CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

who defines security threat
as development that
threaten the sovereignty of
the state________

2 / 50

2.

A hurricane is a type of
tropical ____________

3 / 50

3.

One of the various
approaches which involves
a network of activities is
________

4 / 50

4.

computer security provides
a platform which enhance
quality attributes like_____

5 / 50

5.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

6 / 50

6.

An effective public warnings
in responding to disaster
reduces _______

7 / 50

7.

Terrorism is a ferocious use
of violence, a form of

8 / 50

8.

The introduction of
system has really impacted
positively on the task of
data mining

9 / 50

9.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

10 / 50

10.

Seaports are major
shipping places that are
vulnerable to security
_________

11 / 50

11.

Another name for
demonstration is

12 / 50

12.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

13 / 50

13.

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

14 / 50

14.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

15 / 50

15.

The threat which involve
the malicious activities of
man is known as

16 / 50

16.

The threat which involves
entrapment of the
environment with various
forms of pollution is

17 / 50

17.

Another name for
Knowledge Discovery in
Database (KDD) is

18 / 50

18.

security threat is classified
into_______ divisions

19 / 50

19.

The qualitative risk analysis
is the effort to determine
the ______probability

20 / 50

20.

One of the effects of
Environmental pollution is
________

21 / 50

21.

the geological security
threat is an aspect of

22 / 50

22.

Tsunami is usually mounted
by some geological
conditions like_______

23 / 50

23.

The terrorist attacks into the
world trade center was
linked to_________

24 / 50

24.

The climatic forms of
security threats have
impact not only on man but
on _______

25 / 50

25.

The measures that ensure
every individual entitlement
to employment and living
wage is_________

26 / 50

26.

s the direct application that
comes form considering the
inherent geography in crime

27 / 50

27.

On food security,about -of
urban dwellers go about
with empty
stomach_______

28 / 50

28.

The measures and actions
taken by a company to
protects its corporate image
and establish regulations
is_______

29 / 50

29.

The internal or external
threat that challenges the
authority of the state is
_________

30 / 50

30.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

31 / 50

31.

Climatic hazards basically
include hurricane, flood and

32 / 50

32.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

33 / 50

33.

The first phase to the
incidence of hurricane
is_____________

34 / 50

34.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

35 / 50

35.

The introduction of mobile
computing with global
positioning system (GPS)
technologies has made it
possible to detect any
incidence of

36 / 50

36.

In physical security,-is
installed for surveillance
and notification_________

37 / 50

37.

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

38 / 50

38.

what is the measures used
to provide physical
protecton of resourses
against deliberate and
accidental threats_______

39 / 50

39.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

40 / 50

40.

The process by which an
organisation protects and
secure its system
is_________

41 / 50

41.

Etymologically, the word
Assassin emanated from
the Arabic word

42 / 50

42.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

43 / 50

43.

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

44 / 50

44.

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

45 / 50

45.

the use of poisonous gases
on any targeted persons
and ecosystem is

46 / 50

46.

is a subfield in criminology
and security studies

47 / 50

47.

The quality of the decision
we make after our
automated analysis largely
determine the amount of
success we record in the
course of our

48 / 50

48.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

49 / 50

49.

Preparedness is the key
element of civil security
which has the view
to_____violence

50 / 50

50.

The central focus of
computer security is the
techniques that enhance
the correct________

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link