Podcast
Questions and Answers
From a security perspective, the best rooms are directly next to emergency exits.
From a security perspective, the best rooms are directly next to emergency exits.
False
From the following choices, select the factors you should consider to understand the threat in your environment.
From the following choices, select the factors you should consider to understand the threat in your environment.
IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.
IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.
True
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Signup and view all the answers
Terrorists usually avoid tourist locations since they are not DOD-related.
Terrorists usually avoid tourist locations since they are not DOD-related.
Signup and view all the answers
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
Signup and view all the answers
What does Force Protection Condition DELTA mean?
What does Force Protection Condition DELTA mean?
Signup and view all the answers
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
Signup and view all the answers
Persons who have been given access to an installation can be counted on to be of no threat.
Persons who have been given access to an installation can be counted on to be of no threat.
Signup and view all the answers
Select the factors that will help you avoid becoming the victim of a terrorist attack.
Select the factors that will help you avoid becoming the victim of a terrorist attack.
Signup and view all the answers
Security is a team effort.
Security is a team effort.
Signup and view all the answers
The initial moments of a hostage taking incident can be extremely dangerous.
The initial moments of a hostage taking incident can be extremely dangerous.
Signup and view all the answers
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Signup and view all the answers
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
Signup and view all the answers
Which one of the following is NOT an early indicator of a potential insider threat?
Which one of the following is NOT an early indicator of a potential insider threat?
Signup and view all the answers
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Signup and view all the answers
Which of the following is not a useful vehicle feature from a security perspective?
Which of the following is not a useful vehicle feature from a security perspective?
Signup and view all the answers
In an active shooter incident involving firearms you should immediately lie on the ground.
In an active shooter incident involving firearms you should immediately lie on the ground.
Signup and view all the answers
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Signup and view all the answers
State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.
State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.
Signup and view all the answers
Everyone on an installation has shared responsibility for security.
Everyone on an installation has shared responsibility for security.
Signup and view all the answers
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Signup and view all the answers
The ticketing area is more secure than the area beyond the security check point.
The ticketing area is more secure than the area beyond the security check point.
Signup and view all the answers
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Signup and view all the answers
If you identify a possible surveillance attempt you should try to handle the situation yourself.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
Signup and view all the answers
Internet acquaintances can pose a security threat and should be carefully monitored.
Internet acquaintances can pose a security threat and should be carefully monitored.
Signup and view all the answers
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
Signup and view all the answers
Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.
Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.
Signup and view all the answers
Study Notes
Anti-terrorism Awareness Training Key Points
- Best rooms for security are NOT located next to emergency exits.
- Understanding the threat environment involves evaluating factors such as terrorist tactics, predictability, activity levels, and local awareness.
- Improvised Explosive Devices (IEDs) can be camouflaged to blend into surroundings.
- Surveillance can be conducted both through stationary and mobile methods.
- Terrorists may target tourist locations; they are not exclusive to DOD-related sites.
- Room invasions are a significant security concern for hotels within the Continental United States (CONUS).
- Force Protection Condition DELTA indicates the highest level of protective measures at a base.
- During a skyjacking, do NOT attempt to subdue the hijackers immediately.
- Access to an installation does not guarantee that an individual poses no threat.
- Factors to avoid being a target of terrorism include Avoiding Predictability, being aware of Location, reducing Opportunity, and being cautious with Association.
- Security responsibilities are shared among everyone on an installation.
- The initial moments of hostage situations can be extremely perilous.
- Recognizing signs of an unstable person can help identify potential insider threats before incidents occur.
- Immediate active resistance is NOT advised during an active shooter situation.
- A reasonable disagreement with a US Government Policy is NOT an early indicator of insider threats.
- Electronic audio and video devices may be utilized by terrorists for surveillance.
- Air bags are not a significant feature for vehicle security.
- In an active shooter incident, lying on the ground is NOT the recommended response.
- Always traveling with a cell phone is advisable for safety.
- Consulting State Department Travel Warnings is essential before traveling across the US-Mexico border.
- Shared responsibility for security exists among all individuals within an installation.
- Alerts from the National Terrorism Advisory System are relevant only to the United States and its territories.
- The area beyond security checkpoints is typically more secure than the ticketing area.
- Home security can be enhanced through self-help measures such as changing locks and securing windows.
- Handling possible surveillance attempts should be avoided; do not attempt to manage situations alone.
- Internet acquaintances may pose security threats and should be monitored appropriately.
- Early signs of biological attacks may mimic symptoms of common illnesses.
- Hostage scenarios may arise for reasons such as publicity, bargaining, political concessions, or ransom demands.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers essential points regarding anti-terrorism awareness and security measures. Participants will learn about threat evaluation, IEDs, surveillance methods, and best practices for security in various environments. An understanding of protection measures and responses during incidents such as skyjacking is also included.