Cri 178
Cri 178
CRI 178
1. What form of perimeter security provides the best psychological deterrence during the hours of darkness?
a. Locks c. protective alarm
b. perimeter fence d. protective lighting
2. Roger placed three dogs to help him in the security of their house since they don’t have a fence, he also installed security lights
surrounding the house. What specific types of barriers were used by Roger?
a. Energy and animal barriers
b. Animals and structural barriers
c. Structural and energy barriers
d. Structural, human, energy barriers
3. A medium or structure which defines the physical limits of an installation or area to restrict or
impede access thereto.
a. Security lights ` c. Structural barriers
b. Animal barriers d. Perimeter barrier
4. Which of the most commonly used full-view fences will cause severe injury if scaled by intruders since it is made by high strength
steel with sharp blades?
a. Barbwire c. Wire fence
b. Chain-linked d. Concertina
5. Which of the following principles of physical security is involved when a facility piles up several barriers from the first line of
physical defense to the third line?
a. Defense-in-depth is barrier after barrier.
b. The type of access necessary depends upon the number of variable factors and therefore
maybe achieved in a number of ways.
c. There is no impenetrable barrier
d. Each installation is different.
6. This increases the protective height and prevents easy access to the fence.
a. Chain linked c. Top Guard
b. Fence post d. Guard control station
7. It is the use of barriers in order to prevent outsiders from gaining access to assets in order to
prevent loss.
a. Document Security c. Physical Security
b. Personnel Security d. Personal Security
8. Refers to any physical structure whether natural or man–made capable or restricting, deterring, delaying or preventing illegal and
unauthorized access to an installation.
a. Security Lighting c. Physical Plant
b. Dogs d. Barriers
9. These are wide beam units, primarily used to extend the illumination in long horizontal strips to protect the approaches to the
perimeter barrier.
a. search lights c. Fresnel lights
b. flood lights d. Spot light
10. Barriers can be opened, destroyed and conquered no matter how good you think they are. Which of the principles of physical
security are described by this statement?
a. There is no impenetrable barrier.
b. The type of access necessary depends upon the number of variable factors and therefore
maybe achieved in a number of ways.
c. Defense-in-depth is barrier after barrier.
d. Each installation is different.
11. Security lighting system placed at the top of the perimeter fence is counted as __________________
a. First line of security c. Third line of security
b. Second line of security d. Fourth line of security
12. The employment of mechanical, electrical, electronic energy imposes a deterrent to entry by the potential intruder or to provide
warning to guard personnel.
a. Energy barrier c. Natural barrier
b. Structural barrier d. None of them
13. To prevent employees from stealing from the company, before hiring they are thoroughly screened and interviewed, only worthy
and loyal applicants are given the opportunity to take the position. What area is security involved?
a. Personnel security c. Physical security
b. Personal security d. Document security
14. The cashier is stealing money from the cash register and keep on doing so because the owner is
not conducting a regular inventory of goods sold in the store. Which are of security should be
modified and developed in order to prevent further loss?
a. Personal Security b. Physical Security
c. Document Security d. Personnel Security
15. In the case of a house without a fence, the intruder makes his entry by picking the lock of the door, upon entering the house the
security alarm activates which prompts the intruder to escape. What line of physical defense of the house was surpassed by the
intruder?
a. First line c. First degree
b. Third line d. Second line
16. A type of security applied for the protection of top-ranking officials of the government or private
entity, visiting persons of illustrious standing and foreign dignitaries.
a. Bank security b. Hotel security
c. VIP security d. School security
17. This lighting arrangement is focused on the pile of items, rather than the background. The width of
The lighted strip can be controlled and adjusted to suit the security needs.
a. Controlled lighting c. Supplemental lighting
b. Glare projection d. Continuous lighting
18. This system is manually operated and is usually made up of movable search or floodlights that can
be located in selected or special locations which will require lighting only for a short period of time.
a. Movable or Portable lighting
b. Portable lighting
c. Emergency lighting
d. Continuous lighting
19. This involves the protection of documents and classified papers from loss, access by unauthorized
persons, damage, theft and compromise through disclosure.
a. Personal Security b. Personnel Security
c. Document Security d. Physical Security
20. The three areas of security are ________________.
a. Personal, document and physical
b. Personal, documentary and perimeter
c. Personnel, physical and document
d. Data, Information and Physical
21. This is normally provided at main perimeter entrances to secure areas located out-of-doors, and
manned by guards on a full-time basis. a. Top Guard
b. Tower Guard
c. Guard control station
d. Fence post
22. The protection of process, formulas, patents, and other operational activities of an installation.
a. Communication Security b. None of the above
c. Bank Security d. Operational Security
23. A type of security applied to business groups engaged in industries like manufacturing, assembling, research and development,
processing, warehousing and even agriculture.
a. Document Security b. Industrial Security
c. Communication Security d. None of the above
24. The use of security guards on the entrance of the installation is an example
of_____________________
a. Document Security b. Physical Security
c. Personnel Security d. Personal Security
25. It has similar physical appearance to mercury vapor but provides a light source of higher luminous
efficiency and better color rendition.
a. Metal halide c. Fluorescent lamp
b. Mercury vapor lamp d. High pressure sodium vapor
26. It involves the protection of assets by proactive measures of screening applicants to be hired in the
company.
a. Personnel Security b. Physical Security
c. Document Security d. Personal Security
27. This system is used in times of power failure or other emergencies when other system are
inoperative.
a. Emergency lighting b. Search light c. Street light d. Portable light
28. It involves measures adopted by a certain company in order to secure the integrity and secrecy of
their valued information.
a. Physical Security b. Personnel Security c. Personal Security d. Document Security
29. Roger is planning to build a fence surrounding his house, he wanted to have a fence that will not allow visual access so he can
have the privacy that he wanted, which of the following fence is best
for him?
a. Full-view fence
b. Combination fence
c. Solid fence
d. Chain linked fence
30. Which of the following is not an asset in hotels?
a. Money b. Guest or customers c. hotel facilities d. none of the above
31. A condition where there is freedom from danger or harm.
A. Security C. Industrial Security
B. Safety D. Industrial Security Management
32. The business of providing security and protection to private individuals, business and enterprises, or government and
non-government industries.
A. Security C. Industrial Security
B. Safety D. Industrial Security Management
33. The law governing the organization and management of private security agencies.
A. R. A 6975 B. R. A. 8551 C. R. A. 5487 D. R. A. 4857
34. The law that gives the PNP the power to supervise and control the training and operation of Private
security agencies.
A. R. A 6975 B. R. A. 8551 C. R. A. 5487 D. R. A. 4857
35. The main reason why perimeter barrier openings are needed to be monitored is
A. It could be used as entry points by intruders
B. It could be used as escape route
C. It is a security eyesore
D. It should be repaired immediately
36. The unobstructed area on both sides of the perimeter barrier known as clear zone should be
maintained because of the following reasons, except;
A. for better patrol movement
B. for better observation
C. for the intruder to be easily seen as he has no means to hide
D. None of these
38. To complete the background investigation, information must be collected from National Agencies
such as, except;
A. National Bureau of Investigation
B. Philippine Statistics Authority
C. Intelligence Service of the Armed Forces of the Philippines
D. Municipal Trial Court
39. In this technique of investigation, the person collecting information should disguise so that his
official identity and purpose remains to be unknown.
A. Profiling C. Deception Detection Technique
B. Undercover Assignment D. Positive vetting
40. These are materials containing marks or symbols that convey meaning to another.
A. Classified Information C. Document
B. Document Security D. Information
41. The formula used in the manufacture of a product is particularly known as
A. Classified Information C. Document
B. Trade secret D. Information
42. Who among the following should not have the need to know proprietary information?
A. Proprietor C. Manager
B. Employees D. Janitors
43. It is considered as the weakest link in the security chain
A. Personnel C. Protective lighting
B. Locks and Keys D. Security Alarms
44. Security education programs include the following, except;
A. Orientation on the employee’s role in the prevention and/or reduction of loss
B. Fire prevention programs and drills
C. Natural Disaster/Calamity drills
D. None of these
45. Making the employees aware of their security responsibilities while employed is known as
A. Security Training C. Security orientation
B. Security Education D. Proprietary information
46. This includes all the security measures designed to prevent unsuitable individuals or persons of
doubtful loyalty and integrity from employment or retention as employees.
A. Security System C. Security management
B. Background investigation D. Personnel security
47. In the security point of view, what happens when the company employees rely too much on the
assigned security personnel?
A. The security personnel will double their effort.
B. It results in vulnerability and susceptibility of the concerned company to security hazards.
C. More security personnel will be hired
D. Additional Protective measures will be needed
48. The ultimate purpose of security education is to
A. make everybody security conscious
B. prepare the employees to be alternate guards
C. decrease the security personnel to be hired
D. give alternate job to employees
49. The exclusive right to patent protection is valid for a period of
A. 10 years C. 15 years
B. 17 years D. 20 years
50. An information which in some special way relates to the status or activities of the possessor and
over which the possessor asserts ownership.
A. Sensitive information C. Classified Information
B. Patented information D. Proprietary Information
51. An individual, group, organization, or government that conducts activities detrimental to the
individual, private or government entity is known as
A. Enemy C. Competitor
B. Adversary D. Opponent
52. The term referring to any information, facility, material, information, or activity which has a positive
value to its owner whether it is an individual, private or government entity.
A. Resources C. Asset
B. Property D. Documents
53. The action taken or the physical security used to reduce or eliminate one or more vulnerabilities
A. Physical security C. Security Measures
B. Security barriers D. Countermeasures
54. A risk management alternative done through compartmentation and decentralization to limit the
impact of the potential lost
A. Risk Avoidance C. Risk Reduction
B. Risk Self-assumption D. Risk Spreading
55. In the field of industrial security, any situation or condition that can cause damage or loss of life and
property is
A. Security hazard C. Vulnerabilities
B. Security Problems D. Adversaries
56. The following are examples of natural hazards, except;
A. Floods caused by typhoon C. Earthquake
B. Incendiary fire D. Lightning storm
57. The type of pilferer who steals with preconceive plan and takes away anything for economic gain is
A. Casual pilferer C. Systematic pilferer
B. Accidental pilferer D. occasional pilferer
58. Availing a property or life insurance is actually a risk management alternative commonly known as
A. Risk Avoidance C. Risk Reduction
B. Risk Transfer D. Risk Spreading
59. The set of policies, procedures and rules and regulations designed to reduce to an absolute
minimum the possibility of espionage, sabotage and compromise of classified information of an office or
a whole establishment.
A. Policies C. Procedures
B. Security management D. Security System
60. A critical on-site examination and analysis of an industrial plant, business, a home or public or
private institution to determine what protection is needed and to make recommendations for improving
the overall level of security of that installation is
A. Security Survey C. Security Inspection
B. Security Investigation D. Onsite Inquiry
61. A conference or dialogue between the survey team and management officials of a plant before a
a security survey is conducted.
A. Exit Conference C. Entrance Conference
B. Orientation D. Discussion
62. An onsite inquiry to check on the degree of compliance of the facility with the recommended
countermeasures given during the survey.
A. Security Survey C. Security Inspection
B. Security Investigation D. Onsite Inquiry
63. This refers to the susceptibility of the plant or establishment to damage, loss or disruption of
operation due to various hazards, like the location of the building, the machines, or presence of
possible poisons.
A. Relative Criticality C. Relative Vulnerability
B. Probability D. Criticality
64. Any formula, pattern, device or compilation of information which is used in one’s business and
which gives him an opportunity to gain an advantage against competitors who do not know or use it is
A. Trade Secrets C. Patent
B. Proprietary information D. Classified Documents
65. This is a grant given by the government to an inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for a term of years.
A. Trade Secrets C. Patent
B. Proprietary information D. Classified Documents
66. In security education, the following are used to remind employees of their security responsibilities, except;
A. Posters C. Fliers
B. Manuals D. Advertisement
67. The law that governs the organization and operation of private security agency throughout the
Philippines
A. R. A. 6975 B. R. A. 8551 C. R. A. 1530 D. R. A. 5487
68. Any person who offers or renders personal service to watch or secure either a residence or
business establishment or both for hire or compensation, and with a license to exercise profession is
A. Police Officer C. Security Guard
B. BodyGuard D. Security Personnel
69. The document issued by the Chief, Philippine National Police or his duly authorized representative
recognizing a person to be qualified to perform his duties as private security or training personnel.
A. Professional License C. License to Operate
B. License to Exercise Profession D. License to Guard
70. The term referring to the license certificate, issued by the Chief, Philippine National Police or his
duly authorized representative, authorizing a person to engage in employing security guard or detective, or a juridical person to
establish, engage, direct, manage or operate an individual or a private detective
agency or private security agency or company security force after payment of the prescribed dues or
fees.
A. License to Operate C. Professional License
B. License to Exercise Profession D. License to Guard
71. This refers to the association of all licensed security agencies and company security forces.
72. The division of the PNP responsible for supervising the training and operation of security agencies.
A. PADPAO B. PNP SOSIA C. PNP SUSIA D. PNP SAGSD
73. A written order or schedule issued by a superior officer usually the private security agency or
branch manager or operations officer assigning the performance of private security or detective
services/duties.
A. Lawful Order C. Command
B. Duty Detail Order D. Operational Command
74. The group of selected men, trained or grouped into a functional unit for the purpose of protecting
operational processes from those disruptions which would impede efficiency or halt operation of a
particular plant, facility, installation or special activity.
A. Security guards C. Security Guard Force
B. Guard Forces D. Armed Forces
75. New applicants of license to operate security agency shall have a minimum capital amounting to
A. 1,000 B. 10,000 C. 100,000 D. 1,000,000
76. The following are exempt from pre licensing training course, except;
A. Retired Military Personnel C. Retired Police Personnel
B. ROTC Graduate D. College Graduate
77. What is the minimum age requirement of a protection agent based on the SOSIA order dated Oct. 15, 2018?
A. 18 Y.O. B. 21 Y.O. C. 23 Y.O. D. 25 Y.O.
78. The required ratio of firearm to security guard is
A. 2:1 B. 1:2 C. 1:1 D. 1:3
79. The owner of a security agency must at least be
A. 18 Y.O. B. 21 Y. O. C. 23 Y.O. D. 25 Y. O.
80. If the agency has a total of 300 firearms licensed under the agency's name, they are also allowed to
stock up to how many rounds of ammunition.
A. 12,000 rounds B. 15,000 rounds C. 7,500 rounds D. 10,000 rounds
81. Patrolman Pogi is in pursuit of a criminal. He then requested SG Lomi to assist him in the pursuit. Which of the following
circumstances will be observed?
A. the SG can assist the peace officer provided it is within the territorial jurisdiction of his (SG)
area of duty.
B. the SG can assist the peace officer because it is mandated by law
C. the SG can assist the peace officer otherwise he could be held liable for harboring a fugitive
D. none of them is correct
82. After the tour of duty of Security Guard Pablo Talon, what shall he do with his firearm?
A. Bring the firearm to his residence
B. Deposit the firearm inside the drawer of the guards table
C. Returns the firearm for safekeeping in the company’s depositary
D. Turns over to the next security guard on duty.
83. A security force maintained and operated by any private company/corporation utilizing any of its
own employees to watch, secure or guard its business establishment premises, compound or
properties is called
A. Company Guard Force C. Private Security Agency
B. Government Guard Unit D. All of these
84. No licensed security agency shall operate, promote and enter into an agreement of “merger“ with
any person or a group of persons for the purpose of organizing a branch unit or subsidiary under
separate control and ownership which is also known as
A. Merger System C. Branch System
B. Kabit System D. Branch-out System
85. Under normal conditions, which of the following firearms should not be issued to private security
guards?
A. Cal. 45 C. Cal. 38
B. Magnum .22 D. 12 Gauge Shotgun
86. Under the law, a Private Security Agency should apply for regular license only when in possession
of at least 70 licensed firearms and a minimum of
A. 100 Guards C. 200 Guards
B. 150 Guards D. 1000 Guards
87. The required type of training while applying for a new security guard’s license is
A. In Service Training C. Pre Licensing Training
B. Refresher Training D. Specialized Training
88. A security unit maintained and operated by any government entity other than military and/or a police
which is established and maintained for the purpose of securing the office or compound and/or
extension of such government entities.
A. Private Security Agency C. Company Security Agency
B. Government Security Unit D. Philippine National Police
89. The maximum number of private security personnel in a given agency shall be
A. 200 B. 500 C. 1000 D. 2000
90. License to operate security agency shall be valid for how many years
A. 365 days B. 1 Year C. 730 days D. 2 years
91. Application for renewal of License to Operate security agency shall be filed at least
A. 60 days before expiry date of LTO. C. At the day of expiration
B. 30 days before expiry date of LTO D. One month before expiry of LTO
92. A private detective must be a holder of
A. High school diploma C. Baccalaureate Degree
B. Master’s Degree D. Doctoral Degree
93. Under the staffing pattern, this security guard is responsible for the entire detailed security officers
within a certain establishment.
A. Officer in charge C. Shift in charge
B. Post in charge D. Chief Inspector
94. The equivalent rank of a security manager is
A. Security Director C. Staff Director
B. Executive Director D. Deputy Director
95. Which of the following is the fourth (4th) General order?
A. To report all violations of regulations and orders I am instructed to enforce
B. To relay all calls from posts more distant from the security house where I am stationed
C. To quit my post only when properly relieved
D. To talk to no one except in the line of duty
96. How many witnesses are needed when a security guard will search a person he has arrested?
A. one B. At least two C. More than two D. three or more
97. A security guard making arrest may not inform the person to be arrested of his intention to arrest
and the cause of arrest if
A. the person to be arrested flees
B. the person to be arrested forcibly resists
C. the giving of such information will imperil the arrest
D. All of these
98. This shall refer to training and academic programs and courses duly approved or prescribed by the
Philippine National Police and adopted by the Technical Education and Skills Development Authority for
security personnel.
A. Private Security Training C. Pre Licensing Training
B. Refresher Training D. Specialized Training
99. This training refers to the periodic and non-periodic programs and courses designed with the
objective of reinvigorating and/or developing basic skills and knowledge gained previously or gained
while in the exercise of his/her profession as a matter of experience, to enhance current in-service and
future individual and/or collective exercise of the security profession.
A. Private Security Training C. Pre Licensing Training
B. Refresher Training D. Specialized Training
100. The following are examples of specialized training programs except;
A. Armored Car Crew Training Course,
B. Bomb Disposal Training Course,
C. Bank Security Training Course,
D. Security Supervisor Development Course