ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
Etymologically, the word Assassin emanated from the Arabic word
2 / 50
Authentication is a technique in which we create___________
3 / 50
enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation
4 / 50
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
5 / 50
Chloroacetophenone (CN) is a chemical agent used for
6 / 50
History has shown that the first public virus removal task was performed in________
7 / 50
Preparedness is the key element of civil security which has the view to_____violence
8 / 50
computer security is described as an aspectof _____security
9 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
10 / 50
One great obstacle to the use of most of the warning facilities is the erratic nature of ________in Nigeria
11 / 50
A criminal offence which occurs when a person unlawfully obtains services from a person is
12 / 50
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
13 / 50
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
14 / 50
what involves safety against HIV-AIDS pandemicsis__________
15 / 50
In physical security,-is installed for surveillance and notification_________
16 / 50
The threat which includes flood and cyclone is
17 / 50
the use of poisonous gases on any targeted persons and ecosystem is
18 / 50
is the process of analysing data from different perspectives and summarising it into useful information.
19 / 50
The word terrorism was popularised by the jacobins who ruled____________
20 / 50
The central focus of computer security is the techniques that enhance the correct________
21 / 50
The first phase to the incidence of hurricane is_____________
22 / 50
The quality of the decision we make after our automated analysis largely determine the amount of success we record in the course of our
23 / 50
The measures and actions taken by a company to protects its corporate image and establish regulations is_______
24 / 50
Tsunami is usually mounted by some geological conditions like_______
25 / 50
Another name for earthquake is____________
26 / 50
Another word for "tsunami" is _______
27 / 50
Insurgency is a form of security threat
28 / 50
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
29 / 50
The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called
30 / 50
The mild application of intimidation and violence to bus passengers by criminal gangs is known as
31 / 50
The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______
32 / 50
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
33 / 50
the geological security threat is an aspect of
34 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
35 / 50
35. The Italian word for workto-rule strike is
36 / 50
An organised rebellion is aimed at over throwing a constituted through the use of subversion and armed conflict
37 / 50
One of the basic manmade security threats is _____
38 / 50
Element of preparedness in civil security approaches includes________
39 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
40 / 50
The emergence of the cold war started in the yea
41 / 50
The act of having an understanding of crime distribution and information about the demography is known as
42 / 50
In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko, Iba, IjoraBadia are examples of in criminal locations
43 / 50
Thunderstorm is an example________threat
44 / 50
One vital element of the subject based query is
45 / 50
Hydrogen cyanide (AC) is a chemical agent that acts on the
46 / 50
Another name for Knowledge Discovery in Database (KDD) is
47 / 50
One of the various approaches which involves a network of activities is ________
48 / 50
The continual activites that make protection of mechanisms in information security is _______
49 / 50
The quantitative risk analysis is the effort to determine the____probability
50 / 50
The end of the cold war in has widened the scope of security studies
Restart quiz
Rate this quiz