Intel
Intel
===================================================================
INSTRUCTION: Select the correct answer in each of the following questions. Mark only
one answer on each item by a putting a circle corresponding to the letter of your choice.
2. This is surveillance involving the use of technical and scientific device to enhance
hearing or seeing the subject’s activities.
A. open surveillance B. technical surveillance
C. loose surveillance D. close surveillance
4. These are intelligence data that are not of an immediate value, and it is the same
with long range intelligence.
A. tactical intelligence B. police intelligence
C. military intelligence D. strategic intelligence
6. It is under the auspices of the Directorate for Intelligence (DI), and its function is
to serve as the intelligence and counter-intelligence operating unit of the Philippine
National Police (PNP).
A. Special Operations Unit B. Counter Intelligence Task Force
C. Police Intelligence Group D. Anti-Kidnapping Group
8. He is a properly trained and cleared individual who assists the head of the
department in discharging the responsibilities of safeguarding classified documents and
materials.
A. intelligence officer B. security officer
C. operations officer D. police commissioned officer
10. It is also called a plant or fixed surveillance; here the surveillant remains essentially
in one position or locale.
A. mustard plaster B. tailgaiting
C. stakeout D. convoy
11. This refers to information and materials, the unauthorized disclosure of which
would cause exceptionally grave damage to the nation, politically, economically or from
a security aspect.
A. classified information B. secret
C. documents D. top secret
12. It takes place when the surveillant’s behavior has caused his or her subject to
surmise or knows that he or she is under surveillance.
A. burnout B. need to know
C. be made D. none of these
13. This requires the undercover agent to frequent places of social entertainment
and amusement known to be habitually visited by target personalities and their
associates.
A. work assignment B. social assignment
C. undercover assignment D. cover assignment
16. These are persons, actions, or things from which information about criminals, or
subversives, weather, and terrain is derived.
A. intelligence collection agency B. accuracy of information
C. sources of information D. information evaluation rating
17. These are intelligence requirements for which the police executive has an
anticipated and stated priority in his task of planning and decision making.
A. other intelligence requirements B. priority intelligence requirements
C. special orders and request D. intelligence and information
18. The information comes from a completely reliable source, and the accuracy is
probably true, what is the information evaluation rating?
A. B-2 B. D-2
C. C-2 D. A-2
19. These are individual who openly or secretly obtains or assists in obtaining
information for intelligence and counter-intelligence purposes in exchange for some
recompense, monetary, or otherwise.
A. confidential agent B. informer
C. informants D. sources
20. These are individuals who are simultaneously employed by two opposing
intelligence agencies with one of the agencies aware of his or her dual role.
A. dual agent B. double agent
C. false agent D. misleading agent
23. It is the reduction of information into writing, or some other form of graphical
representation, and the arranging of information into groups related items into its
corresponding group.
A. integration B. recording
C. all of these D. none of these
27. The intelligence operatives will be asked about his personal experiences and
observations while conducting intelligence and counter-intelligence operations.
A. briefing B. debriefing
C. interview D. elicitation
29. These are individuals who dons not having the “need-to-know.
A. friendly troops B. outside elements
C. unfriendly troops D. inside elements
31. This provides for the immediate objective solution of the following: (a)
background investigation, whether complete or partial; (b) preparation for raid operation
and service of search warrant; and (c) installation or servicing of technical equipment,
and other devices useful in the conduct of undercover operations.
A. long ranger undercover assignment
B. short range undercover assignment
C. penetration and resident agency
D. police intelligence operations
36. The subject person is kept under constant surveillance; it is also termed as tight
surveillance, and the aim is not to lose the subject even at the risk of being “made.”
A. close surveillance B. loose surveillance
C. open surveillance D. mustard plaster
37. Each man maintains contact with the subject. One may be abreast of the subject
at the opposite side of the street, another behind the subject, and others in similar
position.
A. one man method B. loos method
C. group method D. leap- frog method
38. These are individuals that are selected, trained and utilized as continuous and
covert sources of information concerning specific intelligence targets.
A. casual informants B. recruited informants
C. automatic informants D. regular informants
39. They are those who are assigned with the mission of obtaining information within
a specific target,. and they may be recruited outside the target and placed therein, or
more usually selected and recruited from among the personnel within the target itself.
A. residential informants B. infiltration informants
C. penetration informants D. deep cover informants
40. This is a form required of an individual who is being processed for a security
clearance. The form calls for pertinent data and information on the various aspects of a
subject’s personal life.
A. personal data sheet B. personal history statement
C. curriculum vita D. bio-data
42. It is any position within the government, police, and military; the occupant of
which could bring about by virtue of his or her position a material adverse effect to the
country politically, economically, and from the security standpoint.
A. government position B. sensitive position
C. military position D. police position
43. This consists of the investigation of the background of an individual, particularly
all the circumstances of his or her personal life.
A. partial background investigation
B. personnel security investigation
C. complete background investigation
D. all of these
44. It is valid for five years unless sooner revoked by the issuing authority.
A. final clearance B. interim clearance
C. intelligence clearance D. all of these
45. It is an information or material in any form or of any nature, and the safeguarding
of which is necessary in the interest of national security.
A. classified information B. classified matter
C. classified document D. classified intelligence
46. This consists of initial briefing made upon the new personnel and employees on
security, its various aspects, and its importance, and they are familiarized with and
made to acquaint themselves with the security rules and regulations of the office or unit
and the importance of observing them.
A. security survey B. security orientation
C. security indoctrination D. security seminar
49. It is another specialized form of security system. The main objectives of the
security force are the protection of the life and limb of personnel, troops and employees
of such installations, due to the peculiar nature of its operations.
A. vital installations security B. documents security
C. personnel security D. none of these
51. It is observed once the security survey, inspection and audit are conducted, the
hazard analysis is completed, and the alternatives for handling the hazards are
selected, the information must be communicated to individuals who can act on the
findings.
A. final coaching B. final analysis
C. final assessment D. risk assessment
54. Are police offices, military headquarters, and government facilities, which are
necessary for the continued existence of the said public entities; hence, they are
susceptible to any acts inimical to the harmony and interests
A. security installations B. vital installations
C. police installations D. military installations
56. It is often used in normal conversation where the subject is encouraged to speak,
and once talking, the intelligence operative listens enthusiastically and stimulating the
subject to continue.
A. elicitation B. communication arts
C. interview D. debriefing
59. It is valid for two years unless sooner revoked by the issuing authority.
A. police clearance B. final clearance
C. intelligence clearance D. interim clearance
60. This consists of the investigation of the background of an individual, but limited
only to some of the circumstances of his or her personal life which are deemed pertinent
to the investigation.
A. complete background check B. partial background investigation
C. security check D. personnel security investigation
61. This includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the Philippine Government, from gaining
access to classified matter or to any security facility, and to prevent the appointment,
employment, or retention as employees of such individuals.
A. personnel security B. document security
C. installations security D. police security
62. This can occur when a new robber invades the area and the rash of break-ins
increases community pressure and police activity.
A. cutting a deal B. gratitude
C. elimination of competition D. rival elimination
63. These are individuals who furnish information with no intention of repeating their
services of furnishing information on a continuing basis.
A. casual informants B. accidental informants
C. automatic informants D. incidental informants
64. Only one member of the team maintains contact with the subject. It is a close tail,
with the other members of the squad keeping contact with those intelligence operatives
immediately ahead of them, and which is most likely in the same position.
A. loose tail B. leap-frog method
C. intermittent surveillance D. relay techniques
66. It is a form of open surveillance where the subject is followed so closely, and that
the surveillant and the subject are almost in lock step. It is tantamount to protective
custody.
A. open surveillance B. close surveillance
C. mustard plaster D. stakeout
67. It is a cautious surveillance; also termed discreet surveillance because the loss of
the subject is preferred to possible exposure.
A. close surveillance B. technical surveillance
C. counter-surveillance D. loose surveillance
70. This is the control and examination of communication to prevent the transmission
of information that may fall in the hands of the enemy, and to collect and disseminate
information of counter-intelligence value to those who need it, in appropriate means and
suitable manner.
A. censorship B. police censorship
C. military censorship D. civil censorship
71. This encompasses measures taken by the police or any other law enforcement
agencies, or the armed forces to protect them against espionage, enemy observation,
sabotage, subversion, or the spearheading elements of surprise.
A. civil security B. military security
C. police security D. government security
77. This refers to counter-intelligence measures that seek to actively block the
enemy’s attempt to gain information, or to actively block the enemy’s effort to engage in
espionage, sabotage, or subversion.
A. passive-defensive B. active-offensive
C. counter-surveillance D. counter-intelligence
73. This provides reliable, accurate, and continuing access to information that will not
be attainable, and which requires considerable time and effort, painstaking analysis of
the mission, and thorough study of all the details relating to the selection, training, and
actual performance of undercover personnel.
A. long range undercover assignment
B. short range undercover assignment
C. penetration and residence informant
D. infiltration agent assignment
76. It is a means by which individual, group or organization conceals the true nature
of its activities, and existence from the observer and it is also a device or stratagem by
which the intelligence operatives conceal his or her identity, and his or her relationship
with the intelligence collection agencies.
A. cover B. covert
C. secret D. confidential
78. It is one of the principal activities of police intelligence operations, and limited
activities on this, will usually produce limited intelligence data. .
A. intelligence programs B. liaison programs
C. counter-intelligence program D. all of these
79. This refers to a number of tasks, such as: identification activity; surveillance and
casing; liaison programs; informant cultivation; news-clipping services; de-briefings; and
other miscellaneous activities.
A. intelligence operations B. intelligence activities
C. intelligence functions D. intelligence cooperation
28. These are generalized theoretical actions that criminal or subversives might be
expected to take preparation for aggressive actions, and these are things or events that
transpired in the past or things or events that are presently occurring, others are calling
it as adjunct criminal activities. .
A. intelligence assumptions B. intelligence estimate
C. intelligence indicators D. intelligence parameters
83. It is the permanent official chronological record of the operations of the
intelligence section, unit, or agency.
A. intelligence workbook B. intelligence files
C. intelligence message D. intelligence journal
85. These are individuals who are simultaneously and independently employed by
two or more friendly intelligence units, and who do not show preference for either, and
normally motivated by material gain.
A. dual agent B. double agent
C. penetration agent D. undercover agent
86. The information comes from a usually reliable source, and it accuracy is probably
true, what is the information evaluation rating?
A. B-2 B. C-2
C. D-2 D. none of these
87. These are items of information regarding the criminals or subversives, and his
environment which need to be collected in order to meet the intelligence requirements
of the police executive.
A. priority intelligence requirements B. other information requirements
C. classified information or material D. other intelligence requirements
88. It is any person, activity, or unit that collects and/or processes information by
research, surveillance, covert and overt activities, or the exploitation of the different
sources of information.
A. sources of information B. intelligence collection agency
C. surveillance and casing D. cover & undercover assignment
89. The undercover agent is required to develop friendship and trust with the target
personality for the purpose of obtaining information or evidence.
A. rabbit B. tailing
C. rope job D. wok assignment
90. This refers to information and materials, the unauthorized disclosure of which
would endanger national security, cause serious injury to the interest or prestige of the
nation or of any governmental activity or would be of great advantage to a foreign land.
A. secret B. top secret
C. confidential D. restricted
92. These are individual who openly or secretly obtains or assists in obtaining
information for intelligence and counter-intelligence purposes in exchange for monetary
consideratiions.
A. sources B. informants
C. informers D. confidential agent
93. These are individuals that are selected, trained and utilized as continuous and
covert sources of information concerning specific intelligence targets.
A. regular informants B. recruited informant
C. ordinary informants D. penetration informants
94. This is the determination and examination on the degree of compliance of the
established security policies and procedures consistent with the missions and functions
of a police office, military headquarters, and government facilities.
A. security audit B. security survey
C. security inspection D. security check
95. Its mission is to assist the Chief, PNP in attaining intelligence objectives through
staff direction, planning, coordination, control and supervision of all intelligence and
counter-intelligence activities.
A. B.
C. D. Directorate for Intelligence
96. CIA is for USA, KGB is for Russia, GESTAP is for Germany, and __________ is
for Israel.
A. Mouchards B. Mosaic
C. ISAFP D. Mossad
99. It is a form of overt and covert surveillance wherein the subject’s motor vehicles
are being closely follow, wherein the surveillant are also using motor vehicles different
plates other than assign to it purposely to disguise it.
A. rope job B. tailgaiting
C. overt suveillance D. motor vehicle shadowing
100. This is the observation of persons, places, or things, generally, but not
necessarily, in an unobtrusive manner.
A. surveillance B. casing
C. reconnaisance D. intelligence
-END-