Anti-terrorism Awareness Training Key Points
28 Questions
105 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

From a security perspective, the best rooms are directly next to emergency exits.

False (B)

From the following choices, select the factors you should consider to understand the threat in your environment.

  • Are terrorist groups predictable?
  • Will local citizens warn Americans about terrorist groups?
  • Do terrorist groups attack Americans?
  • All of the above. (correct)

IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.

True (A)

Surveillance can be performed through either stationary or mobile means.

<p>True (A)</p> Signup and view all the answers

Terrorists usually avoid tourist locations since they are not DOD-related.

<p>False (B)</p> Signup and view all the answers

Room invasions are a significant security issue for hotels located in CONUS.

<p>True (A)</p> Signup and view all the answers

What does Force Protection Condition DELTA mean?

<p>The most increased level of protection.</p> Signup and view all the answers

In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

<p>False (B)</p> Signup and view all the answers

Persons who have been given access to an installation can be counted on to be of no threat.

<p>False (B)</p> Signup and view all the answers

Select the factors that will help you avoid becoming the victim of a terrorist attack.

<p>All of the above. (D)</p> Signup and view all the answers

Security is a team effort.

<p>True (A)</p> Signup and view all the answers

The initial moments of a hostage taking incident can be extremely dangerous.

<p>True (A)</p> Signup and view all the answers

Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.

<p>True (A)</p> Signup and view all the answers

Active resistance should be the immediate response to an active shooter incident.

<p>False (B)</p> Signup and view all the answers

Which one of the following is NOT an early indicator of a potential insider threat?

<p>A reasonable disagreement with a US Government Policy.</p> Signup and view all the answers

Electronic audio and video devices are never used by terrorists for surveillance purposes.

<p>False (B)</p> Signup and view all the answers

Which of the following is not a useful vehicle feature from a security perspective?

<p>Air bags.</p> Signup and view all the answers

In an active shooter incident involving firearms you should immediately lie on the ground.

<p>False (B)</p> Signup and view all the answers

When possible, it is best to always travel with a cell phone.

<p>True (A)</p> Signup and view all the answers

State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.

<p>True (A)</p> Signup and view all the answers

Everyone on an installation has shared responsibility for security.

<p>True (A)</p> Signup and view all the answers

Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

<p>True (A)</p> Signup and view all the answers

The ticketing area is more secure than the area beyond the security check point.

<p>False (B)</p> Signup and view all the answers

Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

<p>True (A)</p> Signup and view all the answers

If you identify a possible surveillance attempt you should try to handle the situation yourself.

<p>False (B)</p> Signup and view all the answers

Internet acquaintances can pose a security threat and should be carefully monitored.

<p>True (A)</p> Signup and view all the answers

Early symptoms of a biological attack may appear the same as common illnesses.

<p>True (A)</p> Signup and view all the answers

Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.

<p>True (A)</p> Signup and view all the answers

Flashcards

IEDs

Improvised Explosive Devices. These are bombs made in an improvised manner and often hidden to blend into the environment.

Threat Environment

Factors like terrorist tactics, predictability, activity levels, and local awareness that help assess the risk of an attack.

Surveillance

Watching or observing, often secretly. Can be stationary or mobile.

Terrorist Targets

Places terrorists might attack, not limited to military bases.

Signup and view all the flashcards

Room Invasions

Security concern, specifically for hotels in the US.

Signup and view all the flashcards

Force Protection Condition DELTA

Highest level of security measures at a base.

Signup and view all the flashcards

Skyjacking

Hijacking an airplane.

Signup and view all the flashcards

Avoiding Predictability

A way to avoid terrorist attacks by being unpredictable.

Signup and view all the flashcards

Insider Threats

Risks posed by people working within a system.

Signup and view all the flashcards

Active Shooter

A situation where a person is using a firearm to harm people.

Signup and view all the flashcards

Hostage Situations

Situations where people are held against their will.

Signup and view all the flashcards

Biological Attacks

Attacks using biological weapons. Early signs mimic common illnesses.

Signup and view all the flashcards

Shared Security

Responsibility for security is on everyone, not just specific people.

Signup and view all the flashcards

National Terrorism Advisory System

System for warning about potential terrorist threats in the US.

Signup and view all the flashcards

Security Checkpoints

Places where people are checked before entering secure areas.

Signup and view all the flashcards

Home Security

Measures people take to protect their homes from threats.

Signup and view all the flashcards

Surveillance Attempts

Trying to observe others, potentially by terrorists.

Signup and view all the flashcards

Internet Acquaintances

People met online; can be security risks.

Signup and view all the flashcards

Travel Warnings (State Department)

Warnings issued for travel safety, including international and domestic travel.

Signup and view all the flashcards

Hostage Motives

Reasons terrorists might take hostages, such as publicity or ransom.

Signup and view all the flashcards

Insider Threats (Signs)

Signs of someone with potential to pose harm internally. Not disagreements with policy.

Signup and view all the flashcards

Study Notes

Anti-terrorism Awareness Training Key Points

  • Best rooms for security are NOT located next to emergency exits.
  • Understanding the threat environment involves evaluating factors such as terrorist tactics, predictability, activity levels, and local awareness.
  • Improvised Explosive Devices (IEDs) can be camouflaged to blend into surroundings.
  • Surveillance can be conducted both through stationary and mobile methods.
  • Terrorists may target tourist locations; they are not exclusive to DOD-related sites.
  • Room invasions are a significant security concern for hotels within the Continental United States (CONUS).
  • Force Protection Condition DELTA indicates the highest level of protective measures at a base.
  • During a skyjacking, do NOT attempt to subdue the hijackers immediately.
  • Access to an installation does not guarantee that an individual poses no threat.
  • Factors to avoid being a target of terrorism include Avoiding Predictability, being aware of Location, reducing Opportunity, and being cautious with Association.
  • Security responsibilities are shared among everyone on an installation.
  • The initial moments of hostage situations can be extremely perilous.
  • Recognizing signs of an unstable person can help identify potential insider threats before incidents occur.
  • Immediate active resistance is NOT advised during an active shooter situation.
  • A reasonable disagreement with a US Government Policy is NOT an early indicator of insider threats.
  • Electronic audio and video devices may be utilized by terrorists for surveillance.
  • Air bags are not a significant feature for vehicle security.
  • In an active shooter incident, lying on the ground is NOT the recommended response.
  • Always traveling with a cell phone is advisable for safety.
  • Consulting State Department Travel Warnings is essential before traveling across the US-Mexico border.
  • Shared responsibility for security exists among all individuals within an installation.
  • Alerts from the National Terrorism Advisory System are relevant only to the United States and its territories.
  • The area beyond security checkpoints is typically more secure than the ticketing area.
  • Home security can be enhanced through self-help measures such as changing locks and securing windows.
  • Handling possible surveillance attempts should be avoided; do not attempt to manage situations alone.
  • Internet acquaintances may pose security threats and should be monitored appropriately.
  • Early signs of biological attacks may mimic symptoms of common illnesses.
  • Hostage scenarios may arise for reasons such as publicity, bargaining, political concessions, or ransom demands.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz covers essential points regarding anti-terrorism awareness and security measures. Participants will learn about threat evaluation, IEDs, surveillance methods, and best practices for security in various environments. An understanding of protection measures and responses during incidents such as skyjacking is also included.

More Like This

Use Quizgecko on...
Browser
Browser