Podcast
Questions and Answers
From the following choices, select the factor you should consider to understand the threat in your environment.
From the following choices, select the factor you should consider to understand the threat in your environment.
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
Force Protection Condition DELTA means that your base is at which one of the following?
Force Protection Condition DELTA means that your base is at which one of the following?
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Signup and view all the answers
Which of the following is NOT an Antiterrorism Level I theme?
Which of the following is NOT an Antiterrorism Level I theme?
Signup and view all the answers
What is NOT a terrorist method of surveillance?
What is NOT a terrorist method of surveillance?
Signup and view all the answers
Persons who have been given access to an installation can be counted on to be of no threat.
Persons who have been given access to an installation can be counted on to be of no threat.
Signup and view all the answers
Which one of the following is NOT an early indicator of a potential insider threat?
Which one of the following is NOT an early indicator of a potential insider threat?
Signup and view all the answers
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
Signup and view all the answers
What is NOT a physical security measure for your home?
What is NOT a physical security measure for your home?
Signup and view all the answers
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
Signup and view all the answers
The ticketing area is more secure than the area beyond the security checkpoint.
The ticketing area is more secure than the area beyond the security checkpoint.
Signup and view all the answers
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Signup and view all the answers
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
Signup and view all the answers
What should you NOT do during a hostage rescue attempt?
What should you NOT do during a hostage rescue attempt?
Signup and view all the answers
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
Signup and view all the answers
Security is a team effort.
Security is a team effort.
Signup and view all the answers
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Signup and view all the answers
Everyone on an installation has shared responsibility for security.
Everyone on an installation has shared responsibility for security.
Signup and view all the answers
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Signup and view all the answers
In an active shooter incident involving firearms you should immediately lie on the ground.
In an active shooter incident involving firearms you should immediately lie on the ground.
Signup and view all the answers
Internet acquaintances can pose a security threat and should be carefully monitored.
Internet acquaintances can pose a security threat and should be carefully monitored.
Signup and view all the answers
Terrorists usually avoid tourist locations since they are not DOD-related.
Terrorists usually avoid tourist locations since they are not DOD-related.
Signup and view all the answers
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
Signup and view all the answers
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Signup and view all the answers
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
Signup and view all the answers
The initial moments of a hostage-taking incident can be extremely dangerous.
The initial moments of a hostage-taking incident can be extremely dangerous.
Signup and view all the answers
IEDs may come in many forms and may be camouflaged to blend in with the surrounding environment.
IEDs may come in many forms and may be camouflaged to blend in with the surrounding environment.
Signup and view all the answers
If you identify a possible surveillance attempt you should try to handle the situation yourself.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
Signup and view all the answers
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
Signup and view all the answers
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline?
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline?
Signup and view all the answers
Select all factors that are ways in which you might become the victim of a terrorist attack.
Select all factors that are ways in which you might become the victim of a terrorist attack.
Signup and view all the answers
From the following choices, select the factors you should consider to understand the threat in your environment.
From the following choices, select the factors you should consider to understand the threat in your environment.
Signup and view all the answers
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Signup and view all the answers
From a security perspective, the best rooms are directly next to emergency exits.
From a security perspective, the best rooms are directly next to emergency exits.
Signup and view all the answers
Which of the following is NOT a recommended response to an active shooter incident?
Which of the following is NOT a recommended response to an active shooter incident?
Signup and view all the answers
Which of the following is NOT a useful vehicle feature from a security perspective?
Which of the following is NOT a useful vehicle feature from a security perspective?
Signup and view all the answers
Study Notes
Antiterrorism Awareness Key Concepts
- Understanding threats requires evaluating how sophisticated, active, and violent terrorist groups are.
- Predictability in behavior increases vulnerability to terrorist attacks; it is an irrelevant factor in avoiding victimization.
Force Protection Conditions
- Condition DELTA signifies the highest level of protection for military bases.
National Advisory Alerts
- Alerts from the National Terrorism Advisory System specifically pertain to the U.S. and its territories.
Themes and Methods
- "Counter-surveillance" is not one of the key themes in Antiterrorism Level I training.
- Breaking and entering for theft is not considered a method of surveillance used by terrorists.
Insider Threats and Indicators
- Those with access to secure locations may still pose a threat.
- A reasonable disagreement with U.S. policy is not a warning sign for potential insider threats.
Active Shooter Response
- Active resistance is not advised during an active shooter incident.
- Key precaution includes remaining low and still during a hostage rescue attempt, and not assisting rescue teams due to safety concerns.
Biological Attacks
- Early symptoms of biological attacks may mimic common illnesses, requiring vigilant observation.
Teamwork in Security
- Security is a collaborative effort; everyone shares responsibility for maintaining a safe environment.
Surveillance Techniques
- Surveillance can utilize both stationary and mobile methods; monitoring internet acquaintances is necessary for security.
Tourists and Target Locations
- Terrorists do target tourist locations; they are not solely focused on DOD-related sites.
Handling Crisis Situations
- Attempting to subdue skyjackers is not recommended; restraint is crucial to ensure safety in crisis situations.
Travel Precautions
- Always having a cell phone while traveling enhances safety and communication.
Hotel Security
- Room invasions present a significant threat in U.S. hotels; prioritizing security features like solid doors and functioning locks is essential.
Hostage Situations and IEDs
- Hostage scenarios can be highly dangerous initially; potential IEDs may be disguised to avoid detection.
Insider Threats and Espionage
- Espionage and security negligence are categorized as insider threats within antiterrorism frameworks.
Attack Methods and Security Features
- Chemical or biological attacks have not been recorded against airlines since 9/11.
- Vehicle safety features like air bags are less critical from a security standpoint compared to other features.
Recommended Responses
- During active shooter events, focus on hiding and escape instead of redirecting emergency responders or actively resisting unless necessary.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with our flashcards on antiterrorism awareness. This quiz covers critical factors to understand potential threats in your environment. Prepare yourself to recognize and avoid becoming a victim of terrorism.