CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

who defines security threat
as development that
threaten the sovereignty of
the state________

2 / 50

2.

A criminal offence which
occurs when a person
unlawfully obtains services
from a person is

3 / 50

3.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

4 / 50

4.

Seaports are major
shipping places that are
vulnerable to security
_________

5 / 50

5.

s an essential tool of crime
analysis

6 / 50

6.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

7 / 50

7.

A threat that takes place on
the road, streets, or even
bridges is

8 / 50

8.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

9 / 50

9.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

10 / 50

10.

s the direct application that
comes form considering the
inherent geography in crime

11 / 50

11.

Terrorism is a ferocious use
of violence, a form of

12 / 50

12.

Basically, any intentional
and unintentional criminal
actions are 

13 / 50

13.

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

14 / 50

14.

Terrorism became a regular
vocabulary in the
year______

15 / 50

15.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

16 / 50

16.

Traditionally, the state is the
custodian and ultimate
beneficiary of the monopoly
use of violence as
advocated by

17 / 50

17.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

18 / 50

18.

computer security is
described as an aspectof
_____security

19 / 50

19.

Another name for sick-out
strike is

20 / 50

20.

The terrorist attacks into the
world trade center was
linked to_________

21 / 50

21.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

22 / 50

22.

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

23 / 50

23.

According to ______ civil
security includes a better
interdepartmental
coordination

24 / 50

24.

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

25 / 50

25.

Tsunami is usually mounted
by some geological
conditions like_______

26 / 50

26.

The progressive destruction
and less capable of
sustaining vegetation
is_________

27 / 50

27.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

28 / 50

28.

The end of the Cold War in
____ has widened the
scope of security

29 / 50

29.

It is a fact that food security
is not luxury but_______

30 / 50

30.

what involves safety
against HIV-AIDS
pandemicsis__________

31 / 50

31.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

32 / 50

32.

Element of preparedness in
civil security approaches
includes________

33 / 50

33.

helps us in our analysis of
data to have more
information about the
subject and gives a clearer
picture of the subject.

34 / 50

34.

The leading factor to the
problem of climatic change
is the emission of _______
into the atmosphere

35 / 50

35.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

36 / 50

36.

The quantitative risk
analysis is the effort to
determine
the____probability

37 / 50

37.

The continual activites that
make protection of
mechanisms in information
security is _______

38 / 50

38.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

39 / 50

39.

The god of earthquake in
Greek mythology
is____________

40 / 50

40.

Chloroacetophenone (CN)
is a chemical agent used
for

41 / 50

41.

One of the basic manmade
security threats is _____

42 / 50

42.

The threat which involves
entrapment of the
environment with various
forms of pollution is

43 / 50

43.

Another name for
Knowledge Discovery in
Database (KDD) is

44 / 50

44.

The first phase to the
incidence of hurricane
is_____________

45 / 50

45.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

46 / 50

46.

Thunderstorm is an
example________threat

47 / 50

47.

is often applied at various
levels of law enforcement in
any community to know the
situations of crime and
ways to reduce it

48 / 50

48.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

49 / 50

49.

s a method through which
we analyse crime

50 / 50

50.

An effective public warnings
in responding to disaster
reduces _______

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link