Level I Antiterrorism Awareness Training
37 Questions
173 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

From the following choices, select the factor you should consider to understand the threat in your environment.

  • How sophisticated are terrorist groups?
  • All are correct (correct)
  • Are terrorist groups violent?
  • How active are terrorist groups?
  • Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.

  • Predictability (correct)
  • Location
  • Association
  • Opportunity
  • Force Protection Condition DELTA means that your base is at which one of the following?

  • The least increased level of protection
  • A medium level of protection
  • The most increased level of protection (correct)
  • Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

    <p>True</p> Signup and view all the answers

    Which of the following is NOT an Antiterrorism Level I theme?

    <p>Counter-surveillance</p> Signup and view all the answers

    What is NOT a terrorist method of surveillance?

    <p>Breaking and entering to steal valuables</p> Signup and view all the answers

    Persons who have been given access to an installation can be counted on to be of no threat.

    <p>False</p> Signup and view all the answers

    Which one of the following is NOT an early indicator of a potential insider threat?

    <p>A reasonable disagreement with a US Government policy</p> Signup and view all the answers

    Active resistance should be the immediate response to an active shooter incident.

    <p>False</p> Signup and view all the answers

    What is NOT a physical security measure for your home?

    <p>Hiding a key outside to ensure family members can get in if they lose their keys</p> Signup and view all the answers

    Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?

    <p>None of the above</p> Signup and view all the answers

    The ticketing area is more secure than the area beyond the security checkpoint.

    <p>False</p> Signup and view all the answers

    Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

    <p>True</p> Signup and view all the answers

    Which one of these is NOT a physical security feature you should check when inspecting your hotel room?

    <p>Lockbox or safe</p> Signup and view all the answers

    What should you NOT do during a hostage rescue attempt?

    <p>Try to assist the hostage rescue team</p> Signup and view all the answers

    Early symptoms of a biological attack may appear the same as common illnesses.

    <p>True</p> Signup and view all the answers

    Security is a team effort.

    <p>True</p> Signup and view all the answers

    Surveillance can be performed through either stationary or mobile means.

    <p>True</p> Signup and view all the answers

    Everyone on an installation has shared responsibility for security.

    <p>True</p> Signup and view all the answers

    Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.

    <p>True</p> Signup and view all the answers

    In an active shooter incident involving firearms you should immediately lie on the ground.

    <p>False</p> Signup and view all the answers

    Internet acquaintances can pose a security threat and should be carefully monitored.

    <p>True</p> Signup and view all the answers

    Terrorists usually avoid tourist locations since they are not DOD-related.

    <p>False</p> Signup and view all the answers

    In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

    <p>False</p> Signup and view all the answers

    When possible, it is best to always travel with a cell phone.

    <p>True</p> Signup and view all the answers

    Room invasions are a significant security issue for hotels located in CONUS.

    <p>True</p> Signup and view all the answers

    The initial moments of a hostage-taking incident can be extremely dangerous.

    <p>True</p> Signup and view all the answers

    IEDs may come in many forms and may be camouflaged to blend in with the surrounding environment.

    <p>True</p> Signup and view all the answers

    If you identify a possible surveillance attempt you should try to handle the situation yourself.

    <p>False</p> Signup and view all the answers

    From an antiterrorism perspective, espionage and security negligence are considered insider threats.

    <p>True</p> Signup and view all the answers

    Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline?

    <p>Both A and B</p> Signup and view all the answers

    Select all factors that are ways in which you might become the victim of a terrorist attack.

    <p>Location</p> Signup and view all the answers

    From the following choices, select the factors you should consider to understand the threat in your environment.

    <p>All of the above</p> Signup and view all the answers

    Electronic audio and video devices are never used by terrorists for surveillance purposes.

    <p>False</p> Signup and view all the answers

    From a security perspective, the best rooms are directly next to emergency exits.

    <p>False</p> Signup and view all the answers

    Which of the following is NOT a recommended response to an active shooter incident?

    <p>Provide instructions to arriving emergency response personnel</p> Signup and view all the answers

    Which of the following is NOT a useful vehicle feature from a security perspective?

    <p>Air bags</p> Signup and view all the answers

    Study Notes

    Antiterrorism Awareness Key Concepts

    • Understanding threats requires evaluating how sophisticated, active, and violent terrorist groups are.
    • Predictability in behavior increases vulnerability to terrorist attacks; it is an irrelevant factor in avoiding victimization.

    Force Protection Conditions

    • Condition DELTA signifies the highest level of protection for military bases.

    National Advisory Alerts

    • Alerts from the National Terrorism Advisory System specifically pertain to the U.S. and its territories.

    Themes and Methods

    • "Counter-surveillance" is not one of the key themes in Antiterrorism Level I training.
    • Breaking and entering for theft is not considered a method of surveillance used by terrorists.

    Insider Threats and Indicators

    • Those with access to secure locations may still pose a threat.
    • A reasonable disagreement with U.S. policy is not a warning sign for potential insider threats.

    Active Shooter Response

    • Active resistance is not advised during an active shooter incident.
    • Key precaution includes remaining low and still during a hostage rescue attempt, and not assisting rescue teams due to safety concerns.

    Biological Attacks

    • Early symptoms of biological attacks may mimic common illnesses, requiring vigilant observation.

    Teamwork in Security

    • Security is a collaborative effort; everyone shares responsibility for maintaining a safe environment.

    Surveillance Techniques

    • Surveillance can utilize both stationary and mobile methods; monitoring internet acquaintances is necessary for security.

    Tourists and Target Locations

    • Terrorists do target tourist locations; they are not solely focused on DOD-related sites.

    Handling Crisis Situations

    • Attempting to subdue skyjackers is not recommended; restraint is crucial to ensure safety in crisis situations.

    Travel Precautions

    • Always having a cell phone while traveling enhances safety and communication.

    Hotel Security

    • Room invasions present a significant threat in U.S. hotels; prioritizing security features like solid doors and functioning locks is essential.

    Hostage Situations and IEDs

    • Hostage scenarios can be highly dangerous initially; potential IEDs may be disguised to avoid detection.

    Insider Threats and Espionage

    • Espionage and security negligence are categorized as insider threats within antiterrorism frameworks.

    Attack Methods and Security Features

    • Chemical or biological attacks have not been recorded against airlines since 9/11.
    • Vehicle safety features like air bags are less critical from a security standpoint compared to other features.
    • During active shooter events, focus on hiding and escape instead of redirecting emergency responders or actively resisting unless necessary.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with our flashcards on antiterrorism awareness. This quiz covers critical factors to understand potential threats in your environment. Prepare yourself to recognize and avoid becoming a victim of terrorism.

    More Like This

    Anti-terrorism Awareness Training Key Points
    28 questions
    National Awareness Days Quiz
    10 questions
    Use Quizgecko on...
    Browser
    Browser