Practice Exam: Law Enforcement Administration - Police Intelligence & Counter-Terrorism (Set 56)

A 30-question practice exam covering intelligence operations, counter-terrorism laws, and national security.

1. In the context of police intelligence, what type of intelligence is derived from information gathered from open sources such as news media, public records, and professional or academic publications?

A.Human Intelligence (HUMINT)
B.Open-Source Intelligence (OSINT)
C.Signals Intelligence (SIGINT)
D.Technical Intelligence (TECHINT)

2. Which phase of the intelligence cycle involves the systematic collection of information from various sources to meet intelligence requirements?

A.Processing
B.Collection
C.Dissemination
D.Planning and Direction

3. What does the acronym "DIDSS" stand for in the context of the PNP's intelligence directorate?

A.Directorate for Intelligence and Detective Schooling Services
B.Directorate for Intelligence and Detective Support Services
C.Directorate for Investigation and Detective Support Services
D.Directorate for Intelligence and Detective Management

2. Which phase of the intelligence cycle involves gathering raw information from various sources based on intelligence requirements?

A.Processing
B.Collection
C.Analysis
D.Dissemination

3. In the intelligence cycle, what is the primary function of the "Processing and Collation" phase?

A.Gathering raw data
B.Converting raw information into a form suitable for analysis
C.Evaluating the reliability of a source
D.Disseminating the finished intelligence product

4. A police officer operating undercover to infiltrate a criminal syndicate is conducting what type of operation?

A.Overt Operation
B.Covert Operation
C.Casing
D.Surveillance

5. This is a type of intelligence required by commanders for planning and conducting tactical operations. It is focused on immediate threats and operational-level concerns.

A.Combat Intelligence
B.Strategic Intelligence
C.Counter-Intelligence
D.Line Intelligence

6. What is the evaluation rating for information that is confirmed by other independent sources and is considered "probably true"?

A.A-1
B.B-2
C.C-3
D.D-4

7. What is the primary purpose of counter-intelligence (CI)?

A.To gather information about foreign governments
B.To protect one's own organization from foreign intelligence services and other hostile threats
C.To provide strategic information for policy-making
D.To conduct offensive psychological operations

8. The "need-to-know" principle in intelligence dissemination means:

A.All intelligence should be shared freely among allied agencies.
B.Information should only be given to those in the highest command positions.
C.Access to classified information should be restricted to individuals who require it to perform their official duties.
D.The public has a right to know about all intelligence operations.

9. An intelligence agent who uses an assumed identity and establishes a background story to infiltrate a target organization is using a:

A.Safe house
B.Cover
C.Cut-out
D.Dead drop

10. The final phase of the intelligence cycle, where the finished intelligence product is provided to the end-users (e.g., policymakers, commanders), is called:

A.Analysis
B.Feedback
C.Dissemination and Use
D.Processing

11. Under the Anti-Terrorism Act of 2020 (RA 11479), which body is primarily responsible for the implementation of the act?

A.The National Security Council
B.The Anti-Terrorism Council (ATC)
C.The Department of Justice (DOJ)
D.The National Intelligence Coordinating Agency (NICA)

12. RA 11479 defines terrorism as acts intended to cause death or serious injury, extensive damage to property, or to create a widespread atmosphere of fear, for the purpose of:

A.Generating profit for a criminal organization
B.Coercing the government to give in to an unlawful demand
C.Overthrowing the government through armed rebellion
D.Expressing political dissent

13. What is the maximum period of detention without a judicial warrant of a person suspected of terrorism under the Anti-Terrorism Act of 2020?

A.3 days
B.36 hours
C.14 days, extendable by another 10 days
D.60 days

14. The process by which the Anti-Terrorism Council (ATC) formally identifies an individual, group, or organization as a terrorist is known as:

A.Indictment
B.Proscription
C.Arraignment
D.Designation

15. The Human Security Act of 2007 (RA 9372) was the predecessor to the Anti-Terrorism Act of 2020. What was a major criticism of the old law that the new law sought to address?

A.It was too lenient on penalties.
B.The definition of terrorism was too narrow and difficult to prove in court.
C.It did not create a council to oversee its implementation.
D.It allowed for indefinite detention without charge.

16. Under RA 11479, what is the role of the Court of Appeals in relation to terrorist organizations?

A.To directly order the arrest of suspected terrorists.
B.To authorize surveillance of suspected terrorists.
C.To judicially declare an organization as a terrorist and outlawed group (proscription).
D.To review all decisions made by the Anti-Terrorism Council.

17. Which of the following is NOT considered a punishable act under the Anti-Terrorism Act of 2020?

A.Threatening to commit terrorism
B.Inciting to commit terrorism
C.Providing material support to a terrorist group
D.Being a member of a political opposition party critical of the government

18. The Anti-Terrorism Council (ATC) is chaired by whom?

A.The President of the Philippines
B.The Executive Secretary
C.The National Security Advisor
D.The Secretary of Justice

19. What is the primary role of the National Intelligence Coordinating Agency (NICA)?

A.To conduct law enforcement operations against criminals.
B.To serve as the intelligence arm of the Armed Forces of the Philippines.
C.To be the primary intelligence gathering and analysis agency for the national government, integrating all intelligence activities.
D.To prosecute individuals accused of espionage.

20. The use of wiretaps, bugs, and other electronic eavesdropping devices to gather intelligence is a form of:

A.Human Intelligence (HUMINT)
B.Signals Intelligence (SIGINT)
C.Imagery Intelligence (IMINT)
D.Open-Source Intelligence (OSINT)

21. When a police intelligence unit secretly observes a person, place, or object to gather information, it is conducting:

A.Casing
B.Surveillance
C.A raid
D.An interrogation

22. What is the main legal prerequisite for law enforcement to conduct technical surveillance (wiretapping) on a person suspected of terrorism under RA 11479?

A.An order from the Chief of the PNP.
B.An order from the Court of Appeals.
C.A directive from the Anti-Terrorism Council.
D.The personal approval of the Secretary of Justice.

23. NICA's role in integrating intelligence means it:

A.Conducts all intelligence operations by itself.
B.Collects intelligence from agencies like the PNP, AFP, and NBI, and synthesizes it into a coherent picture.
C.Only focuses on external threats to national security.
D.Replaced all other intelligence units in the government.

24. An intelligence report based on information from a highly reliable source who is in a position to know, and the information is confirmed by other sources, is graded as:

A.A-1
B.B-2
C.C-3
D.F-6

25. What is the primary goal of a counter-insurgency (COIN) campaign?

A.To defeat the insurgent army in conventional battles.
B.To win the "hearts and minds" of the civilian population to separate them from the insurgents.
C.To capture the top leader of the insurgency.
D.To deploy as many soldiers as possible in the conflict area.

26. The government's plan for dealing with internal security threats like insurgency and terrorism, which involves a "whole-of-nation" approach, is encapsulated in:

A.The National Defense Strategy
B.The National Security Policy and Executive Order No. 70
C.The AFP Modernization Act
D.The PNP Patrol Plan 2030

27. The process of identifying and analyzing the nature, capabilities, and intentions of potential threats to national security is called:

A.Risk Management
B.Threat Assessment
C.Target Hardening
D.Crisis Management

28. In internal security operations, what is the role of the Philippine National Police (PNP) in relation to the Armed Forces of the Philippines (AFP)?

A.The PNP is the lead agency in all counter-insurgency operations.
B.The AFP is the lead agency in counter-insurgency, while the PNP takes the lead role in maintaining peace and order and supporting the AFP.
C.The PNP has no role in internal security operations.
D.The AFP and PNP operate completely independently of each other.

29. A "threat assessment matrix" typically analyzes threats based on which two key factors?

A.Cost and Time
B.Probability and Impact
C.Politics and Economics
D.Source and Reliability

30. Which concept is central to the "whole-of-nation" approach in counter-insurgency?

A.Relying solely on military force to solve the problem.
B.Seeking foreign military intervention.
C.Integrating the efforts of all government agencies, civil society, and the private sector to address the root causes of the conflict.
D.Declaring martial law nationwide.