime
11 / 50
Terrorism is a ferocious use of violence, a form of
12 / 50
Basically, any intentional and unintentional criminal actions are
13 / 50
In Nigeria, where the number of police personnel is very inadequate to provide any meaningful security calls for
14 / 50
Terrorism became a regular vocabulary in the year______
15 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
16 / 50
Traditionally, the state is the custodian and ultimate beneficiary of the monopoly use of violence as advocated by
17 / 50
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
18 / 50
computer security is described as an aspectof _____security
19 / 50
Another name for sick-out strike is
20 / 50
The terrorist attacks into the world trade center was linked to_________
21 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
22 / 50
The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______
23 / 50
According to ______ civil security includes a better interdepartmental coordination
24 / 50
An organised rebellion is aimed at over throwing a constituted through the use of subversion and armed conflict
25 / 50
Tsunami is usually mounted by some geological conditions like_______
26 / 50
The progressive destruction and less capable of sustaining vegetation is_________
27 / 50
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
28 / 50
The end of the Cold War in ____ has widened the scope of security
29 / 50
It is a fact that food security is not luxury but_______
30 / 50
what involves safety against HIV-AIDS pandemicsis__________
31 / 50
Infrastucture security is designed to provide protection for critical infrastructures such as __________
32 / 50
Element of preparedness in civil security approaches includes________
33 / 50
helps us in our analysis of data to have more information about the subject and gives a clearer picture of the subject.
34 / 50
The leading factor to the problem of climatic change is the emission of _______ into the atmosphere
35 / 50
who said that enemies may hide destructive objects in containers which they later use against a country _________
36 / 50
The quantitative risk analysis is the effort to determine the____probability
37 / 50
The continual activites that make protection of mechanisms in information security is _______
38 / 50
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
39 / 50
The god of earthquake in Greek mythology is____________
40 / 50
Chloroacetophenone (CN) is a chemical agent used for
41 / 50
One of the basic manmade security threats is _____
42 / 50
The threat which involves entrapment of the environment with various forms of pollution is
43 / 50
Another name for Knowledge Discovery in Database (KDD) is
44 / 50
The first phase to the incidence of hurricane is_____________
45 / 50
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
46 / 50
Thunderstorm is an example________threat
47 / 50
is often applied at various levels of law enforcement in any community to know the situations of crime and ways to reduce it
48 / 50
Hydrogen cyanide (AC) is a chemical agent that acts on the
49 / 50
s a method through which we analyse crime
50 / 50
An effective public warnings in responding to disaster reduces _______
Restart quiz
Rate this quiz