LEA2 Flashcards

1
Q

A security guard shall watch and secure the property of the person, firm or establishment with whom he or his agency has a contract for security services.

A

Territorial Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security guard or private detective is not a police officer and is not, therefore, clothed with police authority. However, he may arrest a person under the circumstances mentioned in Section 5, Rule 113, Revised Rules of Criminal Procedure.

A

Arrest by Security Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any security guard may, incident to the arrest, search the person so arrested in the presence of at least two (2) witnesses.

A

Search without Warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

committed by any person, who with intent to gain but without violence, against, or intimidation of persons nor force upon things shall take personal property of another without the latter consent.

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An individual may need or desire to commit the act because of financial problem,
inadequate income, extravagant living, gambling.

A
  1. The need or desire .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

-is an irresistible urge to steal items of trivial value. People with
this disorder are compelled to steal things, generally, but not limited to, objects of little or no significant value.

A
  1. The psychological need (Kleptomania
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The individual with such tendency may be more tempted to steal if security control are inadequate.

A
  1. The criminal tendency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One who steals due to his inability to resist the unexpected opportunity and has a little fear of detection

A

Casual Pilferer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.

A

Systematic Pilferer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is the protection resulting from the application of various measures which prevent or delay the enemy or unauthorized persons in gaining information through the communication system.

A

COMMUNICATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

component of communications security which results from all measures designed to protect transmission from interception.

A

Transmission Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

results from the provisions of technically sound crypto-system and their proper use.

A

Cryptographic Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

providing safeguards to equipment and material from access by unauthorized persons.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the monitoring of telephone conversations by a third party, often by covert means.

A

Wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

means to secretly listen to or record a conversation using a hidden electronic device.

A

Bugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the unauthorized real-time interception of a private
communication, such as a phone call, instant message, videoconference or fax transmission.

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • An Act to prohibit and penalize wiretapping and other related violations of privacy of communication, and other purposes.
A

RA No. 4200, Approved June 19, 1965

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

specialized type of physical security protecting the assets, personnel and operation of a bank, with special emphasis on the precaution and measures to safeguard the cash and assets while in s storage, in transit, and during transaction.

A

Bank security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Circular issued by BSP concerning regulations on Bank protection which aims to promote maximum protection of life and property against crimes (robbery, theft, etc), and other destructive causes.

A

Bangko Sentral ng Pilipinas (BSP) Circular No. 620 Issued on September 3, 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BSP requires that all banking offices be manned by adequate number of security personnel to be determined by the bank, taking into consideration its size, location, costs and overall bank protection requirement.

A

Guard System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Banks are required to have a robbery alarm or other appropriate device for promptly notifying law enforcement office either directly or through an intermediary of an attempted, ongoing or perpetrated robbery.

A

Security Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

all armored vehicles are required to be built with bullet resistant materials capable of withstanding the firepower of high powered firearm (M16, M14).

A

In armored Car operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security involving the protection of documents and information from loss, access by unauthorized persons

A

INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • Any material that contains marks, symbols, or signs, either visible, partially visible or completely invisible that may be presently or ultimately convey a meaning or message to someone.
A

Document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
refers to the act of assigning to information or material one of the four security classification categories after determination has been made that the information requires the security protection
Classify
26
Is an administrative determination that an individual is eligible from a security standpoint for access to classified matter of specifiy category
Security clearance
27
Refers to the grant of access to classified matter only to properly cleared persons when such classified information is required in the performance of their official duties, and restricting it to specific physical confine when feasible.
Compartmentation
28
term given to the requirement that the dissemination of classified matters be limited strictly to those persons whose official duties require knowledge thereof.
Need to know
29
any information and material, the unauthorized disclosure of which would cause exceptionally grave damage to the nation, politically, economically or militarily;
Top secret
30
any information and material, the unauthorized disclosure of which would endanger national security, cause serious injury to the interest or prestige of the nation or any governmental activity.
Secret
31
any information and materials, the unauthorized disclosure of which would be prejudicial to the interest or prestige of the nation or governmental activity or would cause administrative embarrassment or unwarranted injury.
Confidential
32
any information and material which requires special protection other than those determined to be Confidential, Secret, and Top Secret matters.
Restricted
33
METHOD OF TRANSMISSION
1. By direct contact of officer or personnel concerned; 2. By official courier; 3. Electrical means in cryptographic form 4. Registered Mail
34
DESTRUCTION
1. Burning 2. Shredding
35
shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to fire.
Storage
36
part of physical security that deals primarily with the protection of processes, formulas, patents, and other industrial and manufacturing activities from espionage, infiltration, loss, compromise or photocopying;
OPERATIONAL SECURITY
37
Information is discovered and develop
The creation of
38
Some action is take with the information;
Used
39
Stored for future use
Storage and retrieval
40
transferring of information from active to inactive use;
Transfer
41
decision may be made to retain the information indefinitely.
Disposition
42
information which some special way is related to the status, operations or activities of the possessor over which the possessor asserts ownership.
PROPRIETARY INFORMATION
43
It may consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives one opportunity to gain an advantage over competitors who do not know or use it.
Trade secret
44
grant given by the government to an inventor, conveying and securing to him the exclusive rights to make, use and sell his invention for term of twenty (20) years.
Patent
45
AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY CODE AND ESTABLISHING THE INTELLECTUAL PROPERTY OFFICE, PROVIDING FOR ITS POWERS AND FUNCTIONS, AND FOR OTHER PURPOSES
Republic Act No. 8293
46
systematic program for gathering and analyzing information about competitor’s activities and general business trends to further company’s goals.
Competitive Intelligence
47
information available from company publication, public records or commercial reporting sources
White
48
not readily available but which is usually can be obtained without acquiring any civil/criminal liability in the process.
Gray
49
obtained through clearly unethical or illegal means.
Black
50
This is an irreplaceable records , reproduction of which does not have the same value as the original;
Class I – Vital Document
51
This is a record, reproduction of which cause considerable expense and labor, or considerable delay.
Class II – Important Document
52
This is a record, the loss of which may cause inconvenience but could be readily replaced and may not present insurmountable obstacle to the prompt restoration of the business;
Class III – Useful Document
53
This record may include daily files, routine in nature, lost of which will not affect the organization.
Class IV- Non essential Document
54
a metallic container used for safekeeping of documents or small items in office or installation.
Safe
55
a heavily constructed fire and burglar resistant container usually part of the building structure use to keep and protect cash, documents and negotiable instruments.
Vault
56
a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work on the records inside,
File room
57
refers to the procedure followed, inquiries conducted, and criteria applied to determine the work suitability of a particular applicant or the retention of a particular employee.
Personnel security
58
It is an inquiry into the character, reputation, discretion, integrity, morals, and loyalty of an individual in order to determine a person’s suitability for appointment or access to classified matter.
PERSONNEL SECURITY INVESTIGATION (PSI)
59
TYPES OF PSI
1. National Agency Check 2. Local Agency Check 3. Partial Background Investigation 4. Complete Background Investigation
60
It is an inquiry which aims to verify applicant’s information written at the applicants form, to ascertain his/her past employment experiences and to obtain other information pertinent to the decision to employ.
BACKGROUND INVESTIGATION (BI)
61
faithful allegiance to the Philippine government and its duly constitutional authorities;
Loyalty
62
uprightness in character, soundness of moral principle, freedom from moral delinquencie
Integrity
63
the ability or tendency to act or to decide with prudence, the habit of wise judgment;
Discretion
64
distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person;
Morals
65
the sum of traits that have been impresses by nature, education and habit upon the individual;
Character
66
opinion or estimation in which one is generally held. It is what a person is reported to be whereas character is what a person is.
Reputation
67
- A fact finding probe to determine a plant’s adequacy in all aspects of security, with the corresponding recommendations. - Refers to checklist, audits, or inventories of security conditions.
SECURITY SURVEY
68
often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK ASESSMENT SURVEYS
Security survey
69
“ a direct comparison of the cost of operation of the security unit and all the existing security measures with the amount of the corporate assets saved or recovered as well as reduction of losses caused by injuries and lost production and recommendations have been made”.
Cost benefit analysis
70
Process of developing methods or procedures or an arrangement of parts intended to facilitate the accomplishment of a definite objective. -The process of setting goals, developing strategies, and outlining tasks and schedules to accomplish the goals.
Planning
71
 It is PRE-DETERMINING a course of action;  It is deciding IN ADVANCE what to do, how to do it, and who is to do it.
Security planning
72
>Changes in Personnel and Facilities
KEEPING THE PLAN UP TO DATE
73
It is defined as the exposure and teaching of employees on security and its relevance to their work. Security education is conducted to develop security awareness among employees of the company.
Security education
74
Protection of personnel especially ranking official from any harm, kidnap, and others act. VIP security is type of personnel security
Personal security
75
is mandated by law to provide protective security to government officials, foreign dignitaries, and private individuals authorized to be given protection and also provide physical security to vital installations, and assist the Presidential Security Group (PSG) in securing the President and the members of the First Family.
POLICE SECURITY PROTECTION GROUP (PSPG)
76
state or quality of being secured or freed from danger. It may also includes the various means or device designed to guard a persons and property against a broad range of security hazard.
Protective custody
77
is an indication of something impending and usually undesirable or unpleasant, with an intention to inflict evil, injury or damage on another, usually as retribution or punishment for something done or left undone.
Threat
78
the process of investigation/validating the truthfulness of the existence of threat to an individual.
Threat assessment
79
condition or state that danger has already occurred which resulted to loss of life/liberty and/or there is imminent danger or threat to life and property where delay will endanger or may cause the loss of life/property.
Emergency situations
80
authenticated list of personnel given to the security allowing entry to a compound or installation or part thereof;
Access list
81
an area near or adjacent to limited or exclusive areas where entry is restricted;
Controlled area
82
practical test or exercise of plans or any activity to test its validity, an operational readiness exercise;
Dry run
83
of code system so that security personnel or any employee when forced by armed men intending to enter an installation can five alarm by the use of certain words in casual conversation with personnel in the installation.
Duress code
84
restricted area containing materials or operation of security interest;
Exclusion area
85
any area access to which is subject to special restriction control;
Restricted area
86
Is any act or condition, which may result in the compromise of information, loss of life, loss or destruction of property or disruption of objectives of the installation.
Security hazard
87
form of physical security that is concerned with the physical measures designed to safeguard personnel and prevent unauthorized access to equipment, facilities, materials, documents, and to protect them from espionage, sabotage, damage or theft.
1. Industrial Security
88
Is the protection resulting from the application of various measures which safeguards cash and assets which are in storage, in transit and or during transaction.
Bank security
89
Involves the protection of processes, formulas and patents, industrial and manufacturing activities from espionage, infiltration, loss, compromise or photocopying.
Operational security