Podcast
Questions and Answers
From the following choices, select the factor you should consider to understand the threat in your environment.
From the following choices, select the factor you should consider to understand the threat in your environment.
- How sophisticated are terrorist groups?
- All are correct (correct)
- Are terrorist groups violent?
- How active are terrorist groups?
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
- Predictability (correct)
- Location
- Association
- Opportunity
Force Protection Condition DELTA means that your base is at which one of the following?
Force Protection Condition DELTA means that your base is at which one of the following?
- The least increased level of protection
- A medium level of protection
- The most increased level of protection (correct)
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Which of the following is NOT an Antiterrorism Level I theme?
Which of the following is NOT an Antiterrorism Level I theme?
What is NOT a terrorist method of surveillance?
What is NOT a terrorist method of surveillance?
Persons who have been given access to an installation can be counted on to be of no threat.
Persons who have been given access to an installation can be counted on to be of no threat.
Which one of the following is NOT an early indicator of a potential insider threat?
Which one of the following is NOT an early indicator of a potential insider threat?
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
What is NOT a physical security measure for your home?
What is NOT a physical security measure for your home?
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
The ticketing area is more secure than the area beyond the security checkpoint.
The ticketing area is more secure than the area beyond the security checkpoint.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
What should you NOT do during a hostage rescue attempt?
What should you NOT do during a hostage rescue attempt?
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
Security is a team effort.
Security is a team effort.
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Everyone on an installation has shared responsibility for security.
Everyone on an installation has shared responsibility for security.
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
In an active shooter incident involving firearms you should immediately lie on the ground.
In an active shooter incident involving firearms you should immediately lie on the ground.
Internet acquaintances can pose a security threat and should be carefully monitored.
Internet acquaintances can pose a security threat and should be carefully monitored.
Terrorists usually avoid tourist locations since they are not DOD-related.
Terrorists usually avoid tourist locations since they are not DOD-related.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
The initial moments of a hostage-taking incident can be extremely dangerous.
The initial moments of a hostage-taking incident can be extremely dangerous.
IEDs may come in many forms and may be camouflaged to blend in with the surrounding environment.
IEDs may come in many forms and may be camouflaged to blend in with the surrounding environment.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline?
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline?
Select all factors that are ways in which you might become the victim of a terrorist attack.
Select all factors that are ways in which you might become the victim of a terrorist attack.
From the following choices, select the factors you should consider to understand the threat in your environment.
From the following choices, select the factors you should consider to understand the threat in your environment.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
From a security perspective, the best rooms are directly next to emergency exits.
From a security perspective, the best rooms are directly next to emergency exits.
Which of the following is NOT a recommended response to an active shooter incident?
Which of the following is NOT a recommended response to an active shooter incident?
Which of the following is NOT a useful vehicle feature from a security perspective?
Which of the following is NOT a useful vehicle feature from a security perspective?
Flashcards
Terrorist attack vulnerability
Terrorist attack vulnerability
Predictable behavior patterns make targets more vulnerable to terrorist attacks.
Force Protection Condition DELTA
Force Protection Condition DELTA
The highest level of security for military bases.
National Advisory Alerts
National Advisory Alerts
Alerts are specific to the U.S. and its territories.
Counter-surveillance
Counter-surveillance
Signup and view all the flashcards
Terrorist surveillance methods
Terrorist surveillance methods
Signup and view all the flashcards
Insider threats
Insider threats
Signup and view all the flashcards
Reasonable disagreement
Reasonable disagreement
Signup and view all the flashcards
Active shooter response
Active shooter response
Signup and view all the flashcards
Hostage rescue
Hostage rescue
Signup and view all the flashcards
Biological attacks symptoms
Biological attacks symptoms
Signup and view all the flashcards
Security collaboration
Security collaboration
Signup and view all the flashcards
Surveillance methods
Surveillance methods
Signup and view all the flashcards
Tourist target locations
Tourist target locations
Signup and view all the flashcards
Skyjacking response
Skyjacking response
Signup and view all the flashcards
Travel safety precaution
Travel safety precaution
Signup and view all the flashcards
Hotel room invasion threat
Hotel room invasion threat
Signup and view all the flashcards
Hostage scenarios and IEDs
Hostage scenarios and IEDs
Signup and view all the flashcards
Insider threats and espionage
Insider threats and espionage
Signup and view all the flashcards
Airline Chemical/Biological Attacks
Airline Chemical/Biological Attacks
Signup and view all the flashcards
Vehicle Security
Vehicle Security
Signup and view all the flashcards
Study Notes
Antiterrorism Awareness Key Concepts
- Understanding threats requires evaluating how sophisticated, active, and violent terrorist groups are.
- Predictability in behavior increases vulnerability to terrorist attacks; it is an irrelevant factor in avoiding victimization.
Force Protection Conditions
- Condition DELTA signifies the highest level of protection for military bases.
National Advisory Alerts
- Alerts from the National Terrorism Advisory System specifically pertain to the U.S. and its territories.
Themes and Methods
- "Counter-surveillance" is not one of the key themes in Antiterrorism Level I training.
- Breaking and entering for theft is not considered a method of surveillance used by terrorists.
Insider Threats and Indicators
- Those with access to secure locations may still pose a threat.
- A reasonable disagreement with U.S. policy is not a warning sign for potential insider threats.
Active Shooter Response
- Active resistance is not advised during an active shooter incident.
- Key precaution includes remaining low and still during a hostage rescue attempt, and not assisting rescue teams due to safety concerns.
Biological Attacks
- Early symptoms of biological attacks may mimic common illnesses, requiring vigilant observation.
Teamwork in Security
- Security is a collaborative effort; everyone shares responsibility for maintaining a safe environment.
Surveillance Techniques
- Surveillance can utilize both stationary and mobile methods; monitoring internet acquaintances is necessary for security.
Tourists and Target Locations
- Terrorists do target tourist locations; they are not solely focused on DOD-related sites.
Handling Crisis Situations
- Attempting to subdue skyjackers is not recommended; restraint is crucial to ensure safety in crisis situations.
Travel Precautions
- Always having a cell phone while traveling enhances safety and communication.
Hotel Security
- Room invasions present a significant threat in U.S. hotels; prioritizing security features like solid doors and functioning locks is essential.
Hostage Situations and IEDs
- Hostage scenarios can be highly dangerous initially; potential IEDs may be disguised to avoid detection.
Insider Threats and Espionage
- Espionage and security negligence are categorized as insider threats within antiterrorism frameworks.
Attack Methods and Security Features
- Chemical or biological attacks have not been recorded against airlines since 9/11.
- Vehicle safety features like air bags are less critical from a security standpoint compared to other features.
Recommended Responses
- During active shooter events, focus on hiding and escape instead of redirecting emergency responders or actively resisting unless necessary.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with our flashcards on antiterrorism awareness. This quiz covers critical factors to understand potential threats in your environment. Prepare yourself to recognize and avoid becoming a victim of terrorism.