You can take several attempts in this quiz but the "FIRST ATTEMPT will be RECORDED AND GRADED.
GOOD LUCK!
1.
Which of the list below must be avoided as a physical appearance of the agent performing surveillance?
2.
This is an art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key.
3.
This is used in attempting to locate the hideout of a subject from a vantage-point without moving after the subject. What surveillance is this?
4.
The person performing or doing the surveillance is called what?
5.
This is the art of analyzing ciphertext to extract the plaintext or the key. This is the opposite of cryptography.
6.
Which of the list below is NOT an objective of surveillance.
7.
Which of the following is considered as audio surveillance.
8.
It refers to man employed by the subject to observe and guard if the subject is being followed.
9.
This is a method of hiding the existence of a message using tools such as invisible ink, microscopic writing, or hiding code words within sentences of a message.
10.
This is a method of communicating information by the informant by placing it in a specified or pre-arranged place, like windows or door in a house, table in a restaurant etc.
11.
Most operatives use three mediums in contacting informants, what are they?
12.
How do you call an original information in cryptography?
13.
A work that requires the assumption by a police agent of an identity in keeping with the situation to be explored.
14.
What are “don’ts” in surveillance during operations?
15.
A fellow of surveillant especially in two, three-man surveillant or more.
16.
What surveillance method must be used as a last resort because this is expensive and yet consume a lot of time?
17.
In moving surveillance, the agent can use the following method.
18.
This is the secretive continuous process of watching persons, things or places to obtain information concerning activities, operations, identities, and contacts of persons.
19.
This method is extremely difficult and should be avoided if possible in surveillance operation.
20.
The use of this method though, still furthers the risk of losing the subject but affords greater security against detection or risk. What method is this?