Recent Posts

6/recent/ticker-posts

“170”, Aptitude Test Questions and Answers for Security Officer II – the Tanzania Posts Corporation.

 


“170”, Aptitude Test Questions and Answers for Security Officer II – the Tanzania Posts Corporation.

 

 

ABSTRACT

This compilation presents 170 multiple-choice questions designed to assess knowledge and practical understanding of security and workplace protection measures in organizational settings. The questions cover a broad range of topics including access control, emergency response, fire safety, threat assessment, physical and cyber security, ethical responsibilities, and legal frameworks. Each question is accompanied by clearly structured answer choices, a correct answer, and a rationale, providing both assessment and learning value. This resource is intended for security personnel, trainees, and professionals seeking to enhance competence, reinforce best practices, and prepare for certification or professional examinations.

 

Prepared by:

Johnson Yesaya Mgelwa.

A lawyer stationed in Dar-es-salaam.

0628729934.

Date: August 10, 2025

 

Dear applicants,

This collection of questions and answers has been carefully prepared to help all of you to understand the key areas tested during the interview. The goal is to provide a useful, and practical study guide so you can all perform confidently and fairly in the selection process. I wish you the best of luck, and may this resource support you in achieving success!

 

Warm regards,

Johnson Yesaya Mgelwa

 

For Personal Use by Applicants Preparing for Security Officer II – Tanzania Posts Corporation, interview


ALL QUESTIONS COMPILED TOGETHER.

1. Which of the following best explains the main purpose of security procedures in an organization?

A. To satisfy government auditors B. To ensure safety of assets, employees, and clients C. To reduce paperwork in daily operations D. To increase company profits

Answer: B. To ensure safety of assets, employees, and clients

Rationale: Security procedures primarily aim at protecting people and property. While compliance (A) and profitability (D) may result indirectly, the direct objective is safeguarding organizational resources, staff, and clients. Paperwork reduction (C) is irrelevant.


2. Which law primarily governs criminal conduct and penalties in Tanzania?

A. The Evidence Act Cap. 6 B. The Penal Code Cap. 16 C. The Criminal Procedure Act Cap. 20 D. The Prevention of Corruption Act

Answer: B. The Penal Code Cap. 16

Rationale: The Penal Code is the principal legislation defining criminal offenses and their penalties. The Evidence Act (A) governs admissibility of evidence, the CPA (C) outlines procedure, and the Prevention of Corruption Act (D) addresses corruption specifically.


3. When inspecting a visitor entering a secure facility, the officer’s primary duty is to:

A. Verify identification documents B. Prevent smuggling of unauthorized items C. Provide directions to the office D. Welcome the visitor politely

Answer: B. Prevent smuggling of unauthorized items

Rationale: While politeness (D) and directions (C) matter, the officer’s security role focuses on controlling entry to block prohibited materials. Checking IDs (A) is part of the process, but the broader duty is preventing unauthorized entry of items.


4. The term “burglary” in Tanzania law generally refers to:

A. Forcefully taking property from a person B. Unauthorized entry into premises with intent to commit a felony C. Stealing property in the presence of the owner D. Forging documents to gain access to property

Answer: B. Unauthorized entry into premises with intent to commit a felony

Rationale: Burglary is entry into premises without consent, intending to commit a crime therein. Robbery (A, C) involves direct confrontation with victims, while forgery (D) relates to falsifying documents.


5. Which of the following is the most effective deterrent against internal theft in an organization?

A. Installing CCTV cameras B. Establishing strict accounting procedures C. Hiring additional security guards D. Conducting regular surprise inspections

Answer: D. Conducting regular surprise inspections

Rationale: CCTV (A) and guards (C) help, but surprise checks create unpredictability, discouraging insider theft. Accounting controls (B) reduce financial fraud but not physical theft.


6. In case of fire outbreak within office premises, the first action of a security officer should be to:

A. Run outside immediately B. Alert all occupants and initiate evacuation C. Save company records from the safe D. Wait for the fire brigade

Answer: B. Alert all occupants and initiate evacuation

Rationale: Safety of human life is the top priority. Running alone (A) neglects others, saving property (C) risks lives, and waiting passively (D) wastes critical response time.


7. Which body is constitutionally mandated to oversee law enforcement agencies in Tanzania?

A. Parliament B. Judiciary C. Ministry of Home Affairs D. The President

Answer: D. The President

Rationale: Under the Constitution, the President is the Commander-in-Chief and exercises ultimate authority over defense and security organs. Parliament (A) legislates, Judiciary (B) interprets law, and Ministry (C) executes policies but is subordinate.


8. An authentic security report should always include:

A. Writer’s personal opinion B. Facts, time, and date of the incident C. Only names of suspects D. Possible punishment for offenders

Answer: B. Facts, time, and date of the incident

Rationale: Security reports must be factual, objective, and time-stamped. Opinions (A) and punishments (D) are outside the officer’s mandate, and names alone (C) without facts make reports incomplete.


9. The main reason for visitor registration at the gate of an organization is to:

A. Monitor visitor numbers for statistics B. Ensure accountability in case of incidents C. Avoid unnecessary waiting in reception D. Facilitate marketing strategies

Answer: B. Ensure accountability in case of incidents

Rationale: The register links visitors with events occurring during their stay. Counting numbers (A) or marketing (D) is secondary, and reducing waiting time (C) is irrelevant.


10. In the context of asset protection, “authentication” means:

A. Certifying documents for court use B. Verifying that items entering or leaving premises are genuine and authorized C. Signing employment contracts D. Testing the durability of equipment

Answer: B. Verifying that items entering or leaving premises are genuine and authorized

Rationale: Security authentication focuses on preventing theft or fraud by verifying property movement. Document certification (A) is legal, contracts (C) HR-related, and durability tests (D) technical.


11. Which of the following is the most secure password practice for system access?

A. Using simple, memorable words B. Writing passwords on a notebook C. Using complex combinations of letters, numbers, and symbols D. Sharing passwords with trusted colleagues

Answer: C. Using complex combinations of letters, numbers, and symbols

Rationale: Strong passwords enhance cybersecurity. Simple words (A), written notes (B), or sharing (D) compromise security.


12. What is the main purpose of the Criminal Procedure Act, Cap. 20 in Tanzania?

A. To define criminal offenses B. To outline criminal trial procedures C. To regulate prison services D. To control immigration matters

Answer: B. To outline criminal trial procedures

Rationale: The CPA provides steps for handling suspects, evidence, trials, and appeals. Defining crimes (A) is Penal Code, prisons (C) fall under Prison Act, and immigration (D) under immigration laws.


13. Which among the following is NOT a common duty of a security officer?

A. Preventing unauthorized entry B. Monitoring alarms and CCTV C. Conducting criminal trials D. Reporting suspicious events

Answer: C. Conducting criminal trials

Rationale: Trials are judicial functions. Security officers focus on prevention, monitoring, and reporting.


14. Which document is commonly used to hand over items from one officer to another during shift changes?

A. Visitor pass B. Occurrence book C. Handover form D. Security clearance letter

Answer: C. Handover form

Rationale: Handover forms ensure accountability in property and duty transfers. Occurrence books (B) record incidents, visitor passes (A) control entry, clearance letters (D) are for background checks.


15. The principle of “Access Control” in security mainly focuses on:

A. Denying all visitors entry B. Allowing free access for staff C. Restricting entry to authorized persons only D. Recording staff birthdays

Answer: C. Restricting entry to authorized persons only

Rationale: Access control manages who enters restricted areas. Denial (A) or free access (B) contradicts the principle, and birthdays (D) are irrelevant.


16. Which of the following is the most reliable evidence in a theft case?

A. Rumors from employees B. CCTV footage of the incident C. Personal suspicion of a guard D. Anonymous phone call

Answer: B. CCTV footage of the incident

Rationale: Courts rely on tangible, verifiable evidence. Rumors (A) and suspicions (C) lack credibility, while anonymous tips (D) are not conclusive.


17. The National Identification Authority (NIDA) in Tanzania mainly provides:

A. Work permits B. National ID cards C. Voter registration D. Driver licenses

Answer: B. National ID cards

Rationale: NIDA’s mandate is issuing national IDs. Work permits (A) come from immigration, voter registration (C) by NEC, and licenses (D) by TRA.


18. The ultimate responsibility of corporate security management is to:

A. Ensure compliance with labor laws B. Prevent and mitigate risks to assets and personnel C. Maximize company revenue D. Reduce recruitment costs

Answer: B. Prevent and mitigate risks to assets and personnel

Rationale: Security protects people and property. Revenue (C) or HR cost-cutting (D) are indirect benefits, and labor compliance (A) is HR/legal duty.


19. A security officer who notices an unattended bag in a public area should FIRST:

A. Open it to check contents B. Move it to a safer place C. Alert authorities and isolate the area D. Ignore it since it may be harmless

Answer: C. Alert authorities and isolate the area

Rationale: Suspicious objects may be dangerous. Best practice is isolating and notifying experts. Opening (A) or moving (B) is risky, and ignoring (D) endangers safety.


20. Which is the most important skill for writing a professional security report?

A. Creativity B. Objectivity C. Humor D. Personal opinion

Answer: B. Objectivity

Rationale: Reports must be factual and unbiased. Creativity (A) or humor (C) are inappropriate, while personal opinion (D) compromises accuracy.


21. Which act in Tanzania governs the admissibility and rules of presenting evidence in court?

A. Penal Code B. Criminal Procedure Act C. Evidence Act Cap. 6 D. Police Force and Auxiliary Services Act

Answer: C. Evidence Act Cap. 6

Rationale: The Evidence Act sets rules on what evidence is acceptable in court. Penal Code defines crimes, CPA handles procedures, and Police Act regulates police conduct.


22. Which among the following best describes “situational awareness” for a security officer?

A. Being aware of office politics B. Observing surroundings to detect threats early C. Always checking social media updates D. Knowing colleagues’ personal issues

Answer: B. Observing surroundings to detect threats early

Rationale: Situational awareness means maintaining vigilance over one’s environment to spot risks. Other options are irrelevant.


23. What is the main responsibility of the Prevention and Combating of Corruption Bureau (PCCB)?

A. Investigating all crimes B. Managing prison services C. Combating corruption and related offenses D. Issuing security licenses

Answer: C. Combating corruption and related offenses

Rationale: PCCB focuses solely on corruption. Police (A) handle general crimes, prisons (B) are under Prison Service, and licenses (D) are given by regulatory boards.


24. If a security officer finds an employee stealing company property, the FIRST step should be:

A. Arrest the employee using maximum force B. Report immediately to the supervisor and record the incident C. Publicly shame the employee D. Ignore if the item is of low value

Answer: B. Report immediately to the supervisor and record the incident

Rationale: Proper protocol involves reporting and documenting. Excessive force (A), shaming (C), or ignoring (D) are unprofessional and risky.


25. Which international organization sets standards for aviation security worldwide?

A. World Health Organization (WHO) B. United Nations Development Programme (UNDP) C. International Civil Aviation Organization (ICAO) D. International Monetary Fund (IMF)

Answer: C. International Civil Aviation Organization (ICAO)

Rationale: ICAO is responsible for aviation safety and security standards. WHO handles health, UNDP development, and IMF finance.


26. Which of the following is the BEST example of preventive security?

A. Investigating after a theft has occurred B. Installing surveillance cameras in advance C. Writing a report after an incident D. Attending a disciplinary hearing

Answer: B. Installing surveillance cameras in advance

Rationale: Preventive security focuses on stopping incidents before they happen. Investigations (A) and reports (C) are reactive, while disciplinary hearings (D) are administrative.


27. Which is the safest way to handle classified documents in an organization?

A. Leaving them on desks overnight B. Keeping them in locked cabinets with controlled access C. Photocopying them for backups and sharing with staff D. Saving them on unsecured personal laptops

Answer: B. Keeping them in locked cabinets with controlled access

Rationale: Classified materials require secure storage and restricted access. Leaving them unattended (A), excessive sharing (C), or storing on personal devices (D) exposes them to risks.


28. Which principle guides the use of force by a security officer?

A. Use maximum force whenever possible B. Use force proportionate to the threat C. Avoid using force in all situations D. Wait for police before acting

Answer: B. Use force proportionate to the threat

Rationale: Security ethics demand that force be minimal and necessary only to control the situation. Excessive force (A) is unlawful, complete avoidance (C) may endanger safety, and waiting always (D) may waste crucial time.


29. Which government agency in Tanzania is mainly responsible for immigration control?

A. Tanzania Revenue Authority (TRA) B. Tanzania Police Force C. Immigration Department under Ministry of Home Affairs D. Prevention and Combating of Corruption Bureau (PCCB)

Answer: C. Immigration Department under Ministry of Home Affairs

Rationale: Immigration services are handled by the Immigration Department. TRA (A) deals with taxes, Police (B) enforce law generally, and PCCB (D) fights corruption.


30. What is the MAIN role of patrols by security officers?

A. To create fear among employees B. To detect and deter suspicious activities C. To impress visitors D. To reduce paperwork

Answer: B. To detect and deter suspicious activities

Rationale: Patrols are a proactive measure to maintain visibility and discourage wrongdoing. Fear (A), impressing (C), or paperwork reduction (D) are not objectives.

📘 Get the Full Practical Test PDF (Questions 1–170)

You’ve just accessed the first 30 questions. The full set of 170 expertly prepared aptitude test questions for Security Officer II – the Tanzania Posts Corporation. is available for sale in a PDF format

To get access of the full PDF through your Gmail (Questions 1–170), please make a payment of Tsh 10,000 to the LIPA number below:

Airtel Money LIPA Number: 13970429
Yas/Tigo LIPA Number: 18401500
M-Pesa Withdrawal code:  826910
Registered Name: Johnson Yesaya Mgelwa

After payment, please send a text message with the words “Security Officer TPC” to:

Contact Number: +255 628 729 934

⚠️ Important Notice

  • The PDF is watermarked and protected for personal use only.
  • Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited.
  • Legal action may be taken against the misuse of this material.

Thank you for supporting quality content. Best of luck in your interview preparation!

Post a Comment

0 Comments