KEMBAR78
CRI 178 Security QA 1 | PDF | Lighting | Fluorescent Lamp
0% found this document useful (0 votes)
189 views5 pages

CRI 178 Security QA 1

dave
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views5 pages

CRI 178 Security QA 1

dave
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CRI 178 Introduction to Industrial Security Concepts Q&A

Prepared by: Arevalo, Queenie Marie E., Rcrim

1. Security lighting system placed at the top of the perimeter fence is counted as _______.

a. First line of security c. Third line of security


b. Second line of security d. Fourth line of security

2. It came from ____ word “Securitas” meaning “condition of being secured.

a. Greek c. Roman
b. Latin d. French

3. A medium or structure which defines the physical limits of an installation or area to restrict or impede access thereto.

a. Security Lights c. Structural barriers


b. Animal barriers d. Perimeter barrier

4. It is a condition where there is freedom from danger or harm.

a. Safety c. Security
b. Securitas d. Securities

5. Roger placed three dogs to help him in the security of their house since they don’t have a fence; he also installed security lights
surrounding the house. What specific types of barriers were used by Roger?
a. Energy and animal barriers c. Structural and energy barriers
b. Animals and structural barriers d. Structural, human, energy barriers
6. It is the action of stealing things of little value

a. Pilferage c. Pelfirage
b. Pilfirage d. Pilferer

7. This increases the protective height and prevents easy access to the fence.
a. Chain linked c. Top Guard
b. Fence post d. Guard control station
8. Which of the following statements is NOT true about the top guard?

a. It is composed of 3-4 strands of barbed wire c. It is attached in the middle of the fence
b. The barbed wires are spaced 6 inches apart d. Placed on top of the fence with a 45 degree

9. A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development,
processing, warehousing and even agriculture.
a. Industrial c. Communication Security
b. Industrial Security d. None of the above
10. The use of security guards on the entrance of the installation is an example of_____________.
a. Document Security c. Personnel Security
b. Physical Security d. Personal Security
11. Which of the following is not an asset in hotels?
a. Money c. hotel facilities
b. Guest or customers d. none of the above
12. The unobstructed area on both sides of the perimeter barrier known as clear zone should be maintained because of the following
reasons, except;
a. for better patrol movement c. for better observation
b. for the intruder to be easily seen as he has no means to hide d. None of these

13. The main reason why perimeter barrier openings are needed to be monitored is

a. It could be used as entry points by intruders c. It is a security eyesore


b. It could be used as escape route d. it should be repaired immediately

14. In the field of industrial security, various types of security are applied depending on the
a. time and season c. installation and its security needs
b. people and environment d. financial capabilities of the environment

15. What level of physical security includes the application of sophisticated alarm.

a. Minimum Security c. Maximum Security


b. Low level Security d. High Level Security

16. These are independent structures constructed and designed to control physical and visual access between outside areas.
a. Grills c. Walls
b. Fences d. Barriers
17. These are devices installed to help detect fires or detect anything that causes fire such as smoke or unusual rising of
temperature.

a. Alarm system c. Fire alarms


b.Alarm detection system d. Smoke detector

18. All but one are the three major areas of security

a. Physical Security b. Document and information security c. Personnel security c. Communication


security

19. The term denotes earnest or constant application to work business


a. Industrial security b. Industry c. Business activity D. Manufacture
20. The three areas of security are ________________.
a. Personal, document and physical c. Personnel, physical and document
b. Personal, documentary and perimeter d. Data, Information and Physical
21. Physical structures either natural or manmade capable of restricting, deterring, delaying illegal access to an installation are called
a. Barriers c. Fences
b. Walls d. Security
22. Protective alarms can be installed indoors and outdoors
a.Wholly true b. Wholly false c. Partially true d. Partially false
23. It is the use of barriers in order to prevent outsiders from gaining access to assets in order to prevent loss.
a. Document Security b.Physical Security c. Personnel Security d. Personal Security
24. The word came from the Old French A l'arme meaning "To the arms", "To the weapons
a. Wholly True b. Wholly False c. Partially True d. Partially False
25. This is normally provided at main perimeter entrances to secure areas located out-of-doors, and manned by guards on full-time
basis.
a. Top Guard
b. Tower Guard
c. Guard control station
d. Fence post

26. It is a sensitive part of an alarm system


a. Sensor c. both a and b
b. Trigger Device d. Annunciator
27. The protection of process, formulas, patents, and other operational activities of an installation.
a. Communication Security c. Bank Security
b. None of the above d. Operational Security
28. It has similar physical appearance to mercury vapor but provides a light source of higher luminous efficiency and better color
rendition.

a. Metal halide c. Fluorescent lamp


b. Mercury vapor lamp d. High pressure sodium vapor

29. It is the least expensive in terms of energy consumed and has the advantage of providing instant illumination when the switch is
on.
a. Metal halide c. Fluorescent lamp
b. Incandescent Lamp d. High pressure sodium vapor

30. This emits a purplish-white color, caused by an electric current passing through a tube of conducting and luminous gas.
a. Metal halide c. Fluorescent lamp
b. Mercury vapor lamp d. High pressure sodium vapor

31. It involves the protection of assets by proactive measures of screening applicants to be hired in the company.
a. Personnel Security c. Document Security
b. Physical Security d. Personal Security

32. This lighting arrangement is focused on the pile of items, rather than the background.
a. Controlled lighting c. Supplemental lighting
b. Glare projection d. Continuous lighting

33. The intensity is focused on the intruder while the observer or guard remains in the comparative darkness.
a. Controlled lighting c. Supplemental lighting
b. Glare projection d. Continuous lighting

34. It projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical
plane.
a. search lights c. Fresnel lights
b. flood lights d. Spot light
35. they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition.
a. Metal halide c. Fluorescent lamp
b. Mercury vapor lamp d. High pressure sodium vapor

36. Roger is planning to build a fence surrounding his house, he wanted to have a fence that will not allow visual access so he can
have the privacy that he wanted, which of the following fence is best for him?
a. Full-view fence c. Solid fence
b. Combination fence d. Chain linked fence

37. Which among the following best describes the most obvious advantage of using fire alarms?

a. Early detection resulting to easy suppression c. Passerby will know that conflagration is ongoing
b. Alarm informs the people to evacuate d. None of the above

38. These mechanical devices supply water from a natural source.


a. Wet pipe c. Fire pump
b. Fire hydrant d. Fire alarm

39. These are galvanized iron steel or plastic pipes located inside a building with water under pressure ready for use in case of fire.
a. . Standpipe c. Fire Hydrant
b. Water pipes d. Fire extinguisher
40. A mechanical device strategically located in an installation or street where a fire hose is connected so that water under pressure
will be available to extinguish fire.
a. Water pipes c. Fire extinguisher
b. Fire pump d. Fire hydrant
41. The unobstructed area maintained on both sides of a perimeter barrier
a. Backyard b. Patrol zone
c. Clear Zone d. Perimeter Area
42. It is the employment of mechanical, electrical, electronic energy imposes a deterrent to entry by the potential intruder or to provide
warning to guard personnel.
a. Energy barrier c. Natural barrier
b. Structural barrier
43. Which of the most commonly used full-view fences will caused severe injury if scaled by intruder since it is made by high strength
steel with sharp blades?
a. Barbwire c. Wire fence
b. Chain-linked d. Concertina
44. What form of perimeter security provides the best psychological deterrence during the hours of darkness?
a. Locks c. protective alarm
b. perimeter fence d. protective lighting
45. In this system, the sensor activates the circuit, which in turn activates a horn or siren or even flashing light
a.Local Alarm System b. Local Alarm-By-Chance System c. Proprietary System
46. In this system, circuits are led into the local police or fire department by the use of leased telephone lines
a.Local Alarm System b. Auxiliary Alarm System c. Proprietary System
47. A portable and detachable lock having a sliding hasp which passes through a staple ring or the like.
A. Warded lock C. Lever Locks
B. Padlock D. Disc tumbler lock
48. A mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or hiding place.
A. Keys C. Padlocks
B. Locks D. Mechanical devices
49. A type of lock using numbers, letters and symbols that must be aligned manually for the operator to unlock it.
A. Padlock C. Combination Lock
B. Card operated lock D. Code operate lock
50. A key that will open all the locks within a particular area or grouping of a particular facility.
a. Change Key b. Master key c. Sub-Master Key d. Grand Master Key

51. In this technique, the person collecting information should disguise so that his official identity and purpose remains to be unknown.
a. Profiling
b. Undercover Assignment
c. Deception Detection Technique
d. Positive vetting
52. This technique of PSI serves to verify information appearing on the application form submitted by the applicant by confirming the
information from people who personally knows the applicant and from records of the barangay, police and other concerned
agencies.
a. Background Investigation
b. Positive vetting
c. Profiling
d. Undercover Assignment
53. The use of Polygraph Machine for lie detection is a technique in PSI under?
a. Profiling
b. Deception Detection Technique
c. Undercover Assignment
d. Positive vetting
54. A technique of PSI where the purpose is to confirm from the applicant during the interview information collected from the
background investigation previously conducted.
a. Profiling
b. Deception Detection Technique
c. Undercover Assignment
d. Positive vetting
55. To complete the background investigation, information must be collected from National Agencies such as, except;
a. National Bureau of Investigation
b. Philippine Statistics Authority
c. Intelligence Service of the Armed Forces of the Philippines
d. Municipal Trial Court
56. Types of National Agency Check, except?
a. National bureau of Investigation Clearance
b. PNP Directorate for Intelligence Clearance
c. Court Clearance
d. Intelligence Service, AFP (ISAFP) Clearance
57. A type of investigation consist of the first type plus written inquiries sent to appropriate local government agencies, former
employees, references and schools listed by the person under investigation.
a. Background Investigation
b. National Agency Check
c. Profiling
d. Local Agency Check
58. A type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning-to-debt ratio
of the applicant.
a. Positive Vetting
b. Financial and Lifestyle Inquiry
c. Profiling
d. Deception Detection Technique
59. A program conducted to develop security awareness among employees of the company, regardless of rank or position from
application to retirement

a. Security Education
b. Security Promotion
c. Orientation and Training
d. Security reminders
60. In this stage where new employees receive detailed presentations of personnel security policy.Usually handouts or employee’s
manuals are distributed for reference.
a. Refresher conference c. Security reminders
b. Orientation and Training d. Initial Interview
61. A phase which employs an indirect approach of educating the employees through the posting security posters and distribution of
fliers.
a. Refresher conference c. Initial Interview
b. Orientation and Training d. Security reminders
62. These are confidential information since only few authorized persons are allowed to know.
a. Classified Information c. Document Security
b. Need to know d. Document Security
63. The formula used in the manufacture of a product is particularly known as.
a. Information c. Trade secret
b. Document d. Classified Information
64. These are materials containing marks or symbols that convey meaning to another.
a. Information c. Classified Information
b. Document d. Document Security
65. Who among the following should not have the need to know proprietary information?
a. Proprietor c. Employees
b. Manager d. Janitors
66. This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his
invention for a term of years.
a. Trade Secrets c. Trademarks
b. Patents d. Trade secrets
67. When a student came to know the questions in an examination which he is about to take without the consent of his teacher, there
is?
a. Need to know c. Classified Matter
b. Leakage d. Compromise
68. Copyright violations are also known as _______
a. Plagiarism c. Infringement and piracy
b. Patents d. Classified Information
69. It is considered as the weakest link in the security chain.
a. Personnel c. Locks and Keys
b. Security Alarms d. Protective lighting
70. The ultimate purpose of security education is to
a. make everybody security conscious
b. prepare the employees to be alternate guards
c. decrease the security personnel to be hired
d. give alternate job to employees
71. The potential damage or loss of an asset is referred to as_____
a. A. Risk c. Loss
b. Vulnerability d. Liabilities
72. An individual, group, organization, or government that conducts activities detrimental to the individual, private or government entity
is known as
a. A. Enemy c. Competitor
b. B. Adversary d. Opponent
73. The term referring to any information, facility, material, information, or activity which has a positive value to its owner whether it is
an individual, private or government entity.
a. Resources c. Asset
b. Property d. Documents
74. Availing a property or life insurance is actually a risk management alternative commonly known as
a. Risk Avoidance c. Risk Reduction
b. Risk Transfer d. Risk Spreading
75. A pilferer who steals due to his inability to resist the unexpected opportunity with no plan or premeditation and has little fear of
detection is
a. Casual pilferer c. Systematic pilferer
b. Accidental pilferer d. occasional pilferer
76. The act of stealing small items or items of little value is considered as
a. Robbery c. Stealing
b. Sabotage d. Pilferage
77. The following are the factors to be considered in in pilferage, except;
a. Location of the items
b. Position in the company
c. Access to the items
d. Removal of the item
78. The set of policies, procedures and rules and regulations designed to reduce to an absolute minimum the possibility of espionage,
sabotage and compromise of classified information of an office or a whole establishment.
a. Policies c. Procedures
b. Security System d. Security management
79. A conference or dialogue between the survey team and management officials of a plant before a security survey is conducted.
a. Exit Conference c. Entrance Conference
b. Orientation d. Discussion
80. A conference similar to an entrance conference done after the completion of the security survey.
a. Exit Conference c. Orientation
b. Discussion d. Entrance Conference
81. An onsite inquiry to check on the degree of compliance of the facility with the recommended countermeasures given during the
survey.
a. Security Survey
b. Security Inspection
c. Security Investigation
d. Onsite Inquiry
82. This pertains to the importance of the firm with reference to the national economy and security, like gasoline depots,
communication transmission lines, and power plants.
a. Relative Criticality
b. Relative Vulnerability
c. Probability
d. Criticality
83. This refers to the susceptibility of the plant or establishment to damage, loss or disruption of operation due to various hazards, like
the location of the building, the machines, or presence of possible poisons.
a. Relative Criticality
b. Relative Vulnerability
c. Probability
d. Criticality
84. The action taken or the physical security used to reduce or eliminate one or more vulnerabilities
a. Physical security c. Security Measures
b. Security barriers d. Countermeasures
85. The impact of a lost as measured in financial terms is called
a. Criticality c. Probability
b. Possibility d. Vulnerability
86. Total removal or elimination of a risk in an industry is a risk management alternative known as
a. Risk Reduction c. Risk Avoidance
b. Risk Spreading d. Risk Transfer
87. A risk management alternative done through compartmentation and decentralization to limit the impact of the potential lost
a. Risk Avoidance c. Risk Reduction
b. Risk Self-assumption d. Risk Spreading
88. In the field of industrial security, any situation or condition that can cause damage or loss of life and property is
a. Security hazard c. Vulnerabilities
b. Security Problems d. Adversaries
89. The exclusive right to patent protection is valid for a period of ____
a. 10 years c. 15 years
b. 17 years d. 20 years
90. Any weakness that can be exploited by an adversary to gain access to an asset is
a. Security hazard c. Vulnerabilities
b. Security Problems d. Adversaries
91. The following are examples of natural hazards, except;
a. Lightning storm c. Earthquake
b. Incendiary fire d. Lightning storm Floods caused by typhoon
92. The type of pilferer who steals with preconceive plan and takes away anything for economic gain is
a. Casual pilferer
b. Systematic pilferer
c. Accidental pilferer
d. occasional pilferer
93. Security hazards are generally classified into
a. Natural and Man-made
b. Natural and Artificial
c. Fake and Original
d. Divine and Natural
94. In security education, the following are used to remind employees of their security responsibilities, except;
a. Postersc. Fliers
b. Manualsd. Advertisement
95. Security survey comes before security inspection. The statement is
a. Correct c. Wrong
b. Partially Correct d. Partly Wrong
96. All personnel of the company, from the rank-and-file to the management people should participate in their company’s protection
because
a. They are paid for that purpose
b. It is part of their added function
c. Security is everybody’s concern
d. Their production will increase
97. Security education programs include the following, except;
a. Orientation on the employee’s role in the prevention and/or reduction of loss
b. Fire prevention programs and drills
c. Natural Disaster/Calamity drills
d. None of these
98. Conducted to examine or resolve a specific issue such as assessment of damage resulting from an incident.
a. Special Survey c. Supplemental Survey
b. Initial Survey d. Follow-up Survey
99. The utilization of all available resources within a security organization in order to function and attain the organizational goals and
objectives.
a. Security Management c.Security Assessment
b. Security System d. Security Survey
100. It is one that moves systematically from one area to the next and so on. There is a format or logical sequence to the process.
a. Unstructured Inspection
b. Structured Inspection
c. Formal Inspection
d. Continuous Inspection

You might also like