Level I Antiterrorism Awareness Training
37 Questions
188 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

From the following choices, select the factor you should consider to understand the threat in your environment.

  • How sophisticated are terrorist groups?
  • All are correct (correct)
  • Are terrorist groups violent?
  • How active are terrorist groups?

Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.

  • Predictability (correct)
  • Location
  • Association
  • Opportunity

Force Protection Condition DELTA means that your base is at which one of the following?

  • The least increased level of protection
  • A medium level of protection
  • The most increased level of protection (correct)

Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

<p>True (A)</p> Signup and view all the answers

Which of the following is NOT an Antiterrorism Level I theme?

<p>Counter-surveillance (B)</p> Signup and view all the answers

What is NOT a terrorist method of surveillance?

<p>Breaking and entering to steal valuables (B)</p> Signup and view all the answers

Persons who have been given access to an installation can be counted on to be of no threat.

<p>False (B)</p> Signup and view all the answers

Which one of the following is NOT an early indicator of a potential insider threat?

<p>A reasonable disagreement with a US Government policy (C)</p> Signup and view all the answers

Active resistance should be the immediate response to an active shooter incident.

<p>False (B)</p> Signup and view all the answers

What is NOT a physical security measure for your home?

<p>Hiding a key outside to ensure family members can get in if they lose their keys (D)</p> Signup and view all the answers

Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?

<p>None of the above (D)</p> Signup and view all the answers

The ticketing area is more secure than the area beyond the security checkpoint.

<p>False (B)</p> Signup and view all the answers

Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

<p>True (A)</p> Signup and view all the answers

Which one of these is NOT a physical security feature you should check when inspecting your hotel room?

<p>Lockbox or safe (B)</p> Signup and view all the answers

What should you NOT do during a hostage rescue attempt?

<p>Try to assist the hostage rescue team (C)</p> Signup and view all the answers

Early symptoms of a biological attack may appear the same as common illnesses.

<p>True (A)</p> Signup and view all the answers

Security is a team effort.

<p>True (A)</p> Signup and view all the answers

Surveillance can be performed through either stationary or mobile means.

<p>True (A)</p> Signup and view all the answers

Everyone on an installation has shared responsibility for security.

<p>True (A)</p> Signup and view all the answers

Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.

<p>True (A)</p> Signup and view all the answers

In an active shooter incident involving firearms you should immediately lie on the ground.

<p>False (B)</p> Signup and view all the answers

Internet acquaintances can pose a security threat and should be carefully monitored.

<p>True (A)</p> Signup and view all the answers

Terrorists usually avoid tourist locations since they are not DOD-related.

<p>False (B)</p> Signup and view all the answers

In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

<p>False (B)</p> Signup and view all the answers

When possible, it is best to always travel with a cell phone.

<p>True (A)</p> Signup and view all the answers

Room invasions are a significant security issue for hotels located in CONUS.

<p>True (A)</p> Signup and view all the answers

The initial moments of a hostage-taking incident can be extremely dangerous.

<p>True (A)</p> Signup and view all the answers

IEDs may come in many forms and may be camouflaged to blend in with the surrounding environment.

<p>True (A)</p> Signup and view all the answers

If you identify a possible surveillance attempt you should try to handle the situation yourself.

<p>False (B)</p> Signup and view all the answers

From an antiterrorism perspective, espionage and security negligence are considered insider threats.

<p>True (A)</p> Signup and view all the answers

Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline?

<p>Both A and B (C)</p> Signup and view all the answers

Select all factors that are ways in which you might become the victim of a terrorist attack.

<p>Location (B), Association (C), Opportunity (D)</p> Signup and view all the answers

From the following choices, select the factors you should consider to understand the threat in your environment.

<p>All of the above (D)</p> Signup and view all the answers

Electronic audio and video devices are never used by terrorists for surveillance purposes.

<p>False (B)</p> Signup and view all the answers

From a security perspective, the best rooms are directly next to emergency exits.

<p>False (B)</p> Signup and view all the answers

Which of the following is NOT a recommended response to an active shooter incident?

<p>Provide instructions to arriving emergency response personnel (A)</p> Signup and view all the answers

Which of the following is NOT a useful vehicle feature from a security perspective?

<p>Air bags (B)</p> Signup and view all the answers

Flashcards

Terrorist attack vulnerability

Predictable behavior patterns make targets more vulnerable to terrorist attacks.

Force Protection Condition DELTA

The highest level of security for military bases.

National Advisory Alerts

Alerts are specific to the U.S. and its territories.

Counter-surveillance

Not a key theme in Antiterrorism Level I training.

Signup and view all the flashcards

Terrorist surveillance methods

Methods like breaking and entering are not considered surveillance tactics used by terrorists.

Signup and view all the flashcards

Insider threats

Individuals with access to secure locations can still pose a threat.

Signup and view all the flashcards

Reasonable disagreement

A disagreement with U.S. policy is not an indicator of insider threats.

Signup and view all the flashcards

Active shooter response

Avoid active resistance during an active shooter event.

Signup and view all the flashcards

Hostage rescue

Remain low and still during hostage rescue attempts.

Signup and view all the flashcards

Biological attacks symptoms

Early symptoms resemble common illnesses, require vigilant observation.

Signup and view all the flashcards

Security collaboration

Security is a shared responsibility.

Signup and view all the flashcards

Surveillance methods

Surveillance can use stationary and mobile methods.

Signup and view all the flashcards

Tourist target locations

Terrorists target tourist sites, not just military installations.

Signup and view all the flashcards

Skyjacking response

Do not attempt to subdue skyjackers; prioritize safety.

Signup and view all the flashcards

Travel safety precaution

Keep a cell phone on hand for travel safety and communication.

Signup and view all the flashcards

Hotel room invasion threat

Room invasions are a significant threat; secure doors and locks are crucial.

Signup and view all the flashcards

Hostage scenarios and IEDs

Hostage situations are initially dangerous, including potential IEDs.

Signup and view all the flashcards

Insider threats and espionage

Espionage and security breaches are considered insider threats.

Signup and view all the flashcards

Airline Chemical/Biological Attacks

No known chemical or biological attacks against airlines since 9/11.

Signup and view all the flashcards

Vehicle Security

Vehicle safety features like airbags are less crucial than other security features.

Signup and view all the flashcards

Study Notes

Antiterrorism Awareness Key Concepts

  • Understanding threats requires evaluating how sophisticated, active, and violent terrorist groups are.
  • Predictability in behavior increases vulnerability to terrorist attacks; it is an irrelevant factor in avoiding victimization.

Force Protection Conditions

  • Condition DELTA signifies the highest level of protection for military bases.

National Advisory Alerts

  • Alerts from the National Terrorism Advisory System specifically pertain to the U.S. and its territories.

Themes and Methods

  • "Counter-surveillance" is not one of the key themes in Antiterrorism Level I training.
  • Breaking and entering for theft is not considered a method of surveillance used by terrorists.

Insider Threats and Indicators

  • Those with access to secure locations may still pose a threat.
  • A reasonable disagreement with U.S. policy is not a warning sign for potential insider threats.

Active Shooter Response

  • Active resistance is not advised during an active shooter incident.
  • Key precaution includes remaining low and still during a hostage rescue attempt, and not assisting rescue teams due to safety concerns.

Biological Attacks

  • Early symptoms of biological attacks may mimic common illnesses, requiring vigilant observation.

Teamwork in Security

  • Security is a collaborative effort; everyone shares responsibility for maintaining a safe environment.

Surveillance Techniques

  • Surveillance can utilize both stationary and mobile methods; monitoring internet acquaintances is necessary for security.

Tourists and Target Locations

  • Terrorists do target tourist locations; they are not solely focused on DOD-related sites.

Handling Crisis Situations

  • Attempting to subdue skyjackers is not recommended; restraint is crucial to ensure safety in crisis situations.

Travel Precautions

  • Always having a cell phone while traveling enhances safety and communication.

Hotel Security

  • Room invasions present a significant threat in U.S. hotels; prioritizing security features like solid doors and functioning locks is essential.

Hostage Situations and IEDs

  • Hostage scenarios can be highly dangerous initially; potential IEDs may be disguised to avoid detection.

Insider Threats and Espionage

  • Espionage and security negligence are categorized as insider threats within antiterrorism frameworks.

Attack Methods and Security Features

  • Chemical or biological attacks have not been recorded against airlines since 9/11.
  • Vehicle safety features like air bags are less critical from a security standpoint compared to other features.
  • During active shooter events, focus on hiding and escape instead of redirecting emergency responders or actively resisting unless necessary.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge with our flashcards on antiterrorism awareness. This quiz covers critical factors to understand potential threats in your environment. Prepare yourself to recognize and avoid becoming a victim of terrorism.

More Like This

Use Quizgecko on...
Browser
Browser