Anti Terrorism Level I Pretest Flashcards
28 Questions
101 Views

Anti Terrorism Level I Pretest Flashcards

Created by
@DivineCopper

Questions and Answers

In an active shooter incident involving firearms you should immediately lie on the ground.

False

Which one of these is a possible indicator of a suspicious letter or package?

  • Misspellings of common words (correct)
  • No unusual markings
  • Clearly labeled sender
  • Standard envelope design
  • Security is a team effort.

    True

    The initial moments of a hostage taking incident can be extremely dangerous.

    <p>True</p> Signup and view all the answers

    Everyone on an installation has shared responsibility for security.

    <p>True</p> Signup and view all the answers

    In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

    <p>False</p> Signup and view all the answers

    From a security perspective, the best rooms are directly next to emergency exits.

    <p>False</p> Signup and view all the answers

    Surveillance can be performed through either stationary or mobile means.

    <p>True</p> Signup and view all the answers

    If you identify a possible surveillance attempt you should try to handle the situation yourself.

    <p>False</p> Signup and view all the answers

    Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.

    <p>True</p> Signup and view all the answers

    From the following choices, select the factors you should consider to understand the threat in your environment.

    <p>All of the above</p> Signup and view all the answers

    Which one of the following is NOT an early indicator of a potential insider threat?

    <p>A reasonable disagreement with a US Government policy</p> Signup and view all the answers

    Room invasions are a significant security issue for hotels located in CONUS.

    <p>True</p> Signup and view all the answers

    Electronic audio and video devices are never used by terrorists for surveillance purposes.

    <p>False</p> Signup and view all the answers

    When possible, it is best to always travel with a cell phone.

    <p>True</p> Signup and view all the answers

    Force Protection Condition DELTA means that your base is at which one of the following?

    <p>The most increased level of protection</p> Signup and view all the answers

    Active resistance should be the immediate response to an active shooter incident.

    <p>False</p> Signup and view all the answers

    IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.

    <p>True</p> Signup and view all the answers

    Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

    <p>True</p> Signup and view all the answers

    Terrorists usually avoid tourist locations since they are not DOD-related.

    <p>False</p> Signup and view all the answers

    State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.

    <p>True</p> Signup and view all the answers

    Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.

    <p>True</p> Signup and view all the answers

    Select all factors that are ways in which you might become the victim of a terrorist attack.

    <p>Opportunity</p> Signup and view all the answers

    The ticketing area is more secure than the area beyond the security check point.

    <p>False</p> Signup and view all the answers

    Which one of these does NOT pose a risk to security at a government facility?

    <p>A person expressing boredom with the US mission</p> Signup and view all the answers

    Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

    <p>True</p> Signup and view all the answers

    Internet acquaintances can pose a security threat and should be carefully monitored.

    <p>True</p> Signup and view all the answers

    Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

    <p>True</p> Signup and view all the answers

    Study Notes

    Active Shooter and Security Protocols

    • Do not immediately lie on the ground during an active shooter incident.
    • Security is a collective responsibility; all individuals share this duty.
    • The initial moments of a hostage situation are highly dangerous, requiring caution.

    Indicators of Threats

    • Misspellings in letters or packages can indicate suspicious activities.
    • Possible insider threat signs do not include reasonable disagreements with U.S. government policies.
    • Key factors for assessing threats include the predictability, violent nature, tactics, and sophistication of terrorist groups.

    Emergency Response and Situational Awareness

    • Do not attempt to subdue air hijackers during a skyjacking incident; maintain composure.
    • The best room locations are not necessarily near emergency exits; this could compromise safety.
    • If potential surveillance is noticed, do not confront the situation alone.

    Hostage Situations and Risks

    • Reasons for hostage-taking may involve publicity, political leverage, ransom, and bargaining.
    • Rooms' invasions are a significant concern for hotels in the country.

    Use of Technology and Personal Safety

    • Electronic devices are commonly utilized by terrorists for surveillance; they can blend into the environment.
    • Mobile phones are valuable travel companions for communication and safety.

    Security Levels and Vulnerabilities

    • Force Protection Condition DELTA indicates the highest security level.
    • IEDs are versatile and often camouflaged; vigilance is necessary.
    • Home security measures, like changing locks and improving outdoor lighting, enhance personal safety.

    Travel Safety and Threat Awareness

    • Tourist locations are not exempt from terrorist attacks; they are often targeted.
    • Always check State Department Travel Warnings before traveling, especially to border areas.
    • Understanding indicators of unstable individuals helps in detecting potential insider threats.

    Victim Vulnerability Factors

    • Factors increasing victimization risk in terrorist attacks include opportunity, predictability, location, and association with high-risk groups.

    Miscellaneous Security Considerations

    • The security of the ticketing area is less than that beyond security checkpoints.
    • Expressing boredom with U.S. missions does not present an inherent security risk.
    • Maintaining a well-kept vehicle is beneficial for ensuring both security and safety.
    • Internet acquaintances pose potential security threats and should be monitored closely.

    National Alerts

    • Alerts from the National Terrorism Advisory System are applicable solely to the United States and its territories.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with these flashcards designed for the Anti Terrorism Level I training. Each card presents a scenario or question related to security awareness and threat detection. Prepare yourself for critical thinking in high-pressure situations.

    Use Quizgecko on...
    Browser
    Browser