“170”,
Aptitude Test Questions and Answers for Security Officer II – the Tanzania
Posts Corporation.
ABSTRACT
This
compilation presents 170 multiple-choice questions designed to assess knowledge
and practical understanding of security and workplace protection measures in
organizational settings. The questions cover a broad range of topics including
access control, emergency response, fire safety, threat assessment, physical
and cyber security, ethical responsibilities, and legal frameworks. Each
question is accompanied by clearly structured answer choices, a correct answer,
and a rationale, providing both assessment and learning value. This resource is
intended for security personnel, trainees, and professionals seeking to enhance
competence, reinforce best practices, and prepare for certification or
professional examinations.
Prepared
by:
Johnson
Yesaya Mgelwa.
A
lawyer stationed in Dar-es-salaam.
0628729934.
Date:
August 10, 2025
Dear
applicants,
This
collection of questions and answers has been carefully prepared to help all of you
to understand the key areas tested during the interview. The goal is to provide
a useful, and practical study guide so you can all perform confidently and
fairly in the selection process. I wish you the best of luck, and may this
resource support you in achieving success!
Warm
regards,
Johnson
Yesaya Mgelwa
For Personal Use by Applicants Preparing for Security Officer II – Tanzania Posts Corporation, interview
ALL QUESTIONS COMPILED TOGETHER.
1. Which of the
following best explains the main purpose of security procedures in an
organization?
A. To satisfy government auditors B. To ensure safety of assets, employees, and
clients C. To reduce paperwork in daily operations D. To increase company
profits
Answer: B. To ensure safety of assets, employees, and
clients
Rationale: Security procedures primarily aim at
protecting people and property. While compliance (A) and profitability (D) may
result indirectly, the direct objective is safeguarding organizational
resources, staff, and clients. Paperwork reduction (C) is irrelevant.
2. Which law primarily
governs criminal conduct and penalties in Tanzania?
A. The Evidence Act Cap. 6 B. The Penal Code Cap. 16 C. The Criminal Procedure
Act Cap. 20 D. The Prevention of Corruption Act
Answer: B. The Penal Code Cap. 16
Rationale: The Penal Code is the principal
legislation defining criminal offenses and their penalties. The Evidence Act
(A) governs admissibility of evidence, the CPA (C) outlines procedure, and the
Prevention of Corruption Act (D) addresses corruption specifically.
3. When inspecting a
visitor entering a secure facility, the officer’s primary duty is to:
A. Verify identification documents B.
Prevent smuggling of unauthorized items C. Provide directions to the office D.
Welcome the visitor politely
Answer: B. Prevent smuggling of unauthorized items
Rationale: While politeness (D) and directions
(C) matter, the officer’s security role focuses on controlling entry to block
prohibited materials. Checking IDs (A) is part of the process, but the broader
duty is preventing unauthorized entry of items.
4. The term “burglary”
in Tanzania law generally refers to:
A. Forcefully taking property from a
person B. Unauthorized entry into premises with intent to commit a felony C.
Stealing property in the presence of the owner D. Forging documents to gain
access to property
Answer: B. Unauthorized entry into premises with intent to
commit a felony
Rationale: Burglary is entry into premises
without consent, intending to commit a crime therein. Robbery (A, C) involves
direct confrontation with victims, while forgery (D) relates to falsifying
documents.
5. Which of the
following is the most effective deterrent against internal theft in an
organization?
A. Installing CCTV cameras B.
Establishing strict accounting procedures C. Hiring additional security guards D.
Conducting regular surprise inspections
Answer: D. Conducting regular surprise inspections
Rationale: CCTV (A) and guards (C) help, but
surprise checks create unpredictability, discouraging insider theft. Accounting
controls (B) reduce financial fraud but not physical theft.
6. In case of fire
outbreak within office premises, the first action of a security officer should
be to:
A. Run outside immediately B. Alert
all occupants and initiate evacuation C. Save company records from the safe D.
Wait for the fire brigade
Answer: B. Alert all occupants and initiate evacuation
Rationale: Safety of human life is the top
priority. Running alone (A) neglects others, saving property (C) risks lives,
and waiting passively (D) wastes critical response time.
7. Which body is
constitutionally mandated to oversee law enforcement agencies in Tanzania?
A. Parliament B. Judiciary C. Ministry
of Home Affairs D. The President
Answer: D. The President
Rationale: Under the Constitution, the President is the
Commander-in-Chief and exercises ultimate authority over defense and security
organs. Parliament (A) legislates, Judiciary (B) interprets law, and Ministry
(C) executes policies but is subordinate.
8. An authentic
security report should always include:
A. Writer’s personal opinion B. Facts,
time, and date of the incident C. Only names of suspects D. Possible punishment
for offenders
Answer: B. Facts, time, and date of the incident
Rationale: Security reports must be factual,
objective, and time-stamped. Opinions (A) and punishments (D) are outside the
officer’s mandate, and names alone (C) without facts make reports incomplete.
9. The main reason for
visitor registration at the gate of an organization is to:
A. Monitor visitor numbers for
statistics B. Ensure accountability in case of incidents C. Avoid unnecessary
waiting in reception D. Facilitate marketing strategies
Answer: B. Ensure accountability in case of incidents
Rationale: The register links visitors with
events occurring during their stay. Counting numbers (A) or marketing (D) is
secondary, and reducing waiting time (C) is irrelevant.
10. In the context of
asset protection, “authentication” means:
A. Certifying documents for court use B.
Verifying that items entering or leaving premises are genuine and authorized C.
Signing employment contracts D. Testing the durability of equipment
Answer: B. Verifying that items entering or leaving
premises are genuine and authorized
Rationale: Security authentication focuses on
preventing theft or fraud by verifying property movement. Document
certification (A) is legal, contracts (C) HR-related, and durability tests (D)
technical.
11. Which of the
following is the most secure password practice for system access?
A. Using simple, memorable words B.
Writing passwords on a notebook C. Using complex combinations of letters,
numbers, and symbols D. Sharing passwords with trusted colleagues
Answer: C. Using complex combinations of letters, numbers,
and symbols
Rationale: Strong passwords enhance
cybersecurity. Simple words (A), written notes (B), or sharing (D) compromise
security.
12. What is the main
purpose of the Criminal Procedure Act, Cap. 20 in Tanzania?
A. To define criminal offenses B. To
outline criminal trial procedures C. To regulate prison services D. To control
immigration matters
Answer: B. To outline criminal trial procedures
Rationale: The CPA provides steps for handling
suspects, evidence, trials, and appeals. Defining crimes (A) is Penal Code,
prisons (C) fall under Prison Act, and immigration (D) under immigration laws.
13. Which among the
following is NOT a common duty of a security officer?
A. Preventing unauthorized entry B.
Monitoring alarms and CCTV C. Conducting criminal trials D. Reporting
suspicious events
Answer: C. Conducting criminal trials
Rationale: Trials are judicial functions. Security officers
focus on prevention, monitoring, and reporting.
14. Which document is
commonly used to hand over items from one officer to another during shift
changes?
A. Visitor pass B. Occurrence book C.
Handover form D. Security clearance letter
Answer: C. Handover form
Rationale: Handover forms ensure accountability
in property and duty transfers. Occurrence books (B) record incidents, visitor
passes (A) control entry, clearance letters (D) are for background checks.
15. The principle of
“Access Control” in security mainly focuses on:
A. Denying all visitors entry B.
Allowing free access for staff C. Restricting entry to authorized persons only D.
Recording staff birthdays
Answer: C. Restricting entry to authorized persons only
Rationale: Access control manages who enters
restricted areas. Denial (A) or free access (B) contradicts the principle, and
birthdays (D) are irrelevant.
16. Which of the
following is the most reliable evidence in a theft case?
A. Rumors from employees B. CCTV
footage of the incident C. Personal suspicion of a guard D. Anonymous phone
call
Answer: B. CCTV footage of the incident
Rationale: Courts rely on tangible, verifiable
evidence. Rumors (A) and suspicions (C) lack credibility, while anonymous tips
(D) are not conclusive.
17. The National
Identification Authority (NIDA) in Tanzania mainly provides:
A. Work permits B. National ID cards C.
Voter registration D. Driver licenses
Answer: B. National ID cards
Rationale: NIDA’s mandate is issuing national
IDs. Work permits (A) come from immigration, voter registration (C) by NEC, and
licenses (D) by TRA.
18. The ultimate
responsibility of corporate security management is to:
A. Ensure compliance with labor laws B.
Prevent and mitigate risks to assets and personnel C. Maximize company revenue D.
Reduce recruitment costs
Answer: B. Prevent and mitigate risks to assets and
personnel
Rationale: Security protects people and
property. Revenue (C) or HR cost-cutting (D) are indirect benefits, and labor
compliance (A) is HR/legal duty.
19. A security officer
who notices an unattended bag in a public area should FIRST:
A. Open it to check contents B. Move
it to a safer place C. Alert authorities and isolate the area D. Ignore it
since it may be harmless
Answer: C. Alert authorities and isolate the area
Rationale: Suspicious objects may be dangerous.
Best practice is isolating and notifying experts. Opening (A) or moving (B) is
risky, and ignoring (D) endangers safety.
20. Which is the most
important skill for writing a professional security report?
A. Creativity B. Objectivity C. Humor D.
Personal opinion
Answer: B. Objectivity
Rationale: Reports must be factual and unbiased.
Creativity (A) or humor (C) are inappropriate, while personal opinion (D)
compromises accuracy.
21. Which act in
Tanzania governs the admissibility and rules of presenting evidence in court?
A. Penal Code B. Criminal Procedure
Act C. Evidence Act Cap. 6 D. Police Force and Auxiliary Services Act
Answer: C. Evidence Act Cap. 6
Rationale: The Evidence Act sets rules on what
evidence is acceptable in court. Penal Code defines crimes, CPA handles
procedures, and Police Act regulates police conduct.
22. Which among the
following best describes “situational awareness” for a security officer?
A. Being aware of office politics B.
Observing surroundings to detect threats early C. Always checking social media
updates D. Knowing colleagues’ personal issues
Answer: B. Observing surroundings to detect threats early
Rationale: Situational awareness means
maintaining vigilance over one’s environment to spot risks. Other options are
irrelevant.
23. What is the main
responsibility of the Prevention and Combating of Corruption Bureau (PCCB)?
A. Investigating all crimes B.
Managing prison services C. Combating corruption and related offenses D.
Issuing security licenses
Answer: C. Combating corruption and related offenses
Rationale: PCCB focuses solely on corruption.
Police (A) handle general crimes, prisons (B) are under Prison Service, and
licenses (D) are given by regulatory boards.
24. If a security
officer finds an employee stealing company property, the FIRST step should be:
A. Arrest the employee using maximum
force B. Report immediately to the supervisor and record the incident C.
Publicly shame the employee D. Ignore if the item is of low value
Answer: B. Report immediately to the supervisor and record
the incident
Rationale: Proper protocol involves reporting
and documenting. Excessive force (A), shaming (C), or ignoring (D) are
unprofessional and risky.
25. Which international
organization sets standards for aviation security worldwide?
A. World Health Organization (WHO) B.
United Nations Development Programme (UNDP) C. International Civil Aviation
Organization (ICAO) D. International Monetary Fund (IMF)
Answer: C. International Civil Aviation Organization (ICAO)
Rationale: ICAO is responsible for aviation
safety and security standards. WHO handles health, UNDP development, and IMF
finance.
26. Which of the following is the BEST example
of preventive security?
A. Investigating after a theft
has occurred B. Installing surveillance cameras in advance C. Writing a report
after an incident D. Attending a disciplinary hearing
Answer: B. Installing
surveillance cameras in advance
Rationale: Preventive security focuses on stopping
incidents before they happen. Investigations (A) and reports (C) are reactive,
while disciplinary hearings (D) are administrative.
27. Which is the safest way to handle
classified documents in an organization?
A. Leaving them on desks
overnight B. Keeping them in locked cabinets with controlled access C.
Photocopying them for backups and sharing with staff D. Saving them on
unsecured personal laptops
Answer: B. Keeping them in
locked cabinets with controlled access
Rationale: Classified materials require secure
storage and restricted access. Leaving them unattended (A), excessive sharing
(C), or storing on personal devices (D) exposes them to risks.
28. Which principle guides the use of force by
a security officer?
A. Use maximum force whenever
possible B. Use force proportionate to the threat C. Avoid using force in all
situations D. Wait for police before acting
Answer: B. Use force proportionate
to the threat
Rationale: Security ethics demand that force be
minimal and necessary only to control the situation. Excessive force (A) is
unlawful, complete avoidance (C) may endanger safety, and waiting always (D)
may waste crucial time.
29. Which government agency in Tanzania is
mainly responsible for immigration control?
A. Tanzania Revenue Authority
(TRA) B. Tanzania Police Force C. Immigration Department under Ministry of Home
Affairs D. Prevention and Combating of Corruption Bureau (PCCB)
Answer: C. Immigration
Department under Ministry of Home Affairs
Rationale: Immigration services are handled by the
Immigration Department. TRA (A) deals with taxes, Police (B) enforce law
generally, and PCCB (D) fights corruption.
30. What is the MAIN role of patrols by
security officers?
A. To create fear among employees B.
To detect and deter suspicious activities C. To impress visitors D. To reduce
paperwork
Answer: B. To detect and deter
suspicious activities
Rationale: Patrols are a proactive measure to maintain visibility and discourage wrongdoing. Fear (A), impressing (C), or paperwork reduction (D) are not objectives.
📘 Get the Full Practical Test PDF (Questions 1–170)
You’ve just accessed the first 30 questions. The full set of 170 expertly prepared aptitude test questions for Security Officer II – the Tanzania Posts Corporation. is available for sale in a PDF format
To get access of the full PDF through your Gmail (Questions 1–170), please make a payment of Tsh 10,000 to the LIPA number below:
After payment, please send a text message with the words “Security Officer TPC” to:
⚠️ Important Notice
- The PDF is watermarked and protected for personal use only.
- Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited.
- Legal action may be taken against the misuse of this material.
Thank you for supporting quality content. Best of luck in your interview preparation!
0 Comments
PLACE YOUR COMMENT HERE
WARNING: DO NOT USE ABUSIVE LANGUAGE BECAUSE IT IS AGAINST THE LAW.
THE COMMENTS OF OUR READERS IS NOT OUR RESPONSIBILITY.