CSS246



Category: CSS246

0

CSS246

1 / 70

1.

Private security can develop relationships
so that private practitioners know whom to
contact when they need help or want to
report and

2 / 70

2.

As a result of the private security guards'
inability to carry firearms,
Is
compulsorily a part of their operations.

3 / 70

3.

Cameras Includes Body Worn Cameras,
Bullet Cameras, and ____________

4 / 70

4.

Another important reason for the growth of
private security sector is that of

5 / 70

5.

___________is essentially an exhaustive
physical examination of the premises and a
thorough inpsection of all operational
systems and procedures

6 / 70

6.

The private security sector is divided into
two categories; Private Military Companies
and

7 / 70

7. Spying is also referred to as

8 / 70

8.

Many trained security officers carry
weapons such as

9 / 70

9.

Both _____________and_____________is
compulsory for security guards

10 / 70

10.

Self defence, crime combat, escort/public
security are some of the arguements for
the carriage of arms by
gaurds

11 / 70

11.

A critical on-site examination to ascertain
the present security status, identity deficits
or excess, determine the protection need
and make _________ recommendations to
immprove the overall security of the
operation

12 / 70

12.

List of other services that PSCs and PMCs
provide include

13 / 70

13.

Armoured car guards usually protect
_____________And_____________During
transit

14 / 70

14.

In the organograme of the NSCDCs the
least officer is called ____________

15 / 70

15.

The expansion of private
In Nigeria and
Africa generally is a key factor in the
growth of private security both in size and
profile.

16 / 70

16.

Risk management are principally
concerned with the protection and
conservation of corporate

17 / 70

17.

The security of hardware and its
componenets are essential for the overall

18 / 70

18.

One of the problems facing private security
guards in Nigeria is __________

19 / 70

19.

The recomendation of licensing of PSC
has to be made by

20 / 70

20.

An Example of a threat which can damage
infrastucture is __________

21 / 70

21.

The regulation and licensing of PSC fall
under the jurisdiction of the ministry of

22 / 70

22.

These specific and confused forms are
counterfeiting,
and bootlegging

23 / 70

23.

There are at least
_separate
private security associations in Nigeria

24 / 70

24.

On the other hand, delegating jobs
increases the need for
managerial_____________ and
_____________

25 / 70

25.

_____________is a company which, for
itself or under contract with
another,transports currency, securities,
valuables, jewellery, food stamps, or any
other item that requires secured and
insured delivery from one place to another
with armed personnel.

26 / 70

26.

Halogen security company limited was
incorporated in _____________

27 / 70

27.

Private security have access to the
community through
__communincations technologies

28 / 70

28.

Law enforcement can prepare private
security to assist in

29 / 70

29.

Piracy takes
_specific and often confused forms

30 / 70

30.

PI Kits Includes DVR Kits,
_____________and, Sunglass Kits,

31 / 70

31.

The largest foreign or non-indigenous
private security company in Nigeria is

32 / 70

32.

The type of conflict that arises in a dyadic
relationship is known as ____________

33 / 70

33.

Private security companies operating
without licences and witout regard to
standard and basic security principles is
refered to as

34 / 70

34.

The oldest of these private security
associations is

35 / 70

35.

The four basic components of
organizational structure include job
specification, departmentalization,patterns
of authority and

36 / 70

36.

The structure of a security business must
be consistent with its

37 / 70

37.

Advantages of the Private Security Industry
include the following except ___________

38 / 70

38.

In addition to providing the framework for
effectively selecting private security
officers, the Ministry of Interior
and_____________on Guidelines calls for
a formal mechanism to establish minimum
training requirements certified by a
regulatory body

39 / 70

39.

In the realm of security affairs, states still
claim the prerogative of creating and
judging

40 / 70

40.

___________is a Protective service
provided by one entity, specializing in such
services, to another entity on a
compensated basis

41 / 70

41.

_______allows management to devise
standard procedures for subordinates to
follow

42 / 70

42.

Quality Circle' is a concept which
emphasises increase in

43 / 70

43.

The first private security company
providing uniformed guards in Nigeria was
established in the year

44 / 70

44.

The ways of managing organizational
conflict is called

45 / 70

45.

The Institute for Security and Open
Methodologies (ISECOM) defines security
as "a form of protection where a separation
is created between
_and the
_

46 / 70

46.

A good risk management program involves
_____________ Basic steps

47 / 70

47.

Security officers are often trained to
perform arrest and control procedures, as
well as operate emergency equipments
e.t.c

48 / 70

48.

Conflcits arising from sets of prescribed
behaviour is called ___________

49 / 70

49.

Generally human insecurity has been one
of the major factors that have been a
serious threat to

50 / 70

50.

As crime remains a high priority issue,
many turn to_____________or their
protection

51 / 70

51.

The legal powers, rights and
_of private
security personnel are obscurely and
confusingly located across a range of fields

52 / 70

52.

According to Sutherland (1939) white collar
crime is defined as an offence committed
by a person of a respectability and high
social status in the course of his or her

53 / 70

53.

As Stemming (1988) argues for the
commercial user of private security, any
policing strategy must be proven

54 / 70

54.

Staff with various positions are otherwise
known as _____________

55 / 70

55.

Conflict arising from the need to manage
the interdependence between different
organizational sub-units is called
___________

56 / 70

56.

A good hybrid system consists of
_Components

57 / 70

57. Private security can "force multiplier"

58 / 70

58.

Example of critical infrastructure include
___________

59 / 70

59.

and
_are
compulsory for security guards

60 / 70

60.

In Nigreia, the private guards act of 1986
prohibits privae security companies from

61 / 70

61.

A rational and orderly approach as well as
comprehensive solution to problem
identification and probability determination
is called

62 / 70

62.

The US on foreign policy and the
consequent campaign against terrorism,
brought about the need for the
reinforcement of the Us military forces in
fighting wars in the name of combating

63 / 70

63.

___________is reposible for the integrity of
the information disseminated throughout
the company system

64 / 70

64.

Besides bonuses for time spent with the
company, a further series of additional
payments are expected to be added to the
basic salary package except _________

65 / 70

65.

Private Security Companies serve as an
additional _____________ Resource in the
fight against crime

66 / 70

66.

One of the basic understanding of the
is that they
may not get all they need to do their work

67 / 70

67.

Blasting and carrying away of the entire
safe are the methods most commonly used
by

68 / 70

68.

Security threats involve not only
conventional foes such as nation-states but
also non-state actors such as

69 / 70

69.

The first private security outfit providing
uniformed guards in Nigeria is

70 / 70

70.

The unauthorized recording of the prerecorded sounds as well as the
unauthorized duplication of original art
work, label, trademark and packaging is
called

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link