61. Sainik Sammelans are held in CISF once in a month. Which one of the fo

Sainik Sammelans are held in CISF once in a month. Which one of the following statements about Sainik Sammelans is *not* correct?

It gives the opportunity to unit personnel to hear about the plan of the organisation for the future.
It gives the opportunity to unit personnel for recreation.
It gives the opportunity to redress the grievances of force personnel.
It gives the opportunity to inform the unit personnel about the new welfare schemes for the benefit of the force personnel.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Sainik Sammelans are periodic meetings held in military and paramilitary forces like CISF. Their primary purpose is official communication from officers to personnel, addressing operational matters, disseminating information about welfare schemes, and providing a platform for personnel to raise and redress their grievances. Recreation is not the main objective of a Sainik Sammelan. While morale is important, the Sammelan itself is a formal duty-related assembly, not a recreational event.
Sainik Sammelans are formal forums for communication, welfare information dissemination, and grievance redressal within the force.
The format and frequency (often monthly) of Sainik Sammelans are prescribed by the force’s regulations. They serve as a crucial link between the leadership and the rank and file, ensuring transparency and addressing concerns promptly.

62. The security of Taj Mahal, a world heritage monument, was entrusted to

The security of Taj Mahal, a world heritage monument, was entrusted to CISF by the Government of India

on the basis of directions passed by the Hon'ble Supreme Court of India
on the request from the Chief Minister of Uttar Pradesh.
on the basis of intelligence reports that it was on the radar of terrorist groups.
when it was declared as a world heritage monument.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
The security of the Taj Mahal was handed over to the CISF in August 2002. This decision was primarily taken on the basis of directions issued by the Hon’ble Supreme Court of India, which had been monitoring the monument’s preservation and security, particularly in the context of environmental concerns and perceived security threats. While the other reasons listed (requests, intelligence reports, heritage status) might have contributed to the overall assessment of security needs, the specific decision to entrust security to CISF was a direct outcome of the Supreme Court’s intervention and directives.
The deployment of CISF for the security of the Taj Mahal was initiated based on the directions of the Supreme Court of India, highlighting the monument’s importance and the court’s oversight on its protection.
The Taj Mahal, as a UNESCO World Heritage Site and a major tourist attraction, faces unique security challenges. The Supreme Court’s involvement underscores the national significance and the need for robust security measures, which led to the deployment of a specialized federal force like CISF.

63. Which one of the following is *not* the role of CISF when providing Te

Which one of the following is *not* the role of CISF when providing Technical Consultancy Services?

Planning and designing of communication network and preparation of related operating instructions
Preparing plan for increasing the productivity of the plant
Conducting audits in the field of industrial security, industrial safety or fire safety
Study of industrial security and fire protection related problems and suggesting appropriate solutions
This question was previously asked in
UPSC CISF-AC-EXE – 2021
CISF provides Technical Consultancy Services related to industrial security, industrial safety, and fire safety. This includes conducting security and fire audits, studying related problems and suggesting solutions, and designing security-related infrastructure like communication networks. However, preparing a plan for increasing the *productivity* of the plant is an operational and management function related to manufacturing processes, efficiency, and workflow, which falls completely outside the scope of security or fire safety consultancy provided by CISF.
CISF’s Technical Consultancy services are specialized in the fields of security and safety (industrial security, fire safety), not general industrial operations or productivity enhancement.
CISF’s consultancy wing leverages the force’s extensive experience in securing various types of industrial units and critical infrastructure to advise on best practices, security technologies, risk assessment, and crisis management planning related to security and fire threats.

64. In case of a strike, agitation or gherao, which one of the following i

In case of a strike, agitation or gherao, which one of the following is *not* supposed to be a role of CISF?

To escort the official under the gherao to a safe place, if requested by the person concerned.
To extend all possible help to the police for tackling the situation
To force the employees to join work
To maintain friendly relations with employees
This question was previously asked in
UPSC CISF-AC-EXE – 2021
During a strike, agitation, or gherao, CISF’s role is primarily focused on maintaining law and order, protecting property and personnel, and ensuring the safety of those within the facility. Escorting officials under gherao to safety is a protective role that CISF performs (Option A). CISF personnel are required to cooperate and assist the local police in handling the situation (Option B). Maintaining friendly relations with employees, even during industrial unrest, is part of fostering a better working environment and can aid in de-escalation (Option D). However, forcing employees to join work is not a role of CISF; this pertains to management authority, labor laws, or orders enforced by civil administration or police, not the security force’s mandate.
CISF’s role during industrial unrest is limited to security, protection of assets and personnel, maintenance of order, and liaison with police, not involvement in labor disputes or forcing employees to work.
CISF deployment in industrial settings often involves balancing security needs with employee relations. Their actions during strikes are governed by legal provisions and administrative guidelines, aiming to prevent violence, damage, and disruption while respecting the rights of both management and employees.

65. What should be the maximum gap between the wires/metal members in case

What should be the maximum gap between the wires/metal members in case of fence for perimeter security to preclude the possibility of unfettered movement of objects to and from the facility?

8"
6"
10"
12"
This question was previously asked in
UPSC CISF-AC-EXE – 2021
For perimeter security fencing, especially for critical infrastructure or high-security areas, the gap between vertical and horizontal members needs to be small enough to prevent a person from climbing through or passing objects through easily. While specific standards vary depending on the security level, a gap of 6 inches (approximately 15 cm) is a common and widely accepted maximum size for high-security fences like chain-link or welded mesh to effectively preclude the passage of a human body or significant objects. Larger gaps like 8″, 10″, or 12″ would compromise the effectiveness of the barrier.
Perimeter security fence design, including mesh size or gap between members, is critical to its effectiveness as a physical barrier against intrusion and passage of objects. Smaller gaps provide higher security.
Perimeter security fences are often part of a layered security system that includes detection systems (sensors), surveillance (CCTV), and response mechanisms. The physical barrier’s effectiveness is measured by its ability to delay or prevent penetration. Standards from organizations like ASTM (American Society for Testing and Materials) or government agencies specify requirements for various security levels.

66. Which one of the following does *not* fall under the category ‘Biometr

Which one of the following does *not* fall under the category ‘Biometrics’, meant for personal identification related to access control?

Card Reader and Card
Iris
Fingerprint
Handwriting
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Biometrics refers to methods of recognizing a person based on their unique physical or behavioral characteristics. Iris recognition, fingerprint scanning, and handwriting analysis (signature dynamics or forensic analysis) are all forms of biometrics. A card reader and card system, however, is a token-based access control system. The card is a physical object (token) that the person possesses, and the reader verifies the information stored on the card. The identification is based on possession of the token, not on a unique characteristic of the person themselves.
Biometric identification uses inherent personal characteristics (like iris, fingerprint, voice, face), whereas token-based systems rely on possessing an object (like a card or key).
Biometric systems offer a higher level of security than simple token-based systems as biometric characteristics are difficult to forge or transfer. However, they also raise privacy concerns. Access control systems can be purely token-based, purely biometric, or use a combination of methods (e.g., card + PIN, card + fingerprint).

67. With regard to the event of deployment of CISF during election duties,

With regard to the event of deployment of CISF during election duties, which one of the following statements is *not* correct?

They should be absolutely impartial and ensure that the spirit of the law is not violated.
Even if the Presiding Officer asks to arrest, CISF personnel deployed on duty, cannot make arrest.
Does not hesitate to use force if there is instance of booth capturing.
In the event of attack on the polling station by miscreants, the CISF will not hesitate to use force.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
The question asks which statement about CISF deployment during election duties is *not* correct.
A) CISF personnel must be impartial and ensure the spirit of the law is not violated. This is correct behavior for any security force during elections.
B) Even if the Presiding Officer asks to arrest, CISF personnel deployed on duty, cannot make arrest. This statement is incorrect. CISF personnel have powers of arrest without warrant under Section 11 of the CISF Act for offences committed under the Act or any other law, particularly cognizable offences committed in their presence. Disturbing elections, booth capturing, or attacking polling stations are offences. While their primary role is to assist and hand over to police, stating they *cannot* make an arrest is an overstatement of their limitations and therefore incorrect.
C) Does not hesitate to use force if there is instance of booth capturing. This is correct; preventing booth capturing is a key duty, and force may be necessary.
D) In the event of attack on the polling station by miscreants, the CISF will not hesitate to use force. This is correct; protecting the polling station is a primary duty.
Therefore, the statement that is not correct is that they cannot make an arrest.
CISF personnel possess powers of arrest under Section 11 of the CISF Act for relevant offences. While standard procedure during election duty may involve detaining and handing over to the police, stating they cannot make an arrest at all is inaccurate.
CISF’s role in election duties is crucial for maintaining law and order, ensuring free and fair polls, and protecting polling personnel and voters. Their actions are guided by election laws, the CISF Act, and directives from the Election Commission and local administration.

68. In case of a complaint regarding sexual harassment at the workplace, a

In case of a complaint regarding sexual harassment at the workplace, an Internal Complaint Committee is required to be constituted. With regard to this, which one of the following statements is not correct ?

A senior level woman officer, working at the workplace, shall act as the Presiding Officer of the Committee.
Not less than two members from amongst employees, preferably committed to the cause of women or who had experience in social work or have legal knowledge, shall be the members of the Committee.
One member from amongst NGOs/Associations committed to the cause of women or a person familiar with the issues relating to sexual harassment shall be a member of the Committee.
One member from the local police, preferably a woman from the woman police station, shall be a member of the Committee.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
The Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal) Act, 2013 mandates the constitution of an Internal Complaints Committee (ICC). The Act specifies the composition of the ICC: it must be headed by a senior level woman employee (Presiding Officer), include at least two employees preferably with social work experience or legal knowledge, and include one external member from an NGO or association committed to women’s issues or a person familiar with sexual harassment issues. The Act *does not* require or specify that a member from the local police be part of the ICC. The role of the police is separate and comes into play if a criminal complaint is filed, either directly by the complainant or based on the recommendations of the ICC report if the findings indicate a criminal offense.
The composition of the Internal Complaints Committee (ICC) under the Sexual Harassment Act is legally defined and includes internal members from the workplace and one external member, but not a member from the police.
The ICC is an internal redressal mechanism intended to provide a safe and accessible avenue for complainants within the workplace. Its process is distinct from criminal proceedings, which are handled by the police and courts.

69. Whenever a search of a person and of his belongings is conducted under

Whenever a search of a person and of his belongings is conducted under Section 12 of the CISF Act, which one of the following is not necessary ?

An inventory of the property found on such search shall be given to the person concerned after obtaining due receipt.
The property so found on such search, shall be sent to the police along with the person.
If nothing is found on such search, a nil inventory statement duly signed shall be sent to the police along with the person.
An inventory of the property found on such search shall be given to the management concerned.
This question was previously asked in
UPSC CISF-AC-EXE – 2021
Section 12 of the CISF Act grants power to CISF personnel to search any person and their belongings within the industrial undertaking or premises. Standard legal procedure following such a search requires making an inventory of any property found, providing a copy of this inventory to the person searched, and sending the found property (along with the person if applicable) to the police for further legal action. If nothing is found, a nil inventory is typically documented and also sent to the police. Giving an inventory of the property found on search to the *management concerned* is not a specified requirement under Section 12 or standard search procedures; the procedure mandates documentation for the person searched and liaison with the police.
Upon searching a person under Section 12 of the CISF Act, the mandatory steps regarding property found are creating an inventory, giving a copy to the person searched, and handing over the property (and person) to the police. Documentation is shared with the person searched and the police, not directly with the management of the facility.
The CISF Act provides specific powers and procedures for security personnel operating within industrial undertakings and other protected areas. Section 12 ensures accountability and transparency in the search process by mandating the creation and distribution of an inventory of found property, linking the procedure to law enforcement (police).

70. Which one of the following is not an essential ingredient of Pass Syst

Which one of the following is not an essential ingredient of Pass System ?

Photograph of the person who wants to enter
Signature verification of the authority whose signature is present on the pass
Checking the date of validity
Address of the person
This question was previously asked in
UPSC CISF-AC-EXE – 2021
A pass system is primarily used for access control and verification of identity and authorization to enter a restricted area. Essential elements for validating a pass typically include a photograph to match the person presenting the pass, verification of the validity period (date), and authentication of the pass itself, often through a signature or other security features of the issuing authority. The address of the person, while personal information, is not typically an essential ingredient for the *verification* process of the pass at an entry point, unless the pass is specifically tied to a local residency requirement, which is not a universal feature of pass systems.
Essential ingredients of a pass system for verification purposes focus on confirming the identity of the holder, the validity of the pass, and its authenticity. Personal details like address are not typically necessary for the immediate process of allowing or denying entry based on the pass itself.
Modern pass systems often use electronic means like magnetic stripes, barcodes, or RFID tags for verification, in addition to or instead of physical features like photographs and signatures. However, the underlying principles of identity confirmation and validity checking remain central.

Exit mobile version