Intel QA Flashcards

1
Q

1.​It is the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which is significant to police planning.

A

intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.​It is an evaluated material of every description including those derived from observation, reports, rumors, imagery, and other sources from which intelligence are derived.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are intelligence data that are not of an immediate value.

A

strategic intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.​It is the exploration of sources of information by the collection agencies, and the delivery of the information obtained to proper intelligence unit.

A

collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5.​It is a repetitive process used to produce intelligence from information.

A

intelligence cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6.​The reliability of the source is “highly reliable” and the accuracy of information is “confirmed information’ what will be the evaluation rating of the information.

A

A-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7.​He is the father of organized military espionage.

A

Frederick the Great

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.​It is in this phase of intelligence cycle in which information becomes intelligence.

A

processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9.​It includes the systematic exploitation of all sources of information, and it must be methodical, continuous, and carefully controlled.

A

collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10.​Are those items of information regarding criminals or subversives, and that needs to be collected and/or processed in order to meet the intelligence requirements of police executives.

A

priority intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. ​It is the timely conveyance of information and or intelligence in any appropriate form and by any suitable means.
A

dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. ​It is the observation of a person, place or thing, generally—but not necessarily—in unobtrusive manner.
A

surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13.​Also called as a plant or fixed surveillance, here the surveillant remains essentially in one position or locale.

A

stakeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

14.​The term roping described this situation, and it is said to be planted

A

shadow??? Or stakeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

15.​The subject is kept under constant surveillance, and the aim is not to loose him even at the risk of being made.

A

​close surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16.​ It is a surveillance involving the use of scientific devices to enhance hearing or seeing the subject’s activities.

A

technical surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

17.​To be detected or suspected of being surveillant by the subject.

A

Be made??? Or burnout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

18.​It is a devise which provides a means of systematic arrangement of information by type of subject.

A

intelligence workbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

19.​It is not usually a major factor in prompting an individual to furnish information, but is can be potent at times.

A

gratitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

20.​ It is an individual who openly or secretly obtained or who assist in obtaining information for intelligence and counter-intelligence purposes.

A

informant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

21.​ Individuals who are selected, trained and utilized as continuous covert sources of information concerning specific intelligence aspects.

A

recruited informant​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

22.​ Individuals who are simultaneously employed by two opposing intelligence agencies with one of the agencies aware of his dual role.

A

double agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. ​It is a means by which individual, groups or organization conceals the true nature of its activities and existence from observer.
A

undercover assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

24.​ It is an individual who provides information because of monetary consideration.

A

informer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

25.​ It is an inquiry into the specific phases of an individual life history, including to a minimum, national agency check, character reference, and former employers.

A

national agency check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

26.​It is an inquiry into the loyalty, integrity, character, morale, and discretion of an individual because of the sensitive position he holds, or is about to assume.

A

personnel security​ investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

27.​This is an information or materials whose unauthorized disclosures would cause grave damage to the security.

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

28.​When a surveillant’s behavior causes the subject to surmise or know that he or she is under surveillance.

A

burn the surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

29.​This letter represent that the source of intelligence information is from tactical interrogation of captured enemy.

A

W

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

30.​ Information or material in any form, or of any nature, the safeguarding of which is necessary in the interest of national security.

A

classified matters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

31.​ It is the act of changing the assigned classification of a document or material.

A

declassify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

32.​ It is the assigning of an information or material to one of the four security classification.

A

classify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

33.​ A properly trained and cleared individual who assist the head of the department in discharging the responsibilities of safeguarding classified documents and materials.

A

security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. ​It is the term given to the requirement to those persons whose official duty requires knowledge of possession thereof.
A

need-to-know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

35.​It is the granting of access to classified document or information.

A

compartmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

37.​ Information or material the unauthorized disclosure of which would cause administrative embarrassment of unwarranted injury.

A

confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

38.​Information or material the unauthorized disclosure of which would endanger national security and will cause serious injury.

A

secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

39.​Information or material the unauthorized disclosure of which would cause exceptionally grave damage to the nation.

A

top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

40.​It is any recorded information regardless of its physical form or characteristics.

A

document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

41.​Information or material in any form, the safeguarding of which is necessary in the interest of national security.

A

​A. ​classified document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

42.​That aspect of police intelligence activities relating to all security measures, both offensive and defensive.

A

counter-intelligence

42
Q

43.​Counter intelligence measures that seek to conceal information from enemy.

A

passive-defensive​

43
Q

44.​Counter intelligence measures that seek to block the enemy’s effort to engage in espionage, sabotage or subversion.

A

active-offensive

44
Q

45.​It encompasses measures taken by an office or group to protect itself against espionage, enemy observation, sabotage, or subversion.

A

police security

45
Q

46.​It encompasses active and passive counter-intelligence measures affecting civilians permanently or temporarily residing in an area under police or military jurisdictions.

A

civil security

46
Q

47.​It is the employment of active-counter intelligence techniques and procedures in the conduct of clandestine or covert operations.

A

special operation

47
Q

48.​It is the control and examination of communications to prevent the transmission of information that may fall to the hand of the enemy.

A

censorship

48
Q

49.​It includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty.

A

personnel security

49
Q

50.​It is an inquiry into the character, reputation, discretion and loyalty of an individual.

A

​Personnel Security Investigation

50
Q

51.​ It is any position within the government, police, military, the occupant of which could bring about by virtue of the position a material adverse effect to national security.

A

sensitive position

51
Q

36.​Information and material which requires special protection, and this not anymore required cover sheet.

A

Restricted

52
Q

52.​This is an investigation of an individual made upon the basis of written information supplied by him in an official inquiry.

A

national agency check

53
Q

53.​This is a type of investigation which consists of written inquiries sent to appropriate local government agencies.

A

local agency check

54
Q

54.​This is much more comprehensive investigation.

A

background investigation?

55
Q

55.​Consist of the investigation on the background of individual, particularly all the circumstances of his personal life.

A

complete background investigation

56
Q

56.​Consist of the investigation of the background of an individual, but limited only to some of the circumstances of his personal life.

A

Partial background investigation

57
Q

57.​It is valid for five years unless sooner revoked by the issuing authority.

A

final???

58
Q

58.​These are the purpose of police intelligence activity

A
  • ​to reduce error​​
  • to increase accuracy​
  • to help in decision making
59
Q

59.​It is primarily designed to enable the officer of unit to achieve and maintain a sound and effective security system.

A

security education.

60
Q

60.​This consists of initial briefing on security, its various aspects, and its importance and it is made to the new personnel and employees.

A

security indoctrination

61
Q

61.​It is the determination of the pertinence or significance of the information relative to police operations.

A

evaluation

62
Q

62.​The process of making conclusions from integrated intelligence and/or information.

A

deduction

63
Q

63.​It is the graphic representation of the current enemy situation.

A

situation map

64
Q

63.​It is the graphic representation of the current enemy situation.

A

1

65
Q

64.​A cautious surveillance, because the loss of the subject is preferred to possible exposure.

A

loose surveillance

66
Q

65.​A surveillance with little or not attempt at concealment, the subject is most likely aware of the surveillance, but must not be lost.

A

​open surveillance

67
Q

66.​The subject is followed so closely that surveillant and subject are almost in lock step.

A

close surveillance?

68
Q

67.​A form of open surveillance in which the subject’s vehicle is closely followed.

A

Tail gaiting

69
Q

68.​Its functions is to serve as the intelligence and counter-intelligence operating unit of the Philippine National Police.

A

NICA?

70
Q

69.​It is a difficult one, in all cases it must be a close one or the person being followed will be lost.

A

One-man method

71
Q

70.​It is a close tail, with other members of the squad keeping contact with those immediately ahead of them.​

A

Leaf frog method

72
Q

71.​This is close tail, and is necessary only when discovery is preferable to losing the subject.

A

1

73
Q

72.​It is the visual inspection of an area, installation or building to determine its suitability for operational activities.

A

Stake out

74
Q

73.​It is one of the principal activities of police intelligence operations, and limited activities on this will usually produce a limited intelligence product.

A

Iiaison activities

75
Q

74.​The intelligence operatives are being asked about his personal experiences and observations while conducting intelligence operations.

A

De-briefing

76
Q

75.​It is an important method of gathering intelligence data, and this is an excellent source of highly valuable material.

A

News clipping

77
Q

76.​Those assigned with the mission of obtaining information within a specific target.

A

penet informants

78
Q

77.​Those that is available for counter-intelligence mission at all times, and who may derive the major part of their income from their work as informants.

A

full time informants

79
Q

78.​Individuals who furnish information with no intention of repeating his services or furnishing information on a continuing basis. ​

A

incidental informants

80
Q

79.​A cover that is general in nature and relatively permanently adopted to explain the work presence in any given area.

A

cover for status

81
Q

80.​A cover designed to explain away or allow to perform a given clandestine activity, it may be an extension of cover for status.

A

cover for action

82
Q

81.​Agent’s must make sure that every public action he takes fits his assumed cover, and that a total picture presented to others accurately reflects his cover.

A

living one’s over​

83
Q

82.​A cover which completely fits the true background and capabilities of the agent.

A

natural cover

84
Q

83.​Using true or actual personal background to fit for the purpose.

A

Natural cover

85
Q

84.​A cover using biographical data adopted for the purpose that is fictitious.​

A

Artificial cover

86
Q

85.​It includes provisions for sufficient contact between the undercover agent, and the target of interest to produce worthwhile results.

A

Continuous contact

87
Q

86.​The cover story must include the material on all aspects of the undercover agent’s previous background, regardless of whether or not it is anticipated that this information will be required.

A

Mutual interest

88
Q

87.​Two kinds of opportunity must prevail if an individual is to function as an informant, most often and the rest of the time, it is provided by,

A
  • chance
  • propinquity
  • proximity
89
Q

88.​The undercover agent is required to develop friendship and trust with the target personality for the purposes of obtaining information or evidence.

A

Personal contact

90
Q

89.​It places the undercover agent in a type of employment where he can observe the activities of the subject at his place of work.

A

social assignment

91
Q

90.​It is the process of evaluating the person’s suitability for a security clearance.

A

Adjudication process

92
Q

91.​This is a form required to an individual who is being processed for a security clearance.

A

personal hist statement

93
Q

92.​Those by virtue of their official positions are expected or obligated to furnish information openly.

A

Automatic informants

94
Q

93.​Individuals who by social or professional position, posses or has access to information of continuing interest.

A

Casual informants

95
Q

94.​This is a continuous and systematic program designed to meet the security needs of the office or unit.

A

Security indoctrination

96
Q

95.​This is a phase of security education program which makes use of security posters, slogans, signs and stickers.

A

Security reminders

97
Q

96.​This is a motive wherein persons hold belief inimical to their country, and they are of course vulnerable to the approach of the subversive groups or enemies.

A

Ideological benefits

98
Q

97.​On of the most powerful motivations that make people susceptible to pressure.

A

Weakness of character

99
Q

98.​It is an individual who accept every story at face value and can see no wrong in anyone, and they fall into this category.

A

Gullibility

100
Q

99.​Because of this, such a person, approached with the lure of a large sum of money is very vulnerable and a definite security risk.

A

Serious indebtedness

101
Q

100.​It is someone from the enemy side held as prisoner while the war is going on.

A

Internee