Sei sulla pagina 1di 18

1

MULTIPLE CHOICE QUESTION BANK ON INDUSTRIAL SECURITY

PREPARED BY Insp/Exe Johnson PK

Choose the correct answer from the options


1--------------- is an intentional destruction to the production capability of an Industrial undertaking.
( a. Subversion b. Espionage c. Sabotage d. Pliferage )
2. Sabotage can be done by
(a. An employee b. Enemy agent c. A competitor d. All of these)
3.-------- is not a method of Sabotage
( a. Stealing of information b. Fire c. Explosion d. Damaging power supply)
4. Winning over the loyalty of employees for destructive designs is
( a. Sabotage b. Subversion c. Retranchement d. Lockout)

5. ----------forms the first layer of security.


( a. Surveillance b. Patrolling c. Lighting d. Perimeter)
6. Perimeter wall is designed to;
( a. Prevent authorized entry b. Prevent unauthorized entry c. Beautification d. Erect gates)
7. -----------is a type of perimeter barrier
( a. CCTV b. Fence c. Watch Tower d. Static duty post)
8. The structure thickness of a perimeter wall should be----
( a. One brick b. One and a half brick c. One meter d. One ft)
9. ------------------ is not a type of fence.
( a. Concertina b. Barbed wire c. CGI Sheet d. Taut wire)
10. Barbed wire fences are ----------------------
( a. Very costly b. Easy to Install c. Difficult to erect d. Opaque)

11. Which is not included in the definition of Industrial Security ?


a. Physical Security b. personal security c. VIP Security d. Information Security
12. Which is not a component of Industrial Security ?
a. Man power b. equipment c. Procedure d. External Influence
13. ____________is not an anti- sabotage check
a. Trolley search mirror b. Explosive Vapour Detector c. metal detector d.
Perimeter lighting

14. Total expenditure incurred on a final product does not include –


a. Cost of raw material b. cost of services c. cost of future developments d. cost of
depreciation
15. To reduce the cost of CISF which of the following considered irrelevant ?
a. Security provided on need basis b. Avoid internal security duties c. privatizing
non-key functions d. multi skilling of personnel
16. Which is not a non recurring expenditure on CISF ?
a. Training Charges b. Supervisory charges c. Initial issue of clothing d. Housing
and offices
17. Which is considered irrelevant in a security Audit ?
a. Security protocol is adhered or not b. whether deviated from initial security survey
c. Does not suggest future security needs d. Enhances efficiency of security
18. Which of the following is considered irrelevant when Security audit is needed -
a. Cost incurred on security is more b. recurring incident/accidents c. there is heightened
threat of terrorism d. to re-organise security set up
2

19. Which is not a step while carrying out security audit?


a. Preparation b. Expenditure statement c. Field visit d. Evaluation and
reporting
20. Prevention of loss to assets includes:
a. Property b. Image c. personnel d. goodwill of local people
21. Security is affected by which of the following factors-
a. Human factors b. Non human factors c. both a & b
22. Security principle does not include –
a. Deter b. Delay c. Decide d. detect
23. High level security includes-
a. Watchman with basic communication equipments b. sophisticated alarm system c.
CCTV d. High security locks
24. Maximum Security does not include-
a. Outside response force b. armed response force c. high security locks d.
sophisticated alarm systems
25. Arrange the level of security in chronological order; 1. minimum security 2. medium security,
3. maximum security, 4. high level security, 5. low level security
a. 1,5,2,4,3 b. 5,1,2,3,4 c. 2,3,1,4,5 d. 2,1,5,4,3
26. Which of the following does not include purpose of perimeter security ?
a. First layer of security b. Helps in denial of unauthorised entry c. helps in
surveillance d. creates legal liability
27. perimeter barrier is designed to
a. keep watch on unauthorised entry b. regulate authorized entry c. psychological
deterrent d. keep all activities in control
28. Types of perimeter protection does not include
a. Walls b. fences c. barriers d. patrolling
29. ___________ is not a type of perimeter wall
a. stone masonry wall b. concrete wall c. brick masonry wall d. CGI sheet
30. choose the disadvantage of stone masonry wall
a. Cheapest to build b. does not require specialized equipment c. susceptible to heavy
rain d. opaque
31. Choose the advantage of stone masonry wall
a. Limitation on height b. prone to breach by tunneling c. cheapest to build d.
requires frequent maintenance
32. Choose advantage of brick masonry wall
a. Better aesthetic b. limitation on height c. brick are prone to pilferage d. prone to
breach by tunneling
33. Choose the advantage of concrete wall
a. Moderate cost b. takes longer time to construct c. very high strength d.
specialized labour required
34. Height of perimeter wall should be
a. 8 feet b. 9 feet c. 7 feet 8. 10 feet
35. Height of overhang should be
a. 3 feet b. 2.5 feet c. 3.5 feet d. 2 feet
36. Which of the following fence is not considered having batter aesthetic
a. Barbed wire b. concertina wire c. power fence d. CGI sheet
37. Which is not an advantage of barbed wire fence
a. easy to install b. can be breached very easily c. cheapest d. does not require
much structural support
3

38. Which of the following is the advantage of chain link fence ?


a. Requires specialized manpower to erect b. periodical maintenance c. no limitation
on height d. prone to rusting
39. Which of the following is a disadvantage of concertina wire fence ?
a. Most difficult to penetrate b. easy to lay c. very expensive d. resist forcible entry
by vehicles
40. choose the disadvantage of CI sheet fence?
a. Blocks vision of plant b. resist against tunneling c. susceptible to theft d. easy
to install
41. Choose the advantage of steel grill fence ?
a. High cost b. breach by tunneling c. high strength d. breach b climbing over
42. Choose the advantage of power fence
a. Requires power source b. large area can be covered c. Highly cost intensive
d. breach by tunneling
43. For better strengthening of perimeter security which of the following is considered most
relevant ?
a. Minimum lighting b. maximum gates c. allow vegetation over wall to check
intrusion d. patrolling
44. To check vulnerabilities of perimeter protection, which of the following is considered least
preferable ?
a. Underground should be deep enough to protect tunneling b. middle portion is to be
constructed with strong material to prevent cutting/ breaking c. top guard can be
with spikes or glass pieces to check climb over d. structure should be strong to
protect environmental conditions
45. Height of watch tower should be
a. 30 feet b. 12 feet c. 10 feet d. 4 to 6 feet higher than highest obstacle nearby
46. Watch tower is a _____________
a. Perimeter protection system b. surveillance system c. intrusion detection system
d. mere static duty point
47. Which is not a type of watch tower ?
a. Wood b. bamboo c. steel d. hay stalk
48. Which of the cannot be an ideal place for erecting watch tower
a. Fuel dumps b. railway gate c. main gate d. scrap yard
49. Ideal watch tower should have –
a. Bed to take rest b. Narrow steps c. communication facility d. steep ladders
50. Ideal lighting in a watch tower is –
a. Full illumination b. flood light c. inward focused light d. outward
focused light
4

KEYS:

1. C. SABOTAGE
2. D. ALL OF THESE
3. A. STEALING OF INFORMATION
4. B. SUBVERSION
5. D. PERIMETER
6. A. PREVENT AUTHORISED ENTRY
7. B. FENCE
8. B. ONE AND HALF BRICK
9. D. TAUT WIRE
10. B. EASY TO INSTALL
11. C. VIP SECURITY
12. D. EXTERNAL INFLUENCE
13. D. PERIMETER LIGHTING
14. C. COST OF FUTURE DEVELOPMENT
15. B. AVOID INTERNAL SECURITY DUTIES
16. C. INITIAL ISSUE OF CLOTHING
17. C. DOES NOT SUGGEST FUTURE SECURITY NEEDS
18. A. COST INCURRED ON SECURITY IS MORE
19. B. EXPENDITURE STATEMENT
20. D. GOOD WILL OF LOCAL PEOPLE
21. D, BOTH A & B
22. C, DECIDE
23. C, CCTV
24. C, HIGH SECURITY LOCKS
25. B, 5,1,2,3,4
26. C, HELPS IN SURVEILLANCE
27. B, REGULATE AUTHORISED ENTRY
28. D, PATROLLING
29. D, CGI SHEET
30. C, SUSCEPTIBLE TO HEAVY RAIN
31. C, CHEAPEST TO BUILD
32. A, BETTER AESTHETIC
33. C, VERY HIGH STRENGTH
34. A, 8 FEET
35. B, 2.5 FEET
36. D, CGI SHEET
37. B, CAN BE BREACHED VERY EASILY
38. C, NO LIMITATION ON HEIGHT
39. C, VERY EXPENSIVE
40. C, SUSCEPTIBLE TO THEFT
41. C, HIGH STRENGTH
42. B, LARGE AREA CAN BE COVERED
43. D, PATROLLING
44. C, TOP GUARD CAN BE WITH SPIKES OR GLASS PIECES TO CHECK CLIMB OVER
45. D, 4 TO 6 FEET HIGHER THAN HIGHEST OBSTACLE NEARBY
46. B, SURVEILLANCE SYSTEM
47. D, HAY STALK
48. C, MAIN GATE
49. C, COMMUNICATION FACILITY
50. D, OUTWARD FOCUSED LIGHT

51. Interior lighting in a watch tower should be


a. Minimum b. maximum c. No lighting at all d. focus light
52. Site of watch towers should overlap with each other because –
a. Sentries can easily communicate b. sentries can inform control room easily c.
one can perform duty while other can take rest d. can keep eye to eye contact
53. Watch tower should be sited-
a. Outside perimeter wall b. adjacent to perimeter wall c. 10 to 12 feet inside
perimeter wall d. along perimeter wall
54. Which is essential in an ideal watch tower, arrange on priority basis – 1. drinking water 2.
communication 3. revolving light 4. binoculars
a. 3,4,2,1 b. 4,3,2,1 c. 2,3,4,1 d 1,2,3,4
55. In a situation where fire has to open in a watch tower what would be the right procedure
a. Inform control room
5

b. Will follow SOP


c. Act according to situation
d. Will inform supervisory officer for orders
56. Which of the following weapon is preferable in a sensitive watch tower
a. Pistol/ carbine
b. Long range, light and automatic
c. Long range weapon
d. Grenade launcher
57. What is wattage ?
a. It is the amount of light energy given out per second
b. It is the amount of light energy given out per hour
c. It is the electrical power consumed by light/ source
d. It is the amount of light energy falling on a given surface
58. A typical security light should have the following luminance level-
a. 5000 lx b. 100 lx
c. 0.25 lx d. 50 lx
59. Which is not a light source
a. Luminance
b. Incandescent
c. Fluorescent
d. Mercury vapour
60. full form of CFL is
a. Contact fluorescent lamp
b. Condensed fluorescent lamp
c. Compact fluorescent luminance
d. Compact fluorescent lamp
61. What is the principle of good lighting ?
a. More light
b. Adequate light
c. Minimum light
d. Excessive light
62. Pick out the reason for ineffective lighting
a. Glare and clutter
b. Adequate lighting
c. Shielded lighting
d. Aligned light fixtures
63. Which is not ideal for good security lighting ?
a. Controlled lighting
b. Trip lighting
c. Shielded lighting
d. Excessive lighting
64. Purpose of patrolling does not cover which of the following
a. Re inforcement
b. Fill up gap between two static duty points
c. Information gathering
d. Surveillance
65. Armed patrol should have minimum________ number of persons
a. Two
b. Four
c. Three
6

d. A section
66. Advantage of foot patrol excludes-
a. Observe area minutely
b. Facilitate collection of information
c. Cover large area
d. Can watch criminals stealthily
67. Advantage of foot patrolling includes –
a. Cover smaller area
b. Physical fatigue
c. Affected by weather conditions
d. Security breaches can be noticed
68. Pick out advantage of vehicle patrolling
a. Minimum personal contact
b. Element of surprise minimum
c. Sound of vehicle will detract alertness
d. Can cover larger area
69. Effective patrolling excludes
a. Communication facility
b. Arms and ammunition
c. Changing of timings
d. Same route
70. What would you do when you find suspected material in plant while performing patrolling
a. Call the police
b. Call control room, CISF
c. Call BDDS
d. Runaway for shelter

71. Tsunami is a potential threat pose to


a) Sea Port b) Units in high altitude c) Units away from sea shore
d) Steel Sector

72. Accidents happen by


a) Natural changes b) Intentional act of men c) Unintentional act of men
d) Inducement

73. Employee’s morale is


a) not an asset b) tangible asset c) intangible asset d) High asset

74. The value of an asset which can not be measured in terms of money is called as
a) Extrinsic b) Intrinsic c) Dollar d) Valueless

75. The asset, loss of which proves catastrophic is called as


a) Secondary b) Important c) Vitald) Subsidiary

76. The dismissed person who caused damage to the industrial U/T is called
a) Potential Criminal b) Ideologue c) Avenger d) Criminal

77. Who among the following is an ideologue.


a) Disgruntled employee b) Professionals c) Human right activities
d) Loyal employee
7

78. Which of the following is not a material?


a) raw material b) by-products c) Instruments and tools d) software
79. Which materials are prone for theft and pilferage?
a) Consumable b) valuable and easily portable c) easily portable and marketable d) all
the above
80. The primary custodian of stored material is
a) store keeper b) general manager c) security personnel d) none

81. Responsibility of material on transit lies with


a) in charge of security escort b) Stores in charge c) management d) none

82. Incoming movement of material is authorized to


a) Purchase Orders b) Delivery chellans c) Verbal Orders d) Both (a) & (b)

83. Before entry of the materials into the stores, it


a) should be checked at the stores only b) should not be checked by the security
staff only c) Should be checked by the custodian of the stores only d) Should be
checked by both security staff and custodian.

84. Records of returnable materials should be


a) Accounted along with other materials b) Accounted separately
c) Accounted by General Manager only d) No need to keep account

85. Outgoing materials should be accompanied with


a) Visitor pass b) Materials out pass c) Chellan d) Invoice

86. Outgoing materials should have the description of


a) Nomenclature b)Accounting Unit & Quantity c) Signature of the authorized
person d) All of the above

87. While checking, you should check


a) Vehicles only b) Personnel only c) Items carried by persons d) All of the
above

88. The equipment used to check the bottom of vehicle is called as


a) CCTV b) Periscope c) Rear viewing mirror d) Trolley Mirror

89. Watch Tower is a


a) Modern Gadgetry b) Physical Security Element c) Lighting System d) All the
above

90. Watch Tower offers

a) Observation only b) Detection only c) Deterrence only d) All of the above

91. Watch Tower should be provided with


a) Revolving light b) Tube light d) Torch light d) None of the above

92. Lighting at the Watch Tower should be


8

a) Facing outwards b) Facing inwards c) Facing downwards d) None of the


above

93. Light is
a) Electrical spectrum b) Magnetic spectrum c) Electro Magnetic Spectrum d) Bulb

94. Wattage is
a) The electrical power consumed by the light b) Used to calculate the cost of
lighting c) Used to calculate efficiency of the bulb in LPW d) All of the above

95. Luminance is
a) Amount of light emitted b) Amount of electricity consumed c) Amount of light
energy falling on a given surface area d) All of the above

96. Luminance is measured in


a) Watt b) Volt c) LUX d) None of the above

97. Luminance level of direct bright sunshine is

a) 100 LUX b) 1000 LUX c) 10000 LUX d) 100000 LUX

98. Luminance level of full moon light is


a) 50 LUX b) 100 LUX c) 0.25 LUX d)200 LUX

99. Luminance level of artificial lights in homes is

a) 100 LUX b)200 LUX c) 300 LUX d) 400 LUX

100. Incandescent lamps are

a) Oldest and most popular b) Low cost c) Easily available and replaceable
d) All of the above
9

KEYS:

51. A, MINIMUM
52. D, CAN KEEP EYE TO EYE CONTACT
53. C, 10 TO 12 FEET INSIDE PERIMETER WALL
54. C, 2,3,4,1
55. B, WILL FOLLOW SOP
56. B, LONG RANGE, LIGHT AND AUTOMATIC
57. C, IT IS THE ELECTRICAL POWER CONSUMED
58. D, 50 LX
59. A, LUMINANCE
60. D, COMPACT FLUORESCENT LAMP
61. B, ADEQUATE LIGHT
62. A, GLARE AND CLUTTER
63. D, EXCESSIVE LIGHTING
64. D, SURVEILLANCE
65. B, FOUR
66. C. COVER LARGE AREA
67. A. COVER SMALLER AREA
68. C, SOUND OF VEHICLE WILL DETRACT ALERTNESS
69. D, SAME ROUTE
70. B, CALL CONTROL ROOM/ CISF
71. A) SEA PORT
72. C) UNINTENTIONAL ACT OF MEN
73. C) INTANGIBLE ASSET
74. B) INTRINSIC
75. C) VITAL
76. C) AVENGER
77. A) DISGRUNTLED EMPLOYEE
78. D) SOFTWARE
79. D) ALL THE ABOVE
80. A) STORE KEEPER
81. A) IN CHARGE OF SECURITY ESCORT
82. D) BOTH (A) & (B)
83. D) SHOULD BE CHECKED BY BOTH SECURITY STAFF AND CUSTODIAN.
84. B) ACCOUNTED SEPARATELY
85. B) MATERIALS OUT PASS
86. D) ALL OF THE ABOVE
87. D) ALL OF THE ABOVE
88. D) TROLLEY MIRROR
89. B) PHYSICAL SECURITY ELEMENT
90. D) ALL OF THE ABOVE
91. A) REVOLVING LIGHT
92. A) FACING OUTWARDS
93. C) ELECTRO MAGNETIC SPECTRUM
94. A) THE ELECTRICAL POWER CONSUMED BY THE LIGHT
95. C) AMOUNT OF LIGHT ENERGY FALLING ON A GIVEN SURFACE AREA
96. C) LUX
97. D) 100000 LUX
98. C) 0.25 LUX
99. A) 100 LUX
100. D) ALL OF THE ABOVE
10

101. Tube lights are

a) Incandescent lamp b) High intensity discharge lighting c) Fluorescent lamp d) Low


pressure sodium lamp

102. High intensity discharge lighting is best suited for

a) Smaller areas b) Office c) Large areas d) Homes

103. Reason for ineffective lighting is/are

a) Excessive lamination b) Unshielded light fixtures c) Glare and clutter


d) All the above

104. The person entering vital installations are issued with


a) No passes b) Special pass c) Labour pass d) Visitor pass
105 The gadgetry used in frisking of passengers in airports is
a) CCTV b) HHMD c) DFMD d) XBIS
106. Which animal can detect hidden explosives
a) Camel b) Horse c) Cat d) Dog

107. What type of light should be provided in Watch Towers


a) Red light b) Halogen light c) Revolving light d) Tube light
108. Door Frame Metal Detector is used at
a) Main entrance of building b) In the open ground c) In the middle of the hall d) Kitchen
109. Documents containing matters of national interest are--------------
a) Secret b) Top Secret c) Confidential. d) none of the above
110 A watch tower should have a ---------------
a) Blanket b) Telephone c) Material in register d) none
111. Employees working in a vital installation should be issued ------------passes
a) labour b) Special c)Visitor d) no pass
112. ----------------is a modern gadgets
a) CCTV b) Weight Bridge c)Watch Tower d) SLR
113. Perimeter fence is_______________
a) Costly b) Small in size c) Cheaper d) none
114. Perimeter wall should have ________________
a) Over hang b) Grown up trees by the side c) Drainage openings d) fence
115. The duty post manned round the clock in a particular area is called
a) Patrolling b) Static duty point c) Perimeter wall d) none
116. Causing damage to the production capacity of an Industrial undertaking is called—
a) Espionage b) Spying c) Sabotage d) none
117. A patrolling party should consist of at least ---------------
a) Two to three men b) One man c) Two platoons . d) 100 men
118. Dog can detect explosive with it’s sense of
a) Smell b) Taste d) Eye sight d) hearing

119. Documents containing matters of movement of army are--------------


a) Secret b) Top Secret c) Confidential. d) restricted
11

120. Stealing of information is ________________


a. spying b. espionage c. sabotage d. none of the above
121. -----pass is issued to a guest of an employee
a ) No pass b) Special pass c) Labour pass d) Visitors pass
122. The gadget used for baggage inspection is------------
a) CCTV b) HHMD c) DFMD d) XBIS
123. full form of RDX is
a. Research development explosive b. Research department explosive c. Review and
development explosive d. both (a) and (b)

124. Watch tower should have --------lighting


a) Red light b) Halogen light c) Tube light d) none of the above
125. HHMD is used in--------
a) Entrance of house b) Open ground c) Centre of a hall
d ) none of the above
126. Minimum height of a perimeter wall should be ------------------
a)10ft b) 6ft, c) 8ft, d) 12ft
127. -------------------- is used for access control
a) Walkie Talkie , b)Turnstile gate , c) X-BIS , d) ATC
128. A material pass should contain --------------------
a) Photo of the dealer, b) Specimen signature, c) Driver license, d) None of these
129. ------------------ is vital installation of an Airport
a) Watch tower, b) Cargo shed, c) ATC, d) None of these
130. ------------------is used for baggage screening in an Airport.
a) Computer, b) HHMD, c) DFMD, d) none of the above
131. Intentionally disrupting the production of an industrial undertaking is -----------------
a) Subversion, b) Espionage, c) Sabotage, d)Pilferage
132. ---------------- is a natural barrier.
a) Gates, b) Watch tower, c) Mountain, d) Fence
133 -------------------- is not a physical security measure.
a) Weigh bridge, b) Watch tower, c) Gates, d) Perimeter wall
134 Information collected in advance is ---------------------
a) Surveillance, b) Intelligence, c) Espionage, d)None of these
135. ----------------------- is used for making patrolling more effective.
a) News paper, b) Walkie-Talkie, c) HHMD, d) DFMD
136. VIP should be provided with ___________ for body cover
a) PSO b) Bullet proof car c) armed guard at house
d) none of these
137. Perimeter fence is a ________________barrier.
a. Physical b. special c. psychological d. none of the
above
138. HHMD is used for _________ of persons.
a. checking of baggage b. Frisking c. Surveillance
d. cargo checking
139. For exploding explosives________________is required.
a) Heat b) Detonator c) fire d) bomb
12

140. Collection of information from secret agent is _________method.


a) Overt b) surveillance c) open d) Covert
141. ______________is a natural barrier.
a) Gate b) sand bags c) trenches d) River

142. Documents containing matter of National security interest


are………documents
a) Unclassified b) Secret c) Top secret d) Confidential
143. Employees working in a vital installation should be issued with
………passes
a) Contractor labour b) Employee c) Visitor d) None of these

144. ……………….is a modern Electronic Security Gadget.


a) Weigh Bridge b) Watch Tower c) Photo Copier d) none of these
145. The main advantage of a perimeter fence is that it is ………..
a) easy to construct b) small in size c) cheaper d) More effective

146. Gates are meant for …………..


a) Challenging authorized entry b) Entering the premises easily
c) stopping workers d) Effective access control
147. The duty post manned round the clock in a particular area is
called………
a) Patrolling b) Static duty post c) Security post d) perimeter wall

148. ………………..is an abnormal loss


a) Loss by theft b) Loss by pilferage c) Loss by fire
d) None of these

149.What is excluded from access control ?


a) Regulation of authorized entry b) control of authorized entry c) Denial of unauthorised
entry d) Control of unauthorised entry
150. Which is not included in the principles of Access control ?
a) Identification and authorization b) Restricted entries c) Control of unauthorised entry
d) Denial of unauthorised entry
13

KEYS
101. c) Fluorescent lamp
102. c) Large areas
103. d) All the above
104. b) Special pass
105. b) HHMD
106. d) Dog
107. c) Revolving light
108. a) Main entrance of building
109. b) Top Secret
110. b) Telephone
111. b) Special
112. a) CCTV
113. c) Cheaper
114. a) Over hang
115. b) Static duty point
116. c) Sabotage
117. a) Two to three men
118. a) Smell
119. b) Top Secret
120. b) espionage
121. d) Visitors pass
122. d) XBIS
123. d. both (a) and (b)
124. d) none of the above
125. d ) none of the above
126. a)10ft
127. b)Turnstile gate
128. d) None of these
129. c) ATC
130. d) none of the above
131. c) Sabotage
132. c) Mountain
133. a) Weigh bridge
134. b) Intelligence
135. b) Walkie-Talkie
136. a) PSO
137. a. Physical
138. b. Frisking
139. b) Detonator
140. d) Covert
141. d) River
142. c) Top secret
143. d) None of these
144. d) none of these
145. c) cheaper
146. d) Effective access control
147. b) Static duty post
148. c) Loss by fire
149. d) Control of unauthorised entry
150. c) Control of unauthorised entry
14

151. Automated form of Access control excludes:-


a) Physical profiling b) key based pass c) card based pass d) biometric based pass
152. All round security in terms of security of material excludes ---
a) fool proof security b) proper lighting c) 24 x 7 static duty posts d) Minimum
gates
153. Material loss in a plant is mainly due to lack of –
a) Control in purchase frauds b) control in receipt of material c) control in movement
of stores d) all the above
154. Espionage is _____________
a) stealing of secret information b) stealing of all information c) using pimps for
stealing information d) stealing information through ethical means
155. Information leakage takes place due to ---------------------
a) attending union meetings b) show off among colleagues c) careless talk d) None of
the above
156. Motive of espionage does not include:
a) Greed for money b) subversive ideology c) defame the management d) hostile
intelligence agencies
157. Methods employed by for espionage does not include:-
a) talent spotting b) surveillance c) Under cover agent d) advertising in news
paper
158. Espionage can be countered by :
a) Information security b) counter espionage c) both ( a ) and (b) d) none of the above
159. Target of a saboteur can be -
a) assets difficult to replace b) assets difficult to destroy c) adequately protected assets
d) both (a) and (b)
160. Who is a saboteur ?
a) loyal employee b) retired employee c) disgruntled employee d) none of the above

161. Motive behind sabotage is to:


a) Defame management b. divert attention of security c. labour unrest d. all the
above
162. Methods used by a saboteur is ---
a. By damaging electrical supply b. by theft of vital parts c. by stealing information
d. both (a) and (b)
163. Sabotage can be countered by –
a. Enhancing internal security procedure b. exit interview c. identifying vital area d.
all the above
164. Subversion is -_____________
a. Winning over the loyalty of people for nefarious activities b. mental torture of
employees c. lending support to employee d. none of the above
165. Subversion is carried out by ___________________ method -
a) infiltration b. brain washing c. providing 3 Ws d. all the above
166. Strike is a weapon in the hands of
a. management b. administration c. workers d. both (a) and (b)
167. Strike is a / an _________________
a. unlawful act by management b. lawful act by workers c. right of management d.
none of the above
168. Employees resort to strike because –
a. to improve their working condition b. to enhance incentives c. to teach a lesson
to the management d. both (a) and (b)
15

169. Gherao is ______________


a. a lawful act by employees b. a lawful act by security personnel c. a lawful act by
management d. none of the above
170. Gherao is ______________
a. a peaceful way of demonstration b. wrongful confinement c. wrongful restraint
d. none of the above
171. To quench the ire of striking employees, CISF should resort to --------
a. lathicharge b. firing c. call police for assistance d. settle it amicably
172. What is general responsibility of security during labour unrest ?

a. Connect duty posts with integrated communication system b. mobilise striking reserve c.
provide medical assistance in case of contingency d. all the above
173. While escorting valuables, the security personnel should ______
a. observe strict vigilance b. adhere to rules and regulations c. inform police d.
all the above
174. While escorting valuables, the escorting party should -
a. know the topography of the area b. know the articles they are carrying c. know the
value of the articles they are carrying d. all the above
175. While escorting cash of Rs. 4 lakhs , the composition of guards should be ---
a. AC – 1, INSP – 1, HC- 2, CT- 8
b. INSP – 1, SI – 1, HC – 1, CT – 3
c. SI – 1, HC- 1, CT – 2
d. AC – 1, INSP – 2, SI – 1, HC/CT – 8

176. A top guard is ___________


a. nothing but a perimeter wall b. a high alert guard c. projection of iron angle above
perimeter wall d. a guard with sophisticated arms
177. What is black out ?
a. painting the main buildings in black b. complete cut off of lighting c. free from
security threat d. removing security from sensitive points
178. What is decoy light ?
a. Fully equipped with light b. using alternative light points c. having lighting
away from plant to look like a plant d. flood lights
179. Patrolling is more effective when equipped with
a. arms b. wireless c. both (a) and (b) d. none of the above
180. A model pass should have _______
a. signature of card holder b. signature of issuing authority c. signature of head of
department d. all the above
181. Patrolling party should not ____________
a. observe silence b. check all locks and seals c. use same routes d. attend briefing
and de briefing
182. Threats in an industrial undertaking is broadly ___________
a. due to act of man b. due to act of nature/ God c. due to mechanical/ system failures
d. all the above
183. Which is not a white collar crime -------
a. medical frauds b. welfare frauds c. bid rigging d. pilferage
184. Principles of Industrial Security is
a. It should be independent b. cost effective c. should be firm and polite d. all the
above
16

185. Which is not an access denial mechanism


a. perimeter barrier b. static duty c. watch tower d. pass system
186. Which is not a criteria while checking the antecedents of a person to be issued with pass
a. financial status b. marital status c. criminal record d. honesty and stability
187. What could be the method used in purchase department frauds –
a. receiving quotations from a false firms b. over payment c. pilferage by diversion of
material d. all the above
188. What is the advantage of access control systems ?
a. Risk reduction b. security cost reduction c. secure environment d. all the above
189. Strike is a threat and weapon in the hand of-
a) Employer b) Managing Director c) General Manager d) Workers

190 Which does not come under the category of strike?


a) Pen down or tool down strike b) Hunger c) Gherao d) Go slow
191. The action of Gherao completes when-
a) M D is stopped to enter in the undertaking
b) M D is stopped to enter his office
c) M D is stopped to enter his house
d) M D is confined
192 Strike is-
a) A tool to pressurize the Management b) Always legal c) Mandatory d) Always Illegal
193 Which one of the following is required to resort to Strike?
a) Licence from the Govt. b) Notice in advance c) Permission of Management
d) Permission of District Magistrate
194. During the course of labour unrest, which one of the following is required?
a) Surveillance on the activities of union leaders
b) Counting of contractor labourers
c) Issue of visitor passes
d) Checking of vehicles
195 Espionage is-
a) Stealing of state secret b) Being Involved in theft c) Misappropriation d) Trespassing
196. Which is not a technology in aid of espionage?
a) Telephone Tapping b) Cellular Phones c) Gramophone d) Laser microphone
197. Which is a not counter measure of espionage?
a) Information security b) Access control c) Vigilance and surveillance
d) Organizing religious Sabha
198. Which method is not employed by an Espier?
a) Talent spotting b) Undercover agent c) by self introduction d) Trespass

199. Which is not included in Industrial Security?


a) Physical Security b) Material Security c) Information Security d) Highway Security
200. Dynamics means-
a) Vulnerability assessment
b) Study of forces in motion and changes over time.
c) Document Security
d) Security of information
201. Which is not Human factor affecting Security?
a) Espionage b) Explosion c) Cyclone d) Agitation
202. Occupational hazards in an industry are -
a. unexpected b. quick on set time c. may result in disease d. none of these
17

203. which are the areas where dogs can be used –


a. tracking b. Guarding c Patrolling d. all the above
204. Which breed of dogs are best suited for security work ?
a. German Shepherd b. Doberman c. Labrador d. all these
205. What is the advantage of a lighting system
a. Acts as a psychological deterrent to the intruder. b Increases the morale of security
personnel c. Demoralises criminals d. all the above
206. How will you protect information administratively
a. Protecting magnetically stored information
b. Protecting printed and punched information
c. Job organisation and auditing
d. All the above
207. A natural barrier like hillock near industrial security --------
a. is to be protected by CISF b. is the responsibility of civil authorities c. not
required to be protected d. none of these
208. Civil dwelling near perimeter wall is
a. to be removed b. allow to dwell c. not at all a security concern d. None of
the above
209. Water source is a ------
a) sensitive place b) critical place c) vital place d) none
210. A watch tower should be locked --
a) from outside b) from inside c) no lock is required d) none
211. what should be kept in mind while designing a pass
a. durable b. easy to check c. difficult to duplicate d. all the above
18

KEYS

151. a) Physical profiling


152. a) fool proof security
153. d) all the above
154. a) stealing of secret information
155. c) careless talk
156. c) defame the management
157. d) advertising in news paper
158. c) both ( a ) and (b)
159. d) both (a) and (b)
160. c) disgruntled employee
161. d. all the above
162. d. both (a) and (b)
163. d. all the above
164. a. Winning over the loyalty of people for nefarious activities
165. d. all the above
166. c. workers
167. b. lawful act by workers
168. d. both (a) and (b)
169. d. none of the above
170. b. wrongful confinement
171. d. settle it amicably
172. d. all the above
173. d. all the above
174. d. all the above
175. b. INSP – 1, SI – 1, HC – 1, CT – 3
176. c. projection of iron angle above perimeter wall
177. b. complete cut off of lighting
178. c. having lighting away from plant to look like a plant
179. c. both (a) and (b)
180. d. all the above
181. c. use same routes
182. d. all the above
183. d. pilferage
184. d. all the above
185. d. pass system
186. b. marital status
187. d. all the above
188. d. all the above
189. d) Workers
190. c) Gherao 203. d. all the above
191. d) M D is confined
192. a) A tool to pressurize the Management 204. d. all these
193. b) Notice in advance 205. d. all the above
194. a) Surveillance on the activities of union leaders 206. d. All the above
195. a) Stealing of state secret 207. a. Is to be protected by
196. c) Gramophone CISF
197. d) Organizing religious Sabha 208. a. to be removed
198. c) by self introduction
199. d) Highway Security 209. c. vital place
200. b) Study of forces in motion and changes over time 210. b. from inside
201. c) Cyclone 211. d. all the above
202. c. may result in disease

Potrebbero piacerti anche