61. In case you had joined the armed forces at the upper age limit of 21 y

In case you had joined the armed forces at the upper age limit of 21 years under the ‘Agneepath’ Scheme in the first batch and you had served 4 years, you can be recruited by CISF until the age of

27 years
28 years
29 years
30 years
This question was previously asked in
UPSC CISF-AC-EXE – 2024
For the first batch of Agniveers, the Ministry of Home Affairs announced a 5-year relaxation in the upper age limit for recruitment into CAPFs (including CISF). Assuming the standard upper age limit for recruitment (e.g., Constable GD) is 23 years, the relaxed upper age limit for the first batch of Agniveers is 23 + 5 = 28 years. An individual who joined Agneepath at 21 and served for 4 years would be 25 years old upon release. They can be recruited by CISF as long as they meet the eligibility criteria, including the age limit, which is relaxed up to 28 years for the first batch. Therefore, they can be recruited until the age of 28 years.
The age relaxation for the first batch of Agniveers applying for CAPFs is 5 years beyond the prescribed upper age limit for the post.
For subsequent batches of Agniveers, the age relaxation for CAPF recruitment will be 3 years beyond the prescribed upper age limit. The standard upper age limit for Constable (GD) in CAPFs is typically 23 years (with relaxations for OBC/SC/ST as per rules). The 5-year relaxation for the first batch made the effective upper age limit 28 years for them for these posts.

62. A perimeter wall of standard height should have further reinforcement

A perimeter wall of standard height should have further reinforcement with which of the following?
1. Barbed wire on top
2. Setting spikes
3. Concertina wire
Select the correct answer using the code given below.

1 and 2 only
1 and 3 only
1, 2 and 3
2 and 3 only
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is C) 1, 2 and 3. All three options – barbed wire, setting spikes, and concertina wire (often razor wire) – are common and effective methods used to reinforce the top of a perimeter wall or fence. They serve as physical deterrents and obstacles to prevent or hinder unauthorized climbing. Barbed wire provides a tangled barrier. Spikes present sharp points making climbing difficult and painful. Concertina wire, especially razor wire, is a very effective physical barrier due to its sharp edges and springy coils. Using any combination or all three enhances the security of the perimeter.
Barbed wire, setting spikes, and concertina wire are all recognized and widely used supplementary physical security measures applied to the top of walls or fences to deter intrusion.
The choice of reinforcement often depends on the required level of security, cost, and aesthetic considerations. Concertina wire typically offers a higher level of deterrence than standard barbed wire. Spikes can be particularly effective where space is limited. Implementing multiple types can further enhance security.

63. The drivers of the cash vans, while carrying heavy cash, should pay sp

The drivers of the cash vans, while carrying heavy cash, should pay special attention to which of the following?
1. Staged accidents
2. Fake police officers
3. Expected traffic diversions
4. Normal speed breakers
Select the correct answer using the code given below.

1 and 2
2 and 3
3 and 4
1 only
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is A) 1 and 2. Cash van drivers need to be highly vigilant against potential robbery tactics. Staged accidents (blocking the van or forcing it to stop) and fake police officers (impersonating law enforcement to gain control) are well-known methods used by criminals to ambush cash-in-transit vehicles. Expected traffic diversions are usually known in advance and factored into route planning, while normal speed breakers are standard road features managed with routine driving skills, neither of which pose the same level of specific, deliberate security threat as staged accidents or impersonation.
Special attention is required for threats designed to stop or intercept the van through deception or force, such as staged accidents and impersonation of authority figures.
Effective cash-in-transit security involves rigorous route planning, risk assessment, communication protocols, armored vehicles, and trained personnel. Being aware of and prepared for specific attack methods like staged accidents and fake officials is crucial for the driver and accompanying security personnel. Unexpected traffic diversions could be a potential risk, but “expected” ones are less of a special concern than active criminal tactics. Speed breakers are a matter of driving standard practice.

64. Which one of the following documents is not required in the control ro

Which one of the following documents is not required in the control room of the main gate of a plant?

Attendance register
Vehicle register
Standing order
Crime register
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is D) Crime register. The control room at the main gate of a plant typically manages entry and exit. Documents directly relevant to this function are usually kept there, such as attendance registers (for tracking personnel movement), vehicle registers (for tracking vehicle movement), and standing orders (detailing security procedures, access rules, etc.). A crime register, which records details of criminal incidents, is usually maintained at a central security office, higher management level, or for liaison with law enforcement, rather than primarily at the main gate control room. While incidents reported at the gate might be logged, the comprehensive crime register is not a standard requirement for the gate control room itself.
The main gate control room primarily handles entry/exit monitoring and enforcement of immediate access procedures. Documents related to these functions (attendance, vehicles, gate-specific standing orders) are essential. A detailed crime register is usually kept centrally.
The purpose of the main gate control room is operational security and access control. Documents like visitor logs, material movement passes, and emergency contact lists would also typically be found there. A crime register would be a summary record often compiled and maintained elsewhere based on incident reports originating from various points, including the gate.

65. While maintaining the employer’s rights in respect of trespass and dam

While maintaining the employer’s rights in respect of trespass and damage, an impartial, courteous and friendly attitude can yield dividends in taking the heat out of an immediate situation and yield long-term dividends in the form of goodwill.
In which one among the following references will this statement be most appropriate for industrial security?

Counter-intelligence
Action during strike
Action during patrolling
Enhanced housekeeping
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is B) Action during strike. The statement emphasizes maintaining rights while adopting a courteous and friendly attitude to de-escalate tension and build goodwill. This is particularly relevant during industrial actions like strikes, where security personnel interact directly with potentially agitated employees. A calm, respectful approach can help prevent escalation and maintain a better relationship between the workforce and the company in the long term, even while ensuring security and protecting property.
The described approach of combining firmness on rights with courtesy for de-escalation and goodwill is a critical strategy in managing tense, confrontational situations involving personnel, such as industrial strikes.
Counter-intelligence deals with protecting sensitive information. Action during patrolling involves routine surveillance and observation. Enhanced housekeeping relates to cleanliness and orderliness. While attitude is important in patrolling, the statement’s emphasis on “taking the heat out of an immediate situation” strongly suggests a scenario involving potential conflict or high tension, which is most characteristic of managing security during a strike or similar protest.

66. The decimal value of 4A9.2B is

The decimal value of 4A9.2B is

1193.1679
119.31679
11.931679
1.1931679
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is A) 1193.1679. To convert a hexadecimal number (base 16) to a decimal number (base 10), we multiply each digit by 16 raised to the power of its position (starting from 0 for the digit before the decimal point, increasing to the left, and decreasing to the right). The hexadecimal digits are 0-9 and A-F (representing 10-15).
For 4A9.2B:
Integer part: 4A9 = 4 * 16^2 + A (10) * 16^1 + 9 * 16^0
= 4 * 256 + 10 * 16 + 9 * 1
= 1024 + 160 + 9 = 1193
Fractional part: .2B = 2 * 16^-1 + B (11) * 16^-2
= 2 / 16 + 11 / 256
= 1 / 8 + 11 / 256
= 32 / 256 + 11 / 256 = 43 / 256
Convert 43/256 to decimal: 43 ÷ 256 ≈ 0.16796875
Combining the integer and fractional parts: 1193 + 0.16796875 = 1193.16796875. This matches option A when rounded to four decimal places.
Hexadecimal to decimal conversion involves summing the products of each digit’s value and 16 raised to the power corresponding to its position relative to the decimal point.
The positions are assigned positive integers starting from 0 moving left from the decimal point (e.g., 16^0, 16^1, 16^2…) and negative integers moving right from the decimal point (e.g., 16^-1, 16^-2…).

67. MS Access is a/an

MS Access is a/an

relational DBMS
network DBMS
object-oriented DBMS
hierarchical DBMS
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is A) relational DBMS. Microsoft Access is a database management system (DBMS) from Microsoft. It is designed to manage data using tables that are organized into fields and records, and allows for defining relationships between these tables using primary and foreign keys. This structure fits the definition of a relational database management system (RDBMS).
MS Access stores data in tables and uses relationships between tables to organize and manage data, which is characteristic of a Relational Database Management System.
Network, object-oriented, and hierarchical DBMS represent different data modeling structures. Network DBMS uses a graph-like structure, hierarchical DBMS uses a tree-like structure, and object-oriented DBMS stores data as objects. Relational DBMS (like MS Access, MySQL, SQL Server, Oracle) organizes data in tables with defined relationships.

68. On which layer of the OSI model does a ‘repeater’ operate?

On which layer of the OSI model does a ‘repeater’ operate?

Physical
Data link
Network
Presentation
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is A) Physical. A repeater is a network device that operates at the Physical layer (Layer 1) of the OSI model. Its function is to receive a signal, regenerate or amplify it to its original strength, and then retransmit it, extending the range of the network segment. It does not interpret data packets or frames; it simply deals with the electrical or optical signals.
Repeaters work at the Physical layer, dealing with the raw signal transmission medium and regenerating signals to overcome attenuation.
Other devices operating at the Physical layer include hubs and cabling. Devices like switches operate at the Data Link layer (Layer 2), routers operate at the Network layer (Layer 3), and gateways can operate at multiple layers, often including the upper layers.

69. Which one of the following is the medium in optical storage system for

Which one of the following is the medium in optical storage system for reading and recording data?

Ultraviolet light
Laser light
Black light
High-energy visible light
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is B) Laser light. Optical storage systems, such as CD, DVD, and Blu-ray drives, use laser beams to read and write data. The laser light interacts with the surface of the disc, reflecting differently off the ‘pits’ and ‘lands’ (or phase changes) that represent the stored binary data.
Optical storage technology relies on the use of focused light, specifically lasers, to interact with the storage medium surface for data retrieval and recording.
Different types of optical media use lasers of different wavelengths. For example, CD drives use red lasers, DVD drives use shorter-wavelength red lasers, and Blu-ray drives use blue-violet lasers, allowing for higher data density. Ultraviolet light, black light (which is also UV light), and general high-energy visible light are not the specific mediums used in standard optical data storage systems.

70. Histogram is a type of

Histogram is a type of

line chart
pie chart
bar chart
donut chart
This question was previously asked in
UPSC CISF-AC-EXE – 2024
The correct answer is C) bar chart. A histogram is a graphical representation of the distribution of numerical data. It is a type of bar chart where the bars are drawn such that they are adjacent to each other (unless there are gaps in the data), and each bar represents the frequency or count of data falling within a specific bin or range.
A histogram uses bars to show the frequency distribution of data, making it a specific type of bar chart. The x-axis represents the data ranges (bins), and the y-axis represents the frequency.
Unlike standard bar charts which often represent categorical data, histograms represent continuous or grouped numerical data. Line charts display data points connected by lines. Pie charts and donut charts represent proportions of a whole.