ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
The end of the cold war in has widened the scope of security studies
2 / 50
In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______
3 / 50
An organised rebellion is aimed at over throwing a constituted through the use of subversion and armed conflict
4 / 50
Another word for "tsunami" is _______
5 / 50
The use of crime mapping through installation of security gadgets like CCTV's and secret camera's are helpful to identify
6 / 50
During the Westphalia period, the major threat to the political sovereignty of any State usually emanated from ____State
7 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
8 / 50
The transportation of a woman against her will for ransom is labelled
9 / 50
The terrorist attacks into the world trade center was linked to_________
10 / 50
With the experience from the september 11 terrorist attck in the USA, most countries have fortified their airports with______
11 / 50
Hurricane is an example of_____threat
12 / 50
Piracy usually involves a very violent act perpetrated by private parties of no affiliation
13 / 50
The climatic change and environment pollution in Africa has increased _________
14 / 50
Link analysis is very popular among practitioners
15 / 50
Another name for Knowledge Discovery in Database (KDD) is
16 / 50
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
17 / 50
A threat where the offenders use deadly weapons in the course of carrying out their dastardly act is called
18 / 50
1. According to ______the State is the custodian and ultimate beneficiary of the monopoly use of violence
19 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
20 / 50
Among the Greeks,earthquake is said to be caused by____________
21 / 50
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
22 / 50
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
23 / 50
Before the advent of internet ,computer virus were usually spread through __________
24 / 50
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
25 / 50
Chloroacetophenone (CN) is a chemical agent used for
26 / 50
One of the basic manmade security threats is _____
27 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
28 / 50
History has shown that the first public virus removal task was performed in________
29 / 50
Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities
30 / 50
During these periods in pirates caught were paraded before the public and later subject to execution.
31 / 50
Basically, any intentional and unintentional criminal actions are
32 / 50
The threat which involve the malicious activities of man is known as
33 / 50
Terrorism is coined from the word_____
34 / 50
The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called
35 / 50
Thunderstorm is an example________threat
36 / 50
When contaminations cannot be processed and neutralised by environment we experienced _______ pollution
37 / 50
Etymologically,the word "tsunami" emanate from the______ language
38 / 50
Another name for earthquake is____________
39 / 50
The end of the Cold War in ____ has widened the scope of security
40 / 50
This is one of the forms of terrorism________
41 / 50
A hurricane is a type of tropical ____________
42 / 50
The factors responsible for the various pollutions that generate environmental hazards is________
43 / 50
It is a fact that food security is not luxury but_______
44 / 50
A threat that takes place on the road, streets, or even bridges is
45 / 50
Hydrogen cyanide (AC) is a chemical agent that acts on the
46 / 50
Piracy is a violent crime and robbery which takes place on the
47 / 50
Etymologically, the word Assassin emanated from the Arabic word
48 / 50
The measures that ensure every individual entitlement to employment and living wage is_________
49 / 50
Climatic hazards basically include hurricane, flood and
50 / 50
According to ______ civil security includes a better interdepartmental coordination
Restart quiz
Rate this quiz