Security Training for Seafarers with Designated Security Duties [STSDSD] SET 2

1.
Which of the following is a Security Record:

 a) Record of safety drills

 b) Record of ISM audits

 c) Record of Superintendents visit

 d) Record of Internal audit


2.
The SSA report shall be:

 a) Made Public

 b) made available to all shipping companies

 c) Kept for ship’s crew to read

 d)
Protected from unauthorized access or disclosure


3. The RSO cannot do the
following for contracting

     government

a) Change the security
level

b) Approval of the ships
security plan

 c) Security assessment

 d) Approval of the amendment of the
security plan


4. The SSAS activation
switch shall be so designed to  

    prevent inadvertent activation of the alert

  • True 
  • False

5.
After searching a suspicious looking person, you have

     found nothing, what action will you take:

a)
Ask him to board the vessel

b)
Ask him to leave the vessel

c)
Inform the port authorities

d) Ask the crew keep an eye on him


6.
The on-scene Security survey shall fulfil the following

     function:

a) Identify the nationality of the crew

b) identifying the ships navigation efficiency

c) identifying the ships engines performance

d) The requirements of ISPS code


7. Which of the following equipment are parts of cyber

     security.

a) Meteorological equipment

b) Precision equipment

c) Portable corrupters

d) SOPEP equipment

 

8.
What can be a possible Smuggling mode on ship:

a) By the drinking water

b) By the innocent looking people

c)
By the bunker

d) By air drop


9.
The record of DOC shall be maintain for:

a)
Last 8 ports

b) Last 9 ports

c)
Last 10 ports

d)
Last 11 pots


10.
Which of the below is included in CSR record:

 a) The Master Name

 b) The SSO Name

 c) The details of the authority issuing the DOC&SMC

d) The
CSO Name


11.
What is citadel:

  a) it is a safe place designated for Master
to hide in

     
case of pirates boarding the vessel

b)
It is a safe place designated for all crew to 
hide in case of pirates boarding the vessel

c) It is a safe place designated for owners
to hide in 
case
of pirates boarding the vessel

d) it is a safe place designated for pirates
to hide on 
board the vessel

12.
What can be least possible way to smuggle items on board ship:

a) By Crew                                 c) By
Routine suppliers

b) By Passengers                         d) By air drop


13.
In the event of pirates firing small arms/RPG what are your actions

a) Take shelter in
Citadel

b) Sound SSAS & DSC alert

c) Switch off AIS    

d) Fire pyrotechnics at pirates


14.
What can be least possible way to smuggle items on board ship:

a) By Crew

b) By Passengers

c) By Routine suppliers

d) By the drinking water


15.
STSDSD means:

 

a) Safety training for seafarers for designated safety

     duties

b) Safety training for seafarers for designated security

      duties

c) Security training for
seafarers for designated
security
duties            

d) Security training for seafarers for designated safety

      duties


16.
When doing physical search of a package, bag we

     should look for following:

 

a) The quality of the package or bag

b) The size of the package or bag

c) The locking arrangement of the package or bag

d) Any visible tempering
with the package or 
bag


17.
We shall not request for completion of DOS in 
following case:

a) When ship and port
are on same security 
level

b) Ship is conducting ship to ship actiyity with another ship not required to have a security
plan

c) There has been a security incident on board

d) There has been a security
threat to the ship


18.
We shall keep the record for security levels in last:

 a) 8 Ports

b) 10 ports

c) 12Ports

d) 14 Ports


19.
What is the advantage of lon Scan:

a) This can detect the operate in vacuum

b) This requires very little preparation

c) It is portable

d) All of the above


20.
Seafarers with Designated Security Duties are responsible for.

a) Security training of crew

b) Security assessment of the ship

c) Knowledge of crowd Control techniques

d) Amendment of security
plan

Leave a Reply

Your email address will not be published. Required fields are marked *