No. of Printed Pages : 2

BAV-002 I

O CERTIFICATE IN SECURITY AND

C3N

INTELLIGENCE (CSI)

O O

Term-End Examination December, 2011 BAV-002 : SECURITY AND INTELLIGENCE THEORY AND PRACTICE Time : 3 hours

Maximum Marks : 100

Note : Each questions carries equal. marks. Attempt any five questions. 1.

(a) What is Sabotage ? What are the target of 10 sabotage in an Industrial establishment ? (b) What is meant by VIP Security ? Describe 10 its basic principles.

2.

What are the Security related Tasks Carried out

20

by Dogs ? Explain the Tasks with category of Dogs used.

3.

What is meant by Explosioves ? (a)

How explosives are categorised ? 10

(b)

What are the effect of Explosion ? 10

BAV - 002



1

P.T.O.



4. What is Fire ? How the fire extinguishers are classified ? Write the diagrams of water CO 2 type fire extinguisher with marking.

20

5. Describe briefly regarding Trade Union movement in India ? Which are the National Level Trade

20

unions functioning in India. ?

6. Write short note on the following : (a)

Escorting of valuable.

(b)

Espionage.

(c)

Sabotage.

(d)

Surveillance.

7. What are the Security measures implemented in an Airport. ? Explain the Security Gadgets used

20

20

in Airport for examination of man and material.

8. What is meant by Crime ? How it is classified ? Describe the methods for prevention of crime in an Industry. ?

BAV - 002

2

20

Security And Intelligence - Theory And Practice.pdf

sabotage in an Industrial establishment ? (b) What is meant by VIP ... (b) Espionage. ... Displaying Security And Intelligence - Theory And Practice.pdf. Page 1 of ...

51KB Sizes 0 Downloads 114 Views

Recommend Documents

Listing of Security of Security and Intelligence Services (India ... - NSE
Aug 8, 2017 - Members of the Exchange are hereby informed about the forthcoming listing of security (ies) on the. Exchange as follows: Name of the ...

Submission to the Intelligence and Security Committee ...
Mar 12, 2015 - Centre for Research in the Arts, Social Sciences and Humanities. University of .... The power of predictive analytics is well illustrated in the.

Intelligence and Security Committee of Parliament
Dec 20, 2017 - the first fatality resulting from an attack since 2012, when the 'new IRA' shot and killed prison officer David ...... Of course I am very very focused on this and we pushed the machine very hard and bringing people into the ... This i

Intelligence and Security Committee of Parliament
Dec 20, 2017 - targeted in their attacks, whilst the barriers to entry for less-skilled actors are lowering. The aim, predominantly, is identify theft, fraud and extortion, whether through distributed denial of service attacks, ransomware or data ext

Enhance Security and Usability Security and Usability Security and ...
Even though graphical passwords are difficult to guess and break, if someone direct observe during the password enter sessions, he/she probably figure out the password by guessing it randomly. Nevertheless, the issue of how to design the authenticati

secondary market liquidity and security design: theory ...
total primary market discount demanded by uninformed investors accounting for ...... The opacity in the over-the-counter market of structured products certainly ...

Enhance Security and Usability Security and Usability ...
Drag-and-drop is perhaps the most obvious method, but not typically ..... of the 1999 International Workshop on Cryptographic Techniques and E-Commerce.

pdf-148\information-security-intelligence-cryptographic-principles ...
There was a problem loading more pages. Retrying... pdf-148\information-security-intelligence-cryptographic-principles-applications-by-thomas-calabrese.pdf.

Information Security and Acceptable Use Security Policy.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Information ...

Security and Communication Network
Soft computing techniques, such as Fuzzy Logic, Neural Networks, Evolutionary. Computing, Rough Sets and other similar techniques, have been proved ...

ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING.pdf ...
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING.pdf. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING.pdf. Open. Extract. Open with. Sign In.

Security and Communication Network
pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, soft computing is widely used in information system for assurance. For example, neural networks are used for intrusion detection or prevention,

Download Cryptography and Network Security: Principles and ...
Download Cryptography and Network Security: Principles and Practice: United States Edition. (The William Stallings Books on Computer & Data.

Probability and Game Theory Syllabus
Day Session. Activities. 00. Evening. 1. (20mins) Welcome and Introductions: Brian and Andy introduce themselves, their backgrounds, their interests. Students play “Who Is It?” game. Each student receives a notecard and writes 3 facts about thems

Theory and Concepts
We all know that the law changes, sometimes by deliberate action, over time. ... Science relies on a methodology which ... And of course it is not my claim that. 2 ...