11. In case of a strike, agitation or gherao, which one of the following i

In case of a strike, agitation or gherao, which one of the following is *not* supposed to be a role of CISF?

To escort the official under the gherao to a safe place, if requested by the person concerned.
To extend all possible help to the police for tackling the situation
To force the employees to join work
To maintain friendly relations with employees
This question was previously asked in
UPSC CISF-AC-EXE – 2021
During a strike, agitation, or gherao, CISF’s role is primarily focused on maintaining law and order, protecting property and personnel, and ensuring the safety of those within the facility. Escorting officials under gherao to safety is a protective role that CISF performs (Option A). CISF personnel are required to cooperate and assist the local police in handling the situation (Option B). Maintaining friendly relations with employees, even during industrial unrest, is part of fostering a better working environment and can aid in de-escalation (Option D). However, forcing employees to join work is not a role of CISF; this pertains to management authority, labor laws, or orders enforced by civil administration or police, not the security force’s mandate.
CISF’s role during industrial unrest is limited to security, protection of assets and personnel, maintenance of order, and liaison with police, not involvement in labor disputes or forcing employees to work.
CISF deployment in industrial settings often involves balancing security needs with employee relations. Their actions during strikes are governed by legal provisions and administrative guidelines, aiming to prevent violence, damage, and disruption while respecting the rights of both management and employees.

12. What should be the maximum gap between the wires/metal members in case

What should be the maximum gap between the wires/metal members in case of fence for perimeter security to preclude the possibility of unfettered movement of objects to and from the facility?

8"
6"
10"
12"
This question was previously asked in
UPSC CISF-AC-EXE – 2021
For perimeter security fencing, especially for critical infrastructure or high-security areas, the gap between vertical and horizontal members needs to be small enough to prevent a person from climbing through or passing objects through easily. While specific standards vary depending on the security level, a gap of 6 inches (approximately 15 cm) is a common and widely accepted maximum size for high-security fences like chain-link or welded mesh to effectively preclude the passage of a human body or significant objects. Larger gaps like 8″, 10″, or 12″ would compromise the effectiveness of the barrier.
Perimeter security fence design, including mesh size or gap between members, is critical to its effectiveness as a physical barrier against intrusion and passage of objects. Smaller gaps provide higher security.
Perimeter security fences are often part of a layered security system that includes detection systems (sensors), surveillance (CCTV), and response mechanisms. The physical barrier’s effectiveness is measured by its ability to delay or prevent penetration. Standards from organizations like ASTM (American Society for Testing and Materials) or government agencies specify requirements for various security levels.

13. Which one of the following does *not* fall under the category ‘Biometr

Which one of the following does *not* fall under the category ‘Biometrics’, meant for personal identification related to access control?

Card Reader and Card
Iris
Fingerprint
Handwriting
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Biometrics refers to methods of recognizing a person based on their unique physical or behavioral characteristics. Iris recognition, fingerprint scanning, and handwriting analysis (signature dynamics or forensic analysis) are all forms of biometrics. A card reader and card system, however, is a token-based access control system. The card is a physical object (token) that the person possesses, and the reader verifies the information stored on the card. The identification is based on possession of the token, not on a unique characteristic of the person themselves.
Biometric identification uses inherent personal characteristics (like iris, fingerprint, voice, face), whereas token-based systems rely on possessing an object (like a card or key).
Biometric systems offer a higher level of security than simple token-based systems as biometric characteristics are difficult to forge or transfer. However, they also raise privacy concerns. Access control systems can be purely token-based, purely biometric, or use a combination of methods (e.g., card + PIN, card + fingerprint).

14. With regard to the event of deployment of CISF during election duties,

With regard to the event of deployment of CISF during election duties, which one of the following statements is *not* correct?

They should be absolutely impartial and ensure that the spirit of the law is not violated.
Even if the Presiding Officer asks to arrest, CISF personnel deployed on duty, cannot make arrest.
Does not hesitate to use force if there is instance of booth capturing.
In the event of attack on the polling station by miscreants, the CISF will not hesitate to use force.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
The question asks which statement about CISF deployment during election duties is *not* correct.
A) CISF personnel must be impartial and ensure the spirit of the law is not violated. This is correct behavior for any security force during elections.
B) Even if the Presiding Officer asks to arrest, CISF personnel deployed on duty, cannot make arrest. This statement is incorrect. CISF personnel have powers of arrest without warrant under Section 11 of the CISF Act for offences committed under the Act or any other law, particularly cognizable offences committed in their presence. Disturbing elections, booth capturing, or attacking polling stations are offences. While their primary role is to assist and hand over to police, stating they *cannot* make an arrest is an overstatement of their limitations and therefore incorrect.
C) Does not hesitate to use force if there is instance of booth capturing. This is correct; preventing booth capturing is a key duty, and force may be necessary.
D) In the event of attack on the polling station by miscreants, the CISF will not hesitate to use force. This is correct; protecting the polling station is a primary duty.
Therefore, the statement that is not correct is that they cannot make an arrest.
CISF personnel possess powers of arrest under Section 11 of the CISF Act for relevant offences. While standard procedure during election duty may involve detaining and handing over to the police, stating they cannot make an arrest at all is inaccurate.
CISF’s role in election duties is crucial for maintaining law and order, ensuring free and fair polls, and protecting polling personnel and voters. Their actions are guided by election laws, the CISF Act, and directives from the Election Commission and local administration.

15. In case of a complaint regarding sexual harassment at the workplace, a

In case of a complaint regarding sexual harassment at the workplace, an Internal Complaint Committee is required to be constituted. With regard to this, which one of the following statements is not correct ?

A senior level woman officer, working at the workplace, shall act as the Presiding Officer of the Committee.
Not less than two members from amongst employees, preferably committed to the cause of women or who had experience in social work or have legal knowledge, shall be the members of the Committee.
One member from amongst NGOs/Associations committed to the cause of women or a person familiar with the issues relating to sexual harassment shall be a member of the Committee.
One member from the local police, preferably a woman from the woman police station, shall be a member of the Committee.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
The Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal) Act, 2013 mandates the constitution of an Internal Complaints Committee (ICC). The Act specifies the composition of the ICC: it must be headed by a senior level woman employee (Presiding Officer), include at least two employees preferably with social work experience or legal knowledge, and include one external member from an NGO or association committed to women’s issues or a person familiar with sexual harassment issues. The Act *does not* require or specify that a member from the local police be part of the ICC. The role of the police is separate and comes into play if a criminal complaint is filed, either directly by the complainant or based on the recommendations of the ICC report if the findings indicate a criminal offense.
The composition of the Internal Complaints Committee (ICC) under the Sexual Harassment Act is legally defined and includes internal members from the workplace and one external member, but not a member from the police.
The ICC is an internal redressal mechanism intended to provide a safe and accessible avenue for complainants within the workplace. Its process is distinct from criminal proceedings, which are handled by the police and courts.

16. Whenever a search of a person and of his belongings is conducted under

Whenever a search of a person and of his belongings is conducted under Section 12 of the CISF Act, which one of the following is not necessary ?

An inventory of the property found on such search shall be given to the person concerned after obtaining due receipt.
The property so found on such search, shall be sent to the police along with the person.
If nothing is found on such search, a nil inventory statement duly signed shall be sent to the police along with the person.
An inventory of the property found on such search shall be given to the management concerned.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Section 12 of the CISF Act grants power to CISF personnel to search any person and their belongings within the industrial undertaking or premises. Standard legal procedure following such a search requires making an inventory of any property found, providing a copy of this inventory to the person searched, and sending the found property (along with the person if applicable) to the police for further legal action. If nothing is found, a nil inventory is typically documented and also sent to the police. Giving an inventory of the property found on search to the *management concerned* is not a specified requirement under Section 12 or standard search procedures; the procedure mandates documentation for the person searched and liaison with the police.
Upon searching a person under Section 12 of the CISF Act, the mandatory steps regarding property found are creating an inventory, giving a copy to the person searched, and handing over the property (and person) to the police. Documentation is shared with the person searched and the police, not directly with the management of the facility.
The CISF Act provides specific powers and procedures for security personnel operating within industrial undertakings and other protected areas. Section 12 ensures accountability and transparency in the search process by mandating the creation and distribution of an inventory of found property, linking the procedure to law enforcement (police).

17. Which one of the following is not an essential ingredient of Pass Syst

Which one of the following is not an essential ingredient of Pass System ?

Photograph of the person who wants to enter
Signature verification of the authority whose signature is present on the pass
Checking the date of validity
Address of the person
This question was previously asked in
UPSC CISF-AC-EXE – 2021
A pass system is primarily used for access control and verification of identity and authorization to enter a restricted area. Essential elements for validating a pass typically include a photograph to match the person presenting the pass, verification of the validity period (date), and authentication of the pass itself, often through a signature or other security features of the issuing authority. The address of the person, while personal information, is not typically an essential ingredient for the *verification* process of the pass at an entry point, unless the pass is specifically tied to a local residency requirement, which is not a universal feature of pass systems.
Essential ingredients of a pass system for verification purposes focus on confirming the identity of the holder, the validity of the pass, and its authenticity. Personal details like address are not typically necessary for the immediate process of allowing or denying entry based on the pass itself.
Modern pass systems often use electronic means like magnetic stripes, barcodes, or RFID tags for verification, in addition to or instead of physical features like photographs and signatures. However, the underlying principles of identity confirmation and validity checking remain central.

18. Which one of the following is not an essential component of Improvised

Which one of the following is not an essential component of Improvised Explosive Device (IED)?

Explosive
Detonator
Mechanical timer/Mechanical clock
Power source
This question was previously asked in
UPSC CISF-AC-EXE – 2021
An Improvised Explosive Device (IED) fundamentally requires an explosive charge and a method to initiate it (detonator/initiator). Often, a power source is needed to enable the initiation mechanism, especially for electronic or timed devices. A mechanical timer or mechanical clock is one specific type of initiator delay mechanism, but it is not essential for *all* IEDs. An IED could use a different initiation method, such as a simple fuse, a pressure plate, a remote trigger, or a different type of timer (electronic, chemical). Therefore, the mechanical timer/clock is the least essential component among the options listed for a general IED definition.
The essential components of most IEDs are the explosive fill, the detonator, and an initiation system (which may include a power source and a trigger/timer mechanism). Different types of initiation systems exist; a mechanical timer is only one example of a delay mechanism.
IEDs are highly variable in design and components, limited only by the knowledge and materials available to the builder. The primary components enable the device to function as an explosive weapon: the explosive material provides the destructive energy, and the detonator/initiator causes the explosive to detonate. The method of triggering can vary widely, including command detonation (remote), time delay (mechanical, electronic, chemical), or victim-operated (pressure plate, tripwire).

19. There are many advantages of Motorised Patrol. But there are some disa

There are many advantages of Motorised Patrol. But there are some disadvantages also. Which one of the following is a disadvantage of Motorised Patrol ?

Because it moves at a fast speed, it is unable to establish personal contact.
It can cover larger area in less time.
It is affected by weather conditions.
There is an element of physical fatigue.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Motorised patrol has several advantages, such as speed and ability to cover large areas (Option B is an advantage) and reduced physical fatigue (Option D is an advantage). However, moving quickly in a vehicle inherently limits the opportunity for detailed observation and personal interaction with people in the area being patrolled. This lack of personal contact is a significant disadvantage compared to foot patrol, which allows for community engagement and closer scrutiny of the environment. Option A correctly identifies this drawback. Option C (affected by weather conditions) can be a disadvantage, but Option A is a more fundamental and commonly cited limitation of motorized patrols regarding their effectiveness in community policing or detailed surveillance.
Motorised patrol emphasizes speed and coverage, while foot patrol emphasizes detailed observation, personal interaction, and visibility. These are trade-offs in patrol strategies.
Effective security and policing often utilize a mix of patrol types, including foot, bicycle, vehicle, and sometimes specialized modes like mounted patrol, to leverage the advantages of each and mitigate their disadvantages.

20. The first industrial undertaking where CISF was inducted was

The first industrial undertaking where CISF was inducted was

HEC, Ranchi.
RCFL, Mumbai.
BCCL, Dhanbad.
Rourkela Steel Plant.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
The Central Industrial Security Force (CISF) was established in 1969. The first industrial undertaking where CISF personnel were deployed was the Fertilizer Corporation of India (FCI) plant located in Trombay, Mumbai. Rashtriya Chemicals & Fertilizers Ltd. (RCFL) is the successor entity to this unit of FCI. Therefore, RCFL, Mumbai, represents the first industrial undertaking where CISF was inducted among the given options.
CISF was created to provide integrated security cover to public sector undertakings (PSUs) across India.
Other early deployments included Heavy Engineering Corporation (HEC) Ranchi, Rourkela Steel Plant, and various coal mines under entities like BCCL, but the FCI Trombay unit (now part of RCFL) was the first.