Podcast
Questions and Answers
From a security perspective, the best rooms are directly next to emergency exits.
From a security perspective, the best rooms are directly next to emergency exits.
False (B)
From the following choices, select the factors you should consider to understand the threat in your environment.
From the following choices, select the factors you should consider to understand the threat in your environment.
- Are terrorist groups predictable?
- Will local citizens warn Americans about terrorist groups?
- Do terrorist groups attack Americans?
- All of the above. (correct)
IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.
IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.
True (A)
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Terrorists usually avoid tourist locations since they are not DOD-related.
Terrorists usually avoid tourist locations since they are not DOD-related.
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
What does Force Protection Condition DELTA mean?
What does Force Protection Condition DELTA mean?
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
Persons who have been given access to an installation can be counted on to be of no threat.
Persons who have been given access to an installation can be counted on to be of no threat.
Select the factors that will help you avoid becoming the victim of a terrorist attack.
Select the factors that will help you avoid becoming the victim of a terrorist attack.
Security is a team effort.
Security is a team effort.
The initial moments of a hostage taking incident can be extremely dangerous.
The initial moments of a hostage taking incident can be extremely dangerous.
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
Which one of the following is NOT an early indicator of a potential insider threat?
Which one of the following is NOT an early indicator of a potential insider threat?
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Which of the following is not a useful vehicle feature from a security perspective?
Which of the following is not a useful vehicle feature from a security perspective?
In an active shooter incident involving firearms you should immediately lie on the ground.
In an active shooter incident involving firearms you should immediately lie on the ground.
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.
State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.
Everyone on an installation has shared responsibility for security.
Everyone on an installation has shared responsibility for security.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
The ticketing area is more secure than the area beyond the security check point.
The ticketing area is more secure than the area beyond the security check point.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
Internet acquaintances can pose a security threat and should be carefully monitored.
Internet acquaintances can pose a security threat and should be carefully monitored.
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.
Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.
Flashcards
IEDs
IEDs
Improvised Explosive Devices. These are bombs made in an improvised manner and often hidden to blend into the environment.
Threat Environment
Threat Environment
Factors like terrorist tactics, predictability, activity levels, and local awareness that help assess the risk of an attack.
Surveillance
Surveillance
Watching or observing, often secretly. Can be stationary or mobile.
Terrorist Targets
Terrorist Targets
Signup and view all the flashcards
Room Invasions
Room Invasions
Signup and view all the flashcards
Force Protection Condition DELTA
Force Protection Condition DELTA
Signup and view all the flashcards
Skyjacking
Skyjacking
Signup and view all the flashcards
Avoiding Predictability
Avoiding Predictability
Signup and view all the flashcards
Insider Threats
Insider Threats
Signup and view all the flashcards
Active Shooter
Active Shooter
Signup and view all the flashcards
Hostage Situations
Hostage Situations
Signup and view all the flashcards
Biological Attacks
Biological Attacks
Signup and view all the flashcards
Shared Security
Shared Security
Signup and view all the flashcards
National Terrorism Advisory System
National Terrorism Advisory System
Signup and view all the flashcards
Security Checkpoints
Security Checkpoints
Signup and view all the flashcards
Home Security
Home Security
Signup and view all the flashcards
Surveillance Attempts
Surveillance Attempts
Signup and view all the flashcards
Internet Acquaintances
Internet Acquaintances
Signup and view all the flashcards
Travel Warnings (State Department)
Travel Warnings (State Department)
Signup and view all the flashcards
Hostage Motives
Hostage Motives
Signup and view all the flashcards
Insider Threats (Signs)
Insider Threats (Signs)
Signup and view all the flashcards
Study Notes
Anti-terrorism Awareness Training Key Points
- Best rooms for security are NOT located next to emergency exits.
- Understanding the threat environment involves evaluating factors such as terrorist tactics, predictability, activity levels, and local awareness.
- Improvised Explosive Devices (IEDs) can be camouflaged to blend into surroundings.
- Surveillance can be conducted both through stationary and mobile methods.
- Terrorists may target tourist locations; they are not exclusive to DOD-related sites.
- Room invasions are a significant security concern for hotels within the Continental United States (CONUS).
- Force Protection Condition DELTA indicates the highest level of protective measures at a base.
- During a skyjacking, do NOT attempt to subdue the hijackers immediately.
- Access to an installation does not guarantee that an individual poses no threat.
- Factors to avoid being a target of terrorism include Avoiding Predictability, being aware of Location, reducing Opportunity, and being cautious with Association.
- Security responsibilities are shared among everyone on an installation.
- The initial moments of hostage situations can be extremely perilous.
- Recognizing signs of an unstable person can help identify potential insider threats before incidents occur.
- Immediate active resistance is NOT advised during an active shooter situation.
- A reasonable disagreement with a US Government Policy is NOT an early indicator of insider threats.
- Electronic audio and video devices may be utilized by terrorists for surveillance.
- Air bags are not a significant feature for vehicle security.
- In an active shooter incident, lying on the ground is NOT the recommended response.
- Always traveling with a cell phone is advisable for safety.
- Consulting State Department Travel Warnings is essential before traveling across the US-Mexico border.
- Shared responsibility for security exists among all individuals within an installation.
- Alerts from the National Terrorism Advisory System are relevant only to the United States and its territories.
- The area beyond security checkpoints is typically more secure than the ticketing area.
- Home security can be enhanced through self-help measures such as changing locks and securing windows.
- Handling possible surveillance attempts should be avoided; do not attempt to manage situations alone.
- Internet acquaintances may pose security threats and should be monitored appropriately.
- Early signs of biological attacks may mimic symptoms of common illnesses.
- Hostage scenarios may arise for reasons such as publicity, bargaining, political concessions, or ransom demands.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers essential points regarding anti-terrorism awareness and security measures. Participants will learn about threat evaluation, IEDs, surveillance methods, and best practices for security in various environments. An understanding of protection measures and responses during incidents such as skyjacking is also included.