Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Private Security

Offers insights on various aspects of private security, surveillance techniques and safeguarding assets, to ensure effective protection and safety measures.

private security



security guards

alarm systems

access control

risk assessment


crisis management


asset protection

executive protection

security cameras

physical security

security training

security consulting

Which from the FOLLOWING is the weakest link in security industry?

  • physical
  • document
  • information
  • personnel the principle whereby access to classified matter only be given to those persons to whom it is necessary for fulfillment of duties.

  • Need-to-know

It is the distinctive identifying qualities that serve as an index to the essential or intrinsic nature of a person


Protection of assets must be done within the constraints of _______ and ________.

  • Texas Private Security Bureau regulations and Texas state laws.
  • Texas state and federal laws.
  • Local municipality laws and Texas state laws.
  • Texas state laws and departmental and MHHS policies and procedures.
  • MHHS and departmental policies and procedures.

An act that the law makes punishable; an offense against the public at large​

  • Crime
  • Tort
  • Violation
  • Infraction

_____ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

  • Vast
  • Virtual
  • VAN

Your supervisor may be vicariously liable for your actions if he did not know what you were doing but previously recommended that you be fired for similar infractions.

  • TRUE

According to the Board of Examiners for private security agencies, Security Guards are not authorized to conduct traffic stops.

  • True
  • False

We know that all licensed companies must have a "Qualified Manager". Can a company have more than one manager?

  • Yes, the company needs to have one manager per branch office.
  • Yes, as many as the owner thinks he needs.
  • No, A license holders company must be under the control of one manager.
  • Yes, the State Of Texas requires one manager for record keeping and one manager for outside operations.

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

  • Restriction
  • Protection
  • Encryption
  • Prevention

Involves background checks of individuals commensurate with the security requirements.

  • Personal Security
  • Personnel Security

--------------- is a valuable tool because it gives departing employees an opportunity to list grievances.

  • Exit Interview

A reason to pursue a criminal action is to compensate a victim for a loss.

  • TRUE

______________ is an EU law that aims to giveindividuals more rights over how their data is used.

  • General Data Protection Regulation
  • Copyright
  • Computer Misuse Act
  • Intellectual property


  • Protect property but not people or information
  • Provide protection to people, property and information.
  • Protect people and property but not information.
  • Enforce rules, regulations and laws that are designed to protect people and property

Section 1.3 Firearms- Approved types of weapons. Which type of weapon is not authorized to be carried by a Security Guard?

  • .38 caliber
  • 9 mm caliber
  • 22 caliber
  • 45 caliber

If you provide first aid to someone who is choking by providing the Heimlich maneuver but you fail to save them, you can be sued for negligence

  • TRUE

______________is the identification of the geographic location of a user or device. The ’Snapmaps’ feature on Snapchat is an example of geolocation in use.

  • Geolocation
  • Browsers
  • Pop-ups
  • GDPR

3.0 - Nightstick, Pr. 24, mace pepper gas and handcuffs:To carry the above weapon/items the Security Guard must have completed a training program on each and every weapon/ item carried, taught by a certified instructor represented by the manufacturer of the weapon/item. Under no circumstances would a security guard be permitted to carry any other type of weapon/item unless first approved by the Director of Professional Licensing section.

  • True
  • False

What can security officers seize during consent searches? (SELECT ALL THAT APPLY)

  • Property of the employer or property owner you work for that the subject has no permission to possess​
  • Evidence of the commission of a crime
  • Weapons that could be used to injure the officer or others
  • Unrelated property that the officer does not have consent to search
  • Unrelated property that the officer does not have consent to search

Any Security Guard licensed under 24 Delaware Code Chapter 13 may display the seal or crest of the State of Delaware, County, or local sub-division in any item they wear or display.

  • True
  • False

Which of the following is not a measure to protect computer security?

  • Encrypting data
  • Restricting access
  • Copying data and storing it at a remote location
  • Keeping the same password on all systems consistently

A Grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.

  • Patents

Once an Owner or Qualified manager for a company follows the proper procedures to terminate a License or Branch Office License they can come back later and have that license reinstated.

  • True
  • False
  • Only after 1 year has passed
  • Only if they do it before 1 year has passed

Choose the correct options. An applicant for a license must be at least 18 years old and must NOT

  • Have been convicted in any jurisdiction of two or more felony offenses, unless full pardons have been granted for all convictions for reasons relating to wrongful convictions
  • Have been dishonorably discharged from the United States armed services, discharged from the United States armed services under other conditions determined by the board to be prohibitive, or dismissed from the United States armed services if a commissioned officer in the United States armed services
  • Have a speeding ticket in the last two years
  • All of the above

PSISA stands for the Private Security Investigative Services Act. This act regulates the conduct of Security Guards

  • True
  • False

11.0 - Uniforms, patches, badges, seals, and vehicular markings Any Security Guard licensed under 24 Delaware Code Chapter 13 may wear or display any patch, badge, or seal without the board's approval.

  • True
  • False


  • Check all weapons at the counter
  • Detect, deter, observe and report
  • Eat to live don't live to eat
  • Look, listen and run

This is the division of security by which purpose is to protect the asset to the damages that could be caused by unauthorized disclosure of confidential data.

  • Document and Information Security
  • Personnel Security
  • Physical Security

Takes place when information was gain by unauthorized person is compromise.

  • true
  • false


  • A licensed security guard is just like a police officer
  • Do not write down anything because a good guard should be able to remember everything
  • Foot patrol can be a large part of a security officers duties
  • Maintaining a high visibility presence does not deter illegal activity

Any violence, compulsion, or constraint physically exerted by any means upon or against a person or thing​

  • Force
  • Assault
  • Violence
  • Coercion

Name one crime that a security officer can be charged with if they unlawfully arrest someone

  • unlawful restraint

Once a licensee had been issued a pocket card by the board the card is good for:

  • 1 year
  • 2 years
  • 3 years
  • 4 years

Once detained, a person cannot be unarrested.

  • False
  • True

_________ are data collectors. Data is generated when you use a website and is then stored by your web browser. They can help businesses and web-developers understand how users use their website.

  • Firewalls
  • Cookies
  • Browsers
  • Pop-ups

Email confirmation

  • a combination of facial recognition, iris recognition and finger prints.
  • Encrypt data
  • is used to check that users are using their real email address in the registration process.
  • works by measuring how far apart, relative to one another, your eyes, jaw, nose and cheekbones are.

Section1.2 Firearms' policy- every Security Guard licensed to carry a firearm must shoot a minimum of _____ qualifying shoots per calendar year.

  • 5
  • 3
  • 1
  • 0

Section 5.0 Use of AnimalsThe following animals have been authorized by the use of Security Guards in the performance of their duties:

  • Dogs (K-9)
  • Snakes
  • Reptiles
  • None of the above

Choose the number of days any License holder or registrant has to notify the board of a change of address.

  • 14 days
  • 29 days
  • 60 days
  • 90 days

The process whereby a subject's reaction in a future critical situation is predicted by observing his behavior or by interviewing him or analyzing his response to a questionnaire such as honesty.


____________ has an extra layer of security on the data(HyperText Transfer Protocol Secure).

  • HTTP
  • Secure website
  • Spam
  • Bio-metric


  • Security international Authority
  • Security Industry Association
  • Security Integration Architecture
  • Security Industry Authority

When you are sued for negligence, what burden of proof must be established against you for you to lose the lawsuit?

  • Preponderance of evidence
  • Proof beyond reasonable doubt
  • Proof beyond shadow of doubt
  • Proof beyond any doubt

____________ is (often) irrelevant commercial messages, including emails, advertisements and text messages, that are posted on a large scale.

  • Spam
  • Cookie
  • Virus
  • Pop-ups

The more the asset has number of this factor, the more it could be placed in a risky condition.

  • Threat
  • Risk
  • Vulnerability
  • Hazard

You see a contest that reads, "Win $10,000 instantly! Click this link to sign up!" You click on the link, and the website asks for your name, address, and email to enter the contest. Why could it be unsafe to share your private information?

  • You could no longer be you.
  • Someone could steal your information to create a fake identity pretending to be you.
  • Someone could give you a lot of money.
  • Your information would be safe because you're sharing the information online.

Which of the below is a clue that a message or an email might be phishing? SELECT 3

  • It's from a "friend in trouble" and they ask for money.
  • The message has a sense of urgency.
  • There are spelling and grammar errors in the message.
  • It includes your name and account number in the email.
  • It includes your name and account number in the email.

A phrase which means something the law required you to do​

  • Affirmative duty
  • Affirmative response
  • Affirmative action
  • Affirmative care

........ is a type of challenge-response test used in computing to determine whether or not the user is human.

  • Voice recognition
  • Finger print

_____ is an inquiry which aims to verify applicants information written at the applications form.


You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you. Which one of the following terms describes this activity?

  • Phishing
  • Pirating
  • Spyware
  • Hacking

1.0 Firearm Policy:The initial qualification shoot may be used to fulfill one day and one low light requirement during the first year.

  • True
  • False

One of the scope of personnel security that involves orientation and debriefing.

  • Background investigation
  • Positive Vetting
  • Personnel security investigation
  • Security education

Section 1.5 Fire Arms. Approved Type of Weapons. Which type of weapon IS NOT authorized to be carried by a Security Guard (except as approved by the Governor or Superintendent of State Police on specific occasions)?

  • .357 caliber
  • Shotgun or rifle
  • .40 caliber
  • .45 caliber


  • Having lunch break on the back of a truck
  • A very rude and dangerous car habit
  • Placing yellow plastic streamers to mark a closed loading dock
  • When a unauthorized person slips through a door after an authorized person

Examining or inspecting with careful thoroughness.

  • Background investigation
  • Deception Detection Techniques
  • Positive Vetting
  • Profiling

What type of authority to arrest do peace officers have that security officers do not?

  • Citizen's arrest
  • Shopkeeper privilege
  • Statutory authority
  • Cardiac arrest

When a security officer places someone in handcuffs, it automatically implies they are under arrest

  • TRUE

Which of these is NOT one of the reasons a security officer can detain in accordance with "shopkeeper privilege"?

  • To recover the property that is the subject of unlawful taking, criminal mischief, or theft
  • To cause an arrest to be made by a peace officer
  • To obtain a warrant of arrest
  • To detain trespassers

I_______ t____ (2 words) is the illegal assumption of someone's identity for the purposes of economic gain.

  • Identity theft

It is a process of inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual to determine his suitability for appointment or access to classified.


This is the division of security by which purpose is to assure that the employees who will be hired at the company will not be one of threat of its security

  • Personnel Security

Glenn notices that his colleague is making false statements about him in an online public forum. What is Glenn's colleague doing?

  • Defamation
  • Plagiarism
  • Gambling
  • Phishing

_____________ authenticates the identity of the website (this guarantees visitors that they're not on a bogus site). It encrypts the data that's being transmitted.

  • Biometric
  • Phishing
  • SSL (Secured Socket Layer)
  • Geolocation

A complaint against a security guard can be reported by

  • Your supervisor
  • The client
  • People who go on your property
  • Anyone

What type of special immunity from civil liability do security officers have?

  • Sovereign immunity
  • Qualified immunity
  • Absolute immunity
  • No special immunity

If you practice on your own at the shooting range, you can carry a firearm as a security officer even if not certified with a firearm by your employer

  • TRUE


  • Frisking all who enter and making sure they exit out the same door they came in
  • Keeping the gates closed, the doors barred and taping shut the windows
  • Checking passes, securing entries, observing, conducting visitor check-ins
  • Asking all who enter for the password and arresting those who don't know it

FALSE Action or language about a person​, seen or heard by a third party​, that causes damage to reputation ​

  • Assault
  • False Arrest
  • False Imprisonment
  • Defamation of character

Generally, your responsibility in handling violations of hospital or MHHS policies and procedures is only to report the matter to the ___________ or ______________ on duty.

  • administrator department head

_Select all ways that an employer can be directly liable for an employee's conduct

  • Negligent hiring​
  • Negligent firing
  • Negligent retention
  • Negligent assignment

A security guard is a person who performs work, for remuneration, that consists primarily of guarding or patrolling for the purpose of protecting persons or property

  • True
  • False

................ is observing a person's private information over their shoulder or using screen capture software

  • Shouldering

A security officer's use of force is justified if the officer was prevented from ________ or taking other defensive/control actions and, as a result, had to use force

  • escaping

A civil action for damages for injury, death, or loss to person or property, other than a civil action for damages for breach of a contract or another agreement between persons​

  • Crime
  • Tort
  • Slander
  • Libel

Choose the action that might be taken by the Private Security Board take if you fail to notify them within 14 days of the termination of the license holder's qualified manager.

  • They will send a notice to you to remind you that you need to get a new manager right away.
  • They may suspend or revoke the license holder's license.
  • The license holder will be fined 1,000.00 dollars and spend 5 days in jail.
  • The license holder will be fined 1,000.00 dollars.

It is designed to prevent unsuitable individuals from gaining access to classified matter.

  • Personnel security
  • Personnel security investigation
  • Security education
  • Background investigation

.............., ................ , and ................. are examples of biometric measures

  • passwords
  • facial recognition
  • voice recognition
  • finger print


  • Talk as loud and fast as you can
  • Get to the point, speak clearly and calmly, answer questions, following instructions
  • Ask for the emergency extension and then hang up and dial 999 again
  • Get emotional so they know to hurry

Once a license holders license has been revoked can they have it reinstated?

  • According to 1702.369 a revoked license may not be reinstated unless 5 years has passed.
  • According to 1702.369 a revoked license may not be reinstated unless 10 years has passed.
  • According to 1702.369 a revoked license may not be reinstated
  • According to 1702.369 a revoked license may not be reinstated unless the Licensee is on the board.

A security guard serves the public interest

  • True
  • False

Security officers have the same authority as police officers.

  • TRUE

....... is the art of manipulating people so they give up confidential information.

  • Blagging
  • Social engineering
  • Pharming
  • Phishing


  • A promise not to disclose or profit from company confidential information
  • An agreement an employee signs to show he or she understands the payday policies
  • A contract where you are agreeing to park your vehicle in the proper areas
  • To agree to properly display your badge and show your guard licence upon request

To protecting your personal data from cyber attacks you have to

  • Do not give out personal information over the phone, on the web or in an email unless completely sure of the recipient.
  • Keep your operating system, browser, anti-virus and other critical software up to date
  • Encrypt your data.
  • Never click on links in emails. Even if you do think the email is legitimate, go to the website and log on directly.
  • Set secure passwords and don’t share them with anyone.

Private security employees have a responsibility to protect the assets and maintain peace for _________ served.

  • The precinct
  • The city
  • The property
  • The county
  • All of the above

The private security officer has the right to search a person or their personal belongings

  • True
  • False

_Select all considerations for using force

  • Cannot use force to punish
  • Stop when a person submits or surrenders
  • Once in custody, you must protect subject from self or others​
  • Must provide medical attention and monitor subject​
  • Must double lock and gap handcuffs if used​

Any information and materials that can potentially damage the nation when disclose:

  • top secret
  • secret
  • confidential

............... is a cyber attack intended to redirect a website's traffic to another, fake site.

  • Pharming

The act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances is .............

  • Blagging

When a qualified manager or supervisor of a license has terminated his position, and the board has been timely notified of the termination in writing within 14 days of the termination, the business may continue to operate for how many days?

  • 30 days
  • 60 days
  • 90 days
  • Six months

Private security officers have no more authority to use force than the employer or client does for the purposes of ____________

  • self-defense

__________ is the collection of data that helps to identify anindividual’s identity, including their physical and behavioural attributes.

  • Spam
  • Biometrics
  • Pop-ups
  • Cookies

The process of inspecting or examining with careful thoroughness.


An examination of a person’s body, property, or other area that the person would reasonably be expected to consider as private, conducted by a law enforcement officer for the purpose of finding evidence of a crime

  • Search
  • Seizure
  • Detainment
  • Arrest

An arrested person must be turned over to a ______________.

  • Magistrate via a peace officer.
  • Constable's deputy.
  • Sheriff's deputy.
  • Local law enforcement.
  • The person does not have to be turned over to anyone and may be unarrested.

________ are internet windows that can appear suddenly on your screen and are often annoying or virus-ridden

  • Cookies
  • Firewalls
  • Pop-ups
  • Browsers

A formula, pattern, device or compilation of information use to gain an advantage over competitors who do not know to use it.

  • Trade Secrets

T____-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.

  • Third

The PSISA does NOT apply to persons who receive remuneration for work that consists primarily of providing an armoured vehicle service

  • True
  • False

As a Security guard if you are rude to members of the public you are in violation of

  • PSISA Code Of Conduct
  • Police Act
  • Human Rights Code
  • Criminal Code

All records are required to be kept under the provisions of the Act and the rules shall be made available for inspection by bureau staff when __________.

  • 24 hours a day
  • From 8:00 am to 5 pm
  • From 7:00 am to 3:30 pm
  • During normal business hours

Once you receive your Security License you will be allowed to carry both handcuffs and a baton

  • True
  • False

............... works by measuring how far apart, relative to one another, your eyes, jaw, nose and cheekbones are.

  • Finger print scanners
  • facial recognition
  • Email verification

The maximum fine, if convicted, under the PSISA for a Security guard is

  • $2000
  • $10,000
  • $25,000
  • $350,000

The Private Security Board start regulating the security industry in the year ______.

  • 1998
  • 2001
  • 2005
  • 2008

The legal concept which allows for one party to be held liable for injuries or damages sustained by another party, despite having had no active involvement in the incident​

  • Transitive liability
  • Vicarious liability
  • Strict liability
  • Negligent liability

A security education process that emphasize the role of security.

  • orientation and training
  • refresher conference
  • security promotion
  • security reminders

A type of business record that name as class I;

  • useful
  • important
  • non-essential
  • vital

Declassify refers to the assigning of information or material, one of the four security categories after determination has been made that the information requires the security protection as provided.

  • true
  • false


  • Taking a fun ride on someone's shoulders at breaktime
  • When a person holds a door open for another that they perceive to have authorized access
  • Scanning thru porcine stock trucks loaded with piggies
  • Getting 2 paychecks at once

If a security officer at Walmart handcuff's a subject, who is responsible for the subject's safety?

  • The subject
  • The store manager
  • The security officer
  • The police officer

Section 1.2 Firearm policy- Every security guard must schedule at least two (2) separate days, with a minimum ______ days between scheduled shoots.

  • 30
  • 60
  • 90
  • 180

A licensee shall, either orally or in writing, notify all consumers or recipients of services of their license number and the name, mailing address, and telephone number of the Private Security Bureau for the purpose of directing complaints. True or False?

  • True
  • False

Duties of a Security guard include

  • Protection of property
  • Protect information
  • Protect persons
  • All of the above


  • China Central Television
  • Closed Circuit Television
  • Campzone Community TeleVision
  • Closed channel Television

-------------- made upon the basis of written information supplied by him in response to inquiry from national agencies.

  • national agency check

Which of the following is NOT a Code Of Conduct violation under the PSISA

  • Using profane, abusive or insulting language
  • Exercising unnecessary force
  • Behaviour that is either prohibited or not authorized bylaw
  • Accidently spilling mustard on your uniform at lunch

A technique of PSI which use integrity test like Reid report.

  • Background investigation
  • Deception Detection Techniques
  • Positive Vetting
  • Profiling

Indirect approach of educating the employees about security policy.

  • orientation and training
  • refresher conference
  • security promotion
  • security reminders

Which of these situations are not a valid reason for a security officer to search someone?

  • There is consent by the person being searched​
  • There is implied consent as a condition of employment
  • It is incidental to valid conditions (e.g. no entry without search)​
  • Search incident to arrest

State true or false. The fees submitted to the Private Security Board are refundable.

  • True
  • False

What class is the business record called as important record?

  • 1
  • 2
  • 3
  • 4

Which of these are not required to establish a finding of negligence

  • There existed a duty to act or refrain from acting
  • The potential for resultant harm was reasonably foreseeable​
  • Your actions resulted in harm
  • Your actions were with purpose

A licensed company is required to keep records on an employee for a period of ________.

  • One year after termination
  • One year from the date of employment
  • Three years from the date of employment
  • Two years from the date of employment

.............. is a technique of fraudulently obtaining private information, often using email or SMS.

  • Phishing

............... use capacitance, in a similar way to the touch screen, to detect ridges along the skin. The patterns of your finger print actually make up a number of ridges and valleys

  • facial recognition
  • finger print scanners

A deliberate act which the defendant could reasonably foresee might injure another​

  • Intentional Tort
  • Negligence
  • Misdemeanor
  • Felony

It is important to read all mail from the Private Security Board immediately because

  • It's not important because the board sends a lot of junk mail
  • Because much of the notices the you may receive are very time sensitive.
  • The board uses mail to communicate important information to license holders
  • Both B & C

What is an inquiry into integrity and loyalty of individual in order to determine a person's suitability to be given security clearance

  • Personnel security
  • Personnel security investigation
  • Background Investigation
  • National agency check

What intent is required for your supervisor to be found vicariously liable for your actions?

  • Purposely
  • Knowingly
  • Negligently
  • Strict Liability
  • Recklessly

This civil offense is the unlawful restraint or control by one person of the physical liberty of another

  • false arrest

The failure to exercise that degree of care which an ordinarily careful and prudent person would exercise under the same or similar circumstances

  • Intentional
  • Negligence
  • Recklessness
  • Disregard

If an unlicensed person or someone who does not have a license pending commits a violation of the Private Security Act 1702 how much penalty amount would they be charged?

  • $5,000.00
  • $10,000.00
  • $15,000.00
  • $20,000.00

Which from the classified matters is the information that can embarrass administrative function of a nation and this can be advantage foreign country?

  • confidential
  • restricted
  • secret
  • top secret

A technique of PSI which use Polygraph, Psychological Stress Evaluator and Voice analyzer.

  • Background investigation
  • Deception Detection Techniques
  • Positive Vetting
  • Profiling

A __________________ is a security system that helps to protect devices from networks and systems with unauthorised access.

  • Anti-virus app
  • Firewall
  • Browser
  • Trojan horse

A Security guards duties can include the collection of unpaid accounts for clients

  • True
  • False

The obligations of the private security employee extend only to the _______ for which they are formally contracted to provide security services for.

  • The precinct
  • The county
  • The state
  • The city
  • The area

It is an inquiry which aims to verify applicants information written at the applications form; to ascertain his/her past employment experiences and to obtain other information pertinent to the decision to employ


If you hold any registration or License will your license be suspended if you are arrested for convicted of a DWI?

  • No, DWI is not a valid reason under the boards rules to suspend your license.
  • No, as long as you were not speeding when you got pulled over.
  • Yes, but only if your license is a Motorcycle Escort license.
  • Yes, your license will be suspended right away.

What is the minimum age to be licensed in Ontario as a Security guard

  • 16
  • 18
  • 19
  • 21

A r____ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

  • rogue

To protect networks and computers from cyber attacks .....

  • If you use WiFi, update it regularly to the latest encryption standard.
  • Ask users to use CDs and SD cards to copy any data they want from the network
  • Encrypt the data
  • Secure the hardware. Physically locking computers to a desk
  • Install anti-malware and anti-virus protection.

A ___________is a program that you use to access and view all the information on the web. Examples of browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox and Apple Safari.

  • Bio-metric
  • Cookie
  • Firewall
  • Browser