RECITATION
RECITATION
RECITATION
RECITATION
RECITATION
75

A badge system where a pass is coded for access to specific areas and used until authorization ends.

A. Temporary Badge

B. Single Pass System

C. Pass Exchange System

D. Multiple Pass System

B. Single Pass System

75

These areas are intended for handling and storage of high-value cargo and classified documents.

A. Restricted Area

B. Controlled Area

C. Restricted Area 

D. Exclusion Area


D. Exclusion Area

75

A covert method of gathering information using hidden identity.

A. Profiling

B. Deception Detection Technique

C. Financial and Lifestyle Inquiry

D. Undercover Investigation

D. Undercover Investigation


75

A type of personnel identification that relies on familiarity with a person’s appearance.

A. Positive Personnel Identification and Check System

B. Personal Recognition

C. Artificial Recognition

D. Pass and Badge System

B. Personal Recognition

75

The initial briefing given to new employees about security practices.

A. Security Education

B. Security Orientation

C. Security Indoctrination

D. Security Reminders

B. Security Orientation

75

Use of posters, slogans, and signs to promote security awareness.

A. Security Indoctrination

B. Security Reminders

C. Security Promotion

D. Security Seminars

B. Security Reminders


75

Training designed to develop skills and vigilance in security responsibilities.

A. Security Education

B. Security Orientation

C. Security Indoctrination

D. Security Reminders

C. Security Indoctrination

75

The quality of being faithful to the organization and colleagues.

A. Loyalty

B. Integrity

C. Discretion

D. Character

A. Loyalty

75

The sum of traits formed by nature, education, and habits.

A. Loyalty

B. Integrity

C. Discretion

D. Character

D. Character

75

Activities like lectures and discussions to improve security knowledge. 

A. Security Indoctrination

B. Security Reminders

C. Security Promotion

D. Security Seminars

D. Security Seminars

75

The process of requiring visitors to identify themselves and be issued an ID.

A. Visitor Entrances

B. Time Traveled Check

C. Visitor’s Logbook

D. Visitor Identification System

D. Visitor Identification System


75

Separate entry points provided for visitors and employees.

A. Time Traveled Check

B.  Visitor Entrances

C. Visitor’s Logbook

D. Visitor Identification System

B. Visitor Entrances


75

A national clearance issued by the main investigative bureau in the Philippines.

A. Barangay Clearance

B. Police clearance

C. National Bureau of Investigation Clearance

D. Intelligence Service, AFP Clearance

C. National Bureau of Investigation Clearance


75

A technique involving a personal interview conducted under stress.

A. Positive Vetting

B. Profiling

C. Deception Detection Technique

D. Financial and Lifestyle Inquiry

A. Positive Vetting


75

A method used to predict behavior in future critical situations.

A. Positive Vetting

B. Profiling

C. Deception Detection Technique

D. Financial and Lifestyle Inquiry

B. Profiling

100

The act of changing the classification of information.

A. Classify

B. Declassify

C. Reclassify

D. Upgrading

C. Reclassify

100

The deliberate destruction of property or equipment.

A. Systematic Pilferer

B. Sabotage

C. Espionage

D. Subversive Activities

B. Sabotage

100

A certification that a person is authorized to access classified information.

A. Copyright

B. Security Clearance Certificate

C. Final Clearance

D. Interim Clearance

B. Security Clearance Certificate

100

The process of destroying documents that are no longer needed.

A. Need to Know

B. Compartmentation

C. Compromise

D. Purging

D. Purging

100

A type of pilferer who steals due to sudden opportunity.

A. Pilferage

B. Casual Pilferer

C. Systematic Pilferer

D. Sabotage

B. Casual Pilferer

100

The act of gathering secret information through spying.

A. Systematic Pilferer

B. Sabotage

C. Espionage

D. Subversive Activities

C. Espionage

100

Refers to the importance of a firm in relation to national economy and security.

A. Interim Clearance

B. Security Hazards 

C. Relative Vulnerability

D. Relative Criticality

D. Relative Criticality

100

Granting access to classified information only to properly cleared individuals.

A. Need to Know

B. Compartmentation

C. Compromise

D. Purging

B. Compartmentation

100

A government grant giving exclusive rights to an inventor.

A. Trade Secret

B. Patent

C. Trademark

D. Copyright


B. Patent

100

The act of assigning a security category to information.

A. Classify

B. Declassify

C. Reclassify

D. Upgrading

A. Classify