Level I Antiterrorism Training - Pre Test
39 Questions
105 Views

Level I Antiterrorism Training - Pre Test

Created by
@ModestClarity

Questions and Answers

When possible, it is best to always travel with a cell phone.

True

In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

False

The ticketing area is more secure than the area beyond the security checkpoint.

False

Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

<p>True</p> Signup and view all the answers

Internet acquaintances can pose a security threat and should be carefully monitored.

<p>True</p> Signup and view all the answers

Force Protection Condition DELTA means that your base is at which one of the following?

<p>the most increased level of protection</p> Signup and view all the answers

Which of the following is NOT a recommended response to an active shooter incident?

<p>provide instructions to arriving emergency response personnel</p> Signup and view all the answers

Which one of the following is NOT an early indicator of a potential insider threat?

<p>a reasonable disagreement with a US Government policy</p> Signup and view all the answers

Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?

<p>none of these answers</p> Signup and view all the answers

Terrorists usually avoid tourist locations since they are not DOD-related.

<p>False</p> Signup and view all the answers

Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

<p>True</p> Signup and view all the answers

Select all factors that are ways in which you might become the victim of a terrorist attack.

<p>Ignoring security alerts</p> Signup and view all the answers

Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

<p>True</p> Signup and view all the answers

Electronic audio and video devices are never used by terrorists for surveillance purposes.

<p>False</p> Signup and view all the answers

The initial moments of a hostage taking incident can be extremely dangerous.

<p>True</p> Signup and view all the answers

If you identify a possible surveillance attempt you should try to handle the situation yourself.

<p>False</p> Signup and view all the answers

Persons who have been given access to an installation can be counted on to be of no threat.

<p>False</p> Signup and view all the answers

Room invasions are a significant security issue for hotels located in CONUS.

<p>False</p> Signup and view all the answers

Room invasions are not a significant security issue for hotels located within the United States.

<p>False</p> Signup and view all the answers

In an active shooter incident involving firearms you should immediately lie on the ground.

<p>False</p> Signup and view all the answers

Which one of these is NOT a physical security feature you should check when inspecting your hotel room?

<p>lockbox or safe</p> Signup and view all the answers

From the following choices, select the factors you should consider to understand the threat in your environment.

<p>All of the above</p> Signup and view all the answers

Everyone on an installation has shared responsibility for security.

<p>True</p> Signup and view all the answers

IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.

<p>True</p> Signup and view all the answers

Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.

<p>True</p> Signup and view all the answers

What should you NOT do during a hostage rescue attempt?

<p>try to assist hostage rescue team</p> Signup and view all the answers

Early symptoms of a biological attack may appear the same as common illnesses.

<p>True</p> Signup and view all the answers

Security is a team effort.

<p>True</p> Signup and view all the answers

Surveillance can be performed through either stationary or mobile means.

<p>True</p> Signup and view all the answers

From an antiterrorism perspective, espionage and security negligence are not considered insider threats.

<p>False</p> Signup and view all the answers

Individuals should fight as a last resort and only when your life is in imminent danger.

<p>True</p> Signup and view all the answers

What is the most increased Force Protection Level for a base/installation?

<p>delta</p> Signup and view all the answers

From a security perspective, the best rooms are directly next to emergency exits.

<p>False</p> Signup and view all the answers

State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.

<p>True</p> Signup and view all the answers

Which one of these is a possible indicator of a suspicious letter or package?

<p>misspellings of common words</p> Signup and view all the answers

Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.

<p>True</p> Signup and view all the answers

What is NOT a terrorist method of surveillance?

<p>breaking and entering to steal valuables</p> Signup and view all the answers

Which one of these does NOT pose a risk to security at a government facility?

<p>a person expressing boredom with the US mission</p> Signup and view all the answers

Which of the following are NOT an Antiterrorism Level I theme?

<p>Collections</p> Signup and view all the answers

Study Notes

Antiterrorism Training Key Concepts

  • Always travel with a cell phone for safety.
  • In a skyjacking scenario, do not attempt to subdue the hijackers.
  • The ticketing area is less secure than areas beyond security checkpoints.
  • Keeping a vehicle well-maintained is a best practice for security and safety.
  • Monitor internet acquaintances as they can pose security threats.
  • Force Protection Condition DELTA indicates the highest level of security.
  • Do not provide instructions to arriving emergency personnel during an active shooter incident.
  • Reasonable disagreements with U.S. Government policy are not early indicators of insider threats.
  • Terrorists have plotted against various entities; no specific exclusions provided.
  • Terrorists may target tourist locations despite their lack of DOD affiliation.
  • Improve home security with measures like changing locks, securing windows, and enhancing outdoor lighting.
  • Awareness of factors leading to potential victimization by terrorist attacks is crucial.
  • National Terrorism Advisory System alerts are applicable only to the U.S. and its possessions.
  • Terrorists may use electronic devices for surveillance.
  • Initial moments during a hostage situation can be particularly dangerous.
  • Do not attempt to handle a suspected surveillance situation alone.
  • Individuals with access to installations can still pose threats.
  • Room invasions are a notable security concern for hotels in the U.S.
  • Lying on the ground should not be the immediate response in an active shooter event.
  • Check for specific physical security features in hotel rooms, excluding lockboxes or safes.
  • Collective security responsibility exists among everyone on an installation.
  • IEDs can be concealed and may blend into their environment.
  • Recognizing signs of unstable individuals can help identify potential insider threats.
  • Do not interfere with hostage rescue efforts.
  • Early symptoms of biological attacks may mimic common illnesses.
  • Security should be considered a team responsibility.
  • Surveillance can occur through both stationary and mobile approaches.
  • Espionage and negligence are treated as insider threats in antiterrorism.
  • Fighting should only be a last resort during life-threatening situations.
  • Delta is the highest Force Protection Level for installations.
  • Hotel room locations directly next to emergency exits may not guarantee safety.
  • Consult State Department Travel Warnings before traveling across the U.S.-Mexican border.
  • Suspicious letters/packages may feature misspellings of common words.
  • Reasons for hostage-taking can include publicity, bargaining leverage, political concessions, and ransom.
  • Terrorist surveillance methods do not typically include breaking and entering to steal valuables.
  • Government facility security risks do not include someone expressing boredom with U.S. missions.
  • Antiterrorism Level I themes do not include collections and counter-surveillance.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Prepare for Level I Antiterrorism Training with this pre-test flashcard quiz. The quiz includes true or false questions related to various antiterrorism scenarios, helping you assess your understanding of key concepts. Brush up on your knowledge before diving into the training.

More Quizzes Like This

Use Quizgecko on...
Browser
Browser