11. Random frisking means frisking of :

Random frisking means frisking of :

persons who are well-built.
persons who are drunk.
at least every fifth person.
few male persons only.
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is C) at least every fifth person. In a security context, ‘random frisking’ typically implies checking a sample of people passing through, rather than checking everyone (100% frisking) or checking only those who appear suspicious based on subjective criteria. While “every fifth person” is systematic rather than purely random, it represents a policy of frisking a portion of the population selected by a rule, which is a common method implemented under the umbrella term “random checks” in security to deter and detect threats without profiling or causing excessive delays. Options A, B, and D describe selection based on personal attributes, which is not random frisking.
– Random frisking in security is a technique used for deterrence and detection. It involves selecting individuals from a flow of people for searching based on a method that is unpredictable to the individual being frisked.
– This unpredictability can be achieved through various means, including truly random selection mechanisms or systematic sampling like checking every Nth person, provided the pattern isn’t easily predictable or is varied.
– The key is that the selection is not based on subjective criteria like appearance, behaviour (unless specific alert criteria are met, which would then fall under targeted search), or any form of discrimination.
The actual method for implementing random frisking varies across security agencies and locations. While a mathematically true random selection is ideal, practical considerations often lead to systematic sampling methods (like “every fifth person” or choosing based on a random number generator at intervals) or simply unpredictable selection by the security personnel based on operational needs, as long as it avoids discriminatory practices.

12. During the outbreak of fire in a unit, which one of the following shou

During the outbreak of fire in a unit, which one of the following should not be done ?

Stop the fire from spreading
Reach the spot as early as possible with proper equipment and sufficient manpower
Inform the local police and wait till the police arrives
Rescue of the persons caught in the fire
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is C) Inform the local police and wait till the police arrives. While informing the local police and fire services is crucial during a fire outbreak, *waiting* for the police to arrive before taking action is incorrect and dangerous. Immediate actions like fire fighting, rescuing people, and preventing spread are paramount.
– Emergency procedures during a fire emphasize immediate response: raising the alarm, attempting to extinguish small fires if safe, evacuating people, and informing relevant authorities (fire services and police).
– Delaying action while waiting for authorities can lead to the fire escalating, causing more damage and endangering lives.
– Rescue of trapped persons and preventing the fire from spreading are critical immediate actions.
Fire fighting strategies follow a sequence often summarized as “RACE” or “PASS” (for using an extinguisher) and general emergency response protocols which prioritize life safety, then incident stabilization, and finally property conservation. The police’s role in a fire incident typically involves crowd control, investigation (arson, cause), and supporting other emergency services, but they are not the primary responders for fire suppression or immediate rescue in most cases; fire services are.

13. Which one of the following is the highest category Protectee ?

Which one of the following is the highest category Protectee ?

Z category protectee
Z+ category protectee
SPG protectee
CISF protectee
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is C) SPG protectee. Among the options provided, the SPG (Special Protection Group) provides the highest level of security cover in India.
– Security cover categories in India are generally graded as SPG, Z+, Z, Y, and X, based on the threat perception to the individual.
– The SPG is a specialized force solely dedicated to providing security to the Prime Minister of India and their immediate family, and sometimes to former Prime Ministers and their families for a specified period. This is considered the most elite and highest tier of protection.
– Z+ category is the highest level of security provided by other central armed police forces like NSG, CRPF, ITBP, or state police, covering a larger number of high-risk individuals.
The threat perception for individuals is periodically reviewed by the central and state security agencies, based on which the security category is determined. CISF also provides security cover to protectees, but typically for categories like Z or Y, or as part of the security detail for Z+ protectees, but not the dedicated, highest-level SPG cover.

14. As per the CISF Act, 1968, which of the following is not correct as fa

As per the CISF Act, 1968, which of the following is not correct as far as the procedure to be followed after arrest by CISF is concerned ?

To hand over the arrested person to the nearest police station
To hand over the arrested person to the management of the undertaking
To hand over the arrested person to a police officer
To prepare a report of the circumstances occasioning the arrest
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is B) To hand over the arrested person to the management of the undertaking. As per the CISF Act, 1968 and general legal procedures, CISF personnel, after making an arrest, must hand over the arrested person to the nearest police station or a police officer, not to the management of the undertaking they are protecting, as the management does not have the legal authority to handle arrested persons in accordance with criminal procedure law.
– Section 11 of the CISF Act, 1968 deals with the power to arrest without warrant.
– Section 12 mandates that any CISF officer making an arrest without a warrant shall without unnecessary delay make over the person so arrested to a police officer and failing such police officer, take such person to the nearest police station.
– Preparing a report detailing the circumstances of the arrest is also a necessary procedural step.
The CISF personnel derive their power of arrest from the CISF Act, read with the Code of Criminal Procedure (CrPC). Once an arrest is made, the due process involves handing the individual over to the appropriate law enforcement authority (the Police) for formal registration of case, investigation, and presentation before a magistrate, ensuring adherence to fundamental rights and legal procedures.

15. Which of the following is/are the basic function(s) of a CCTV system ?

Which of the following is/are the basic function(s) of a CCTV system ?

  • 1. To disallow unauthorised persons to enter into any building in the premises
  • 2. To allow a person to observe a scene without being present at the scene
  • 3. To allow an activity to be recorded for future viewing

Select the correct answer using the code given below :

1, 2 and 3
2 only
1 and 3 only
2 and 3 only
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is D) 2 and 3 only. The basic functions of a CCTV system are to allow remote observation of a scene and to record activities for later review.
– Statement 1 is incorrect because a CCTV system is a surveillance tool; it monitors and records but does not physically prevent unauthorized entry. Access control systems (like locks, turnstiles, card readers) perform the function of disallowing entry.
– Statement 2 is correct. The primary purpose of CCTV is to transmit video from cameras at one location to monitors at another, allowing personnel to observe a scene remotely.
– Statement 3 is correct. Recording video footage is a standard and essential function of modern CCTV systems, allowing for investigation of incidents, monitoring trends, and evidence collection.
CCTV (Closed-Circuit Television) systems are widely used for security, surveillance, and monitoring in various environments like public places, buildings, traffic management, etc. While CCTV is often part of a larger security system that might include access control or alarms, its fundamental functions are remote viewing and recording.

16. The fee received by CISF for Technical Services to industrial establis

The fee received by CISF for Technical Services to industrial establishments is credited to :

CISF Welfare Fund.
CISF Consultancy Fund.
Consolidated Fund of India.
Contingency Fund of India.
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is B) CISF Consultancy Fund. Fees received by CISF for providing technical services to industrial establishments are specifically credited to a dedicated fund or account related to these consultancy/technical services. While government revenues generally go to the Consolidated Fund of India, fees from specific services like consultancy are often channelled into dedicated funds to manage the related activities and resources.
– The CISF Act and Rules allow the force to provide consultancy services on security matters to industrial establishments, including those in the private sector.
– Revenue generated from these consultancy services is managed separately from the main budget allocated to CISF for its primary duties.
– A ‘Consultancy Fund’ or similar dedicated account ensures that the income generated can be utilized for purposes related to the consultancy wing, training, or specific needs arising from providing these services.
The provision for CISF to offer consultancy and security services beyond public sector undertakings was introduced through amendments to the CISF Act. This allows CISF to leverage its expertise and generate revenue, contributing to its resources and enabling deployment in a wider range of establishments based on security requirements.

17. Metal detector is meant to detect the presence of which of the followi

Metal detector is meant to detect the presence of which of the following in the search object ?

Ferrous metal only
Ferrous and plastic objects only
Ferrous and non-ferrous objects only
Ferrous, non-ferrous and plastic objects
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is C) Ferrous and non-ferrous objects only. Standard metal detectors operate by detecting disruptions in an electromagnetic field caused by conductive materials, which include both ferrous metals (containing iron) and non-ferrous metals (like aluminum, copper, gold, silver).
– Metal detectors work on the principle of electromagnetism. They emit an electromagnetic field and detect the presence of metal objects by measuring the secondary magnetic field induced in the object or the change in the primary field.
– Ferrous metals are magnetic (e.g., iron, steel), while non-ferrous metals are not magnetic but are still conductive (e.g., aluminum, copper, brass, gold). Both types interact with the electromagnetic field of a metal detector.
– Plastic is not a conductive material and therefore does not interfere with the electromagnetic field in a way that a standard metal detector can detect.
While standard walk-through and hand-held metal detectors detect metals, other security screening technologies exist to detect non-metallic objects like plastics, ceramics, liquids, or explosives, such as X-ray scanners, body scanners (using millimetre wave or backscatter technology), and trace detection portals.

18. Which one of the following breeds of dogs is not suitable as sniffer d

Which one of the following breeds of dogs is not suitable as sniffer dogs in aviation security ?

German Shepherd
Cocker Spaniel
Labrador
Pomeranian
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is D) Pomeranian. Pomeranians are small breed companion dogs and are not typically used for demanding detection roles like sniffer dogs in aviation security due to their size, temperament, and working drive compared to breeds specifically bred for scent work.
– Suitable sniffer dogs for security work, including aviation security, are chosen based on their strong sense of smell, trainability, temperament (calm, focused, non-aggressive), endurance, and drive to work.
– Breeds like German Shepherds, Labradors, Beagles, and Springer Spaniels (similar to Cocker Spaniels) are commonly used as detection dogs for explosives, narcotics, and other contraband due to these characteristics.
Different dog breeds are utilized for different types of detection work depending on the environment and target substance. While many breeds have a good sense of smell, successful sniffer dogs require specific physical and behavioral traits that allow them to work effectively in busy, noisy environments like airports and maintain focus for extended periods.

19. Which one of the following is not a High Intensity Explosive ?

Which one of the following is not a High Intensity Explosive ?

TNT
RDX
Black gunpowder
Plastic explosive
This question was previously asked in
UPSC CISF-AC-EXE – 2022
The correct answer is C) Black gunpowder. Black gunpowder is classified as a low explosive or propellant, not a high-intensity explosive.
– High explosives detonate, producing a supersonic shockwave. Low explosives deflagrate (burn rapidly), producing a subsonic pressure wave.
– TNT (Trinitrotoluene), RDX (Research Department Explosive), and plastic explosives (which typically use RDX or PETN as the main component) are all examples of high explosives known for their destructive power and high detonation velocity.
Common examples of high explosives include TNT, RDX, PETN, C-4, Semtex, Dynamite, and Detonating Cord. Low explosives include black powder and smokeless powder. Black gunpowder is a mixture of potassium nitrate (or sodium nitrate), charcoal, and sulfur. It is primarily used as a propellant in firearms and pyrotechnics.

20. Night Vision Devices do not consist of :

Night Vision Devices do not consist of :

Telescope.
Binocular.
X-rays.
Infrared image converter tube.
This question was previously asked in
UPSC CISF-AC-EXE – 2022
Night Vision Devices work by either amplifying existing ambient light (using image intensifier tubes which often include IR converters) or by detecting infrared radiation (thermal imaging). They use optical components similar to telescopes and are often built into binocular form factors. X-rays are a different part of the electromagnetic spectrum and are not used or detected by standard night vision technology. X-ray detection requires entirely different types of sensors and is used for applications like medical imaging or security screening.
– Night vision uses light amplification (visible/IR) or thermal detection (IR).
– Optical components like lenses (related to telescopes/binoculars) are essential.
– Image intensifier tubes process low light/IR into visible images.
– X-rays are not within the spectrum or mechanism used by typical night vision devices.
Night vision typically operates in the visible light spectrum (for amplification) and the infrared spectrum (for amplification or thermal imaging). X-rays are high-energy electromagnetic radiation and are not involved in the functioning of standard night vision equipment.

Exit mobile version