What is the (trans) design to protect your (jsksks) cargo and ship (jjsj) risk of security incident
security plan
Describe the difference between piracy and armed robbery at sea.
- piracy is a robbery at ship while armed robbery at sea occur in port
- armed robbery at sea occured within territorial water while piracy occured in international water
- armed robbery at sea occured in international water while piracy occured within territorial water
- piracy and armed robbery are the same
What was mandated by law in July 2004 after the (????) attack (??????)
- SDSD
- Solas chapter XI-2
- ISPS regulation
- SOA?
Solas chapter XI-2
Which maritime security level is appropriate when ship and port authority (mutuals) of supervise cargo in loading and unloading operation.
- marsec lvl 1
- marsec lvl 2
- marsec lvl 3
- marsec lvl 4
marsec lvl 1
Identify this marsec level (grant) access to ship is limited only to authorize personel
- marsec lvl 1
- marsec lvl 2
- marsec lvl 3
- marsec lvl 4
marsec lvl 3
At least how many times security drills should be conducted on board
- once in every 3 months
- once a month
- once a year
- once every 3 years
once in every 3 months
What is the first step to develop in ship security assessment
- ship security meeting
- ship security survey
- ship security plan
ship security survey
The following are identified in (???) ship security survey, EXCEPT:
- possible threats (on the key) shipboard operation
- existing security measures, procedures and operation
- security threat, nationality, capacity and personality
- security (weakness) (hindering frastracture) policies and procedures
security threat, nationality, capacity and personality
Which of the following should be considered when the captain (when) security of the ship is (bridge)
- ship contengency plan implementation
- ship security alert system activation
- ship preparation for evacuation
- implement higher marsec level
During your watch, you have notice a vessel (afar) being attacked by pirates, what should be your action
- change course
- increase speed
- report to master
- alert authority
alert authority
What is the document that address tye security requirement that to be shared between a port facility and a ship
- checklist of security
- declaration of security
- assessment of security
- ship or port security check
declaration of security
taking advantage of modern technologies of pirates are able to determine the best (target) and plan of attack by ______
- (contracting) searches at sea
- getting (classified) information
- monitoring communication between ships and ports
- utilizing vessel fine internet
monitoring communication between ships and ports
the following is considered in (unfine) potential security threat, except:
- out of normal activity
- normal clothing
- ????
- conversation of the ship and taking pictures
normal clothing
What is the importance of being observant to recognize potential security threat
it is a dedication of (conceiling) a weapon of person (false/force) to bend his knees or fail to bend his knees
- palming
- (jacketshog)
- (unaturalgeyt?/$$)
- (unsboxtribe)
when a person is palming, what is the most probable way for being (conceil)
- (edge waypor)
- granades
- fire arms
- (time ed)
edge waypor
why do we utilize leaders in a crowd and controlling and (emerging) crowd
- due to people exhibiting panic behavior
- due to people in crowd with open exhibit (????) behaviour
- due to ignorance
- due to (pro) active behavoir
due to people in crowd with open exhibit (????) behaviour
what kind of equipment is not appropriate for bomb search
- flashlight
- radio
- metal detector
- (lacyd)
radio
is over an expensive and effective means of detecting (????) substances
- K9
- x-ray
- search stick
- metal detector
metal detector
which of the following is considered restricted area
- engine room
- deck
- accommodation ladder
- ramp
engine room
how can a restricted area be immediately identified
clearly marked restricted area warning signs and placards
as part of shipboard security and identification system is used to utilize
- determine vessel security level
- identify (this) vessel personel or authotize to have access
- assign restricted areas
- control entry and exit of items on board
identify (this) vessel personel or authotize to have access
monitoring ship security (inclus) the use of following, except
- lighting
- cordon
- surveilance
- watchkeeper
cordon
security measures are implemented during delivery of ships(stores) for following reason, except
- to prevent possibility of receiving of (tampered) products
- to ensure (intended) to your ship’s course packaging
- to avoid accepting items (????) order
- to allow acquisition of cobtraband
to allow acquisition of cobtraband