Level I Antiterrorism Awareness Training
63 Questions
117 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline? (Select all that apply)

  • Hijacking
  • Bombing
  • Cyber attack
  • None of the above (correct)
  • Active resistance should be the immediate response to an active shooter incident.

    False

    What should you NOT do during a hostage rescue attempt?

    Try to assist hostage rescue team

    Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

    <p>True</p> Signup and view all the answers

    From an antiterrorism perspective, espionage and security negligence are considered insider threats.

    <p>True</p> Signup and view all the answers

    Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Select all that apply)

    <p>None of the above</p> Signup and view all the answers

    Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

    <p>True</p> Signup and view all the answers

    Force Protection Condition DELTA means that your base is at which one of the following?

    <p>The most increased level of protection</p> Signup and view all the answers

    Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

    <p>True</p> Signup and view all the answers

    Electronic audio and video devices are never used by terrorists for surveillance purposes.

    <p>False</p> Signup and view all the answers

    Surveillance can be performed through either stationary or mobile means.

    <p>True</p> Signup and view all the answers

    Internet acquaintances can pose a security threat and should be carefully monitored.

    <p>True</p> Signup and view all the answers

    Everyone on an installation has shared responsibility for security.

    <p>True</p> Signup and view all the answers

    Which of the following is NOT an Antiterrorism Level I theme? (Select all that apply)

    <p>Counter-surveillance</p> Signup and view all the answers

    When possible, it is best to always travel with a cell phone.

    <p>True</p> Signup and view all the answers

    Select all factors that can help you avoid becoming the victim of a terrorist attack.

    <p>All of the above</p> Signup and view all the answers

    Early symptoms of a biological attack may appear the same as common illnesses.

    <p>True</p> Signup and view all the answers

    The initial moments of a hostage taking incident can be extremely dangerous.

    <p>True</p> Signup and view all the answers

    Room invasions are not a significant security issue for hotels located within the United States.

    <p>False</p> Signup and view all the answers

    In an active shooter incident involving firearms, you should immediately lie on the ground.

    <p>False</p> Signup and view all the answers

    When possible, it is best to always travel with a cell phone.

    <p>True</p> Signup and view all the answers

    In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

    <p>False</p> Signup and view all the answers

    Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

    <p>True</p> Signup and view all the answers

    Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

    <p>True</p> Signup and view all the answers

    The initial moments of a hostage taking incident can be extremely dangerous.

    <p>True</p> Signup and view all the answers

    Room invasions are a significant security issue for hotels located in CONUS.

    <p>True</p> Signup and view all the answers

    From the following choices, select the factor you should consider to understand the threat in your environment.

    <p>All are correct</p> Signup and view all the answers

    Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.

    <p>Predictability</p> Signup and view all the answers

    Force Protection Condition DELTA means that your base is at which one of the following?

    <p>The most increased level of protection</p> Signup and view all the answers

    What is the most increased Force Protection Level for a base/installation?

    <p>Delta</p> Signup and view all the answers

    Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

    <p>True</p> Signup and view all the answers

    Which of the following are NOT an Antiterrorism Level I theme? Select all that apply.

    <p>Counter-surveillance</p> Signup and view all the answers

    What is NOT a terrorist method of surveillance?

    <p>Breaking and entering to steal valuables</p> Signup and view all the answers

    Persons who have been given access to an installation can be counted on to be of no threat.

    <p>False</p> Signup and view all the answers

    Which one of the following is NOT an early indicator of a potential insider threat?

    <p>A reasonable disagreement with a US Government policy</p> Signup and view all the answers

    Active resistance should be the immediate response to an active shooter incident.

    <p>False</p> Signup and view all the answers

    What is NOT a physical security measure for your home?

    <p>Hiding a key outside to ensure family members can get in if they lose their keys</p> Signup and view all the answers

    Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?

    <p>None of the above</p> Signup and view all the answers

    The ticketing area is more secure than the area beyond the security check point.

    <p>False</p> Signup and view all the answers

    Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

    <p>True</p> Signup and view all the answers

    Which one of these is NOT a physical security feature you should check when inspecting your hotel room?

    <p>Lockbox or safe</p> Signup and view all the answers

    What should you NOT do during a hostage rescue attempt?

    <p>Try to assist hostage rescue team</p> Signup and view all the answers

    Early symptoms of a biological attack may appear the same as common illnesses.

    <p>True</p> Signup and view all the answers

    Security is a team effort.

    <p>True</p> Signup and view all the answers

    Surveillance can be performed through either stationary or mobile means.

    <p>True</p> Signup and view all the answers

    Terrorists usually avoid tourist locations since they are not DOD-related.

    <p>False</p> Signup and view all the answers

    In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

    <p>False</p> Signup and view all the answers

    When possible, it is best to always travel with a cell phone.

    <p>True</p> Signup and view all the answers

    Room invasions are a significant security issue for hotels located in CONUS.

    <p>True</p> Signup and view all the answers

    The initial moments of a hostage-taking incident can be extremely dangerous.

    <p>True</p> Signup and view all the answers

    IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.

    <p>True</p> Signup and view all the answers

    If you identify a possible surveillance attempt you should try to handle the situation yourself.

    <p>False</p> Signup and view all the answers

    From an antiterrorism perspective, espionage and security negligence are considered insider threats.

    <p>True</p> Signup and view all the answers

    Which one of these does NOT pose a risk to security at a government facility?

    <p>A person expressing boredom with the US mission</p> Signup and view all the answers

    Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

    <p>True</p> Signup and view all the answers

    Select all factors that are ways in which you might become the victim of a terrorist attack.

    <p>Association</p> Signup and view all the answers

    Electronic audio and video devices are never used by terrorists for surveillance purposes.

    <p>False</p> Signup and view all the answers

    From a security perspective, the best rooms are directly next to emergency exits.

    <p>False</p> Signup and view all the answers

    Which of the following is NOT a recommended response to an active shooter incident?

    <p>Provide instructions to arriving emergency response personnel</p> Signup and view all the answers

    Which of the following is NOT a useful vehicle feature from a security perspective?

    <p>Wi-Fi capable</p> Signup and view all the answers

    True or False: The ticketing area is more secure than the area beyond the security check point.

    <p>False</p> Signup and view all the answers

    True or False: Internet acquaintances can pose a security threat and should be carefully monitored.

    <p>True</p> Signup and view all the answers

    True or False: Terrorists usually avoid tourist locations since they are not DOD-related.

    <p>False</p> Signup and view all the answers

    Study Notes

    Antiterrorism Awareness Training Key Concepts

    • Understanding terrorist threats involves assessing the sophistication, activity level, violence, predictability, and local awareness regarding terrorist groups.
    • Factors that do not assist in avoiding victimization include predictability; location, opportunity, and association are significant risk factors.

    Force Protection

    • Force Protection Condition (FPCON) DELTA indicates the highest level of security measures implemented at a base or installation.
    • The system classifies security conditions from Alpha (least) to Delta (most).

    National Terrorism Advisory System

    • Alerts issued from this system are exclusive to the United States and its possessions.

    Antiterrorism Themes

    • Key themes include reporting and responding to threats and anticipating potential risks.
    • Collections and counter-surveillance do not constitute Antiterrorism Level I themes.

    Surveillance Methods

    • Common terrorist methods for surveillance consist of technical and stationary surveillance, casual questioning, while breaking and entering for theft is not utilized as a method of surveillance.

    Insider Threats

    • Individuals with access to installations can still pose threats, highlighting the need for vigilance.
    • Indicators of an insider threat may include abnormal behaviors and the presence of unauthorized weapons.

    Responding to Threats

    • In active shooter situations, lying down is not the immediate correct response; hiding or barricading is preferred.
    • During a hostage rescue, individuals should remain calm and low, not attempt to assist team members, and follow their instructions.

    Biological Attacks

    • Symptoms from biological attacks may mimic common illnesses; awareness is critical.

    Collaboration in Security

    • Security is a collective responsibility shared by everyone on an installation.

    Vehicle and Home Safety

    • Best practices for vehicle security include maintaining a reliable vehicle; Wi-Fi capability and air bags are not crucial security features.
    • Home security can be improved through changing locks, securing windows, and outdoor lighting enhancements. Hiding keys outside compromises security.

    Hotel and Travel Security

    • Key security features in hotels do not include lockboxes or safes; one should inspect solid doors and functioning locks upon arrival.
    • Room invasions are a notable security concern in domestic hotels.

    Risk Mitigation

    • Avoid handling potential surveillance situations personally; report suspicions to authorities.
    • Recognizing signs of instability can assist in early identification of insider threats.

    General Security Awareness

    • IEDs may be disguised and can appear inconspicuous; thus, constant environmental awareness is necessary.
    • Security concerns extend to various locations, including tourist sites, not strictly military-related sites.### Antiterrorism Scenario Training Key Points
    • Internet acquaintances can present security risks and should be monitored.
    • Shared responsibility for security falls on everyone within an installation.
    • Antiterrorism Level I themes exclude "Collections" and "Counter-surveillance."
    • It is advisable to travel with a cell phone for safety and accessibility.
    • Factors to avoid becoming a victim of a terrorist attack include opportunity, location, and association.
    • Early symptoms of biological attacks may resemble common diseases, highlighting the importance of vigilance.
    • Hostage situations are particularly dangerous during the initial moments of the incident.
    • Room invasions represent a significant security concern for hotels in the United States.
    • In an active shooter scenario, lying on the ground is not recommended as an immediate response.
    • Immediate attempts to subdue hijackers during a skyjacking are advised against.
    • Maintaining a vehicle properly is essential for both security and safety environments.
    • Home security enhancements can be made with self-help measures such as changing locks, securing windows, and improving outdoor lighting.
    • Room invasions are a serious security issue for hotels located within the Continental United States (CONUS).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on key factors in understanding environmental threats related to terrorism. This flashcard quiz covers the sophistication, activity, and predictability of terrorist groups as outlined in the Introduction to Antiterrorism. Challenge yourself and deepen your awareness of these critical issues.

    More Like This

    Use Quizgecko on...
    Browser
    Browser