I Hate CBT's

View Original

Antiterrorism Officer (ATO) Level II

1. Which of the following are potential indicators of insider threat?

-All of the above

2. Factors contributing to the onset of the stockhom syndrome include the hostage____________ (select all apply)

-Seeing the captors human qualities

- Having positive contact with the captors

3. Which of the following statements are true?

-Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats

-DoD 5200.8-R addresses the physical security of personnel, installations, operations, and assets of DoD components

4. A State supported terrorist group operates:

-Independently, but receives substantial outside support

5. An AT plan __________________. Select all that apply

- All are true

6. Training conducted in a clandestine fashion at the cell level by members of the terrorist group within the targeted country is considered__________.

- Internal training

7. Which of the following are foundation documents for building an AT Program? Select all that apply

-DOD instruction O-2000.16

-DOD instruction 2000.12

8. Which placing vehicle barriers, consider____________.

-All of the above

9. Which of the following are considered common goals of terrorist groups?

-All of the above

10. Which paragraph of the AT plan defines the requirements to supporting the AT Plan?

-Administration and Logistics

11. What resources are available to develop an AT plan?

DoD ATO Guide, DoDI 2000.12, DoDI O-2000.16 Vol 1 & 2

12. During a Risk Assessment, which element(s) must be considered to make well informed decisions?

-All of the above

13. Which of the following are reasons why AT plan exercise are important?

-All of the above

14. Security functions that must be performed for a physical security system to protect DoD assets include__________________.

-All of the above

15. Match the type of terrorist attack with its description.

-Raid = Surprise attack on a defined target

-Assassination = Murder of a prominent person usually for political reasons

-Ambush = Sudden attack from a concealed position

-Seizure = Occupying and holding a prominent building

-Bombing = Most common type of terrorist attack

-Hijacking = Forceful seizure of a surface vehicle

-Sabotage = Weaken an entitu through disruption or destruction

16. A terrorist threat level is_____________. Select all that apply

-Identified as High, sig…

-An indication that a terrorist…

17. A dirty bomb________________. Select all that apply.

-Combines conventional explosives with radioactive materials

-Is used by terrorists to frighten people and make the land around the explosion unusable for a long period of time

18. During an active shooter situation, you should: Select all that apply

-Evacuate

-Hide

-Take Action

19. Which of the following are common characteristics of a ramming attack? Select all that apply

-Lack of observable indicators immediately before the attack

-Targeting of public venues

20. A typical AT program organization includes the following members: Select all that apply

The answer is NOT all of them

The answer is not only the ATO and installation commander, The Threat working group

21. To minimize the insider threat, practice:

-Awareness, prevention, and deterrence

22. Which of the following statements are true?

-The commander is responsible for the development of the AT plan

- The ATO is responsible for leveraging the capabilities of the organizations AT working group to assist with creating the AT plan.

-The ATO is responsible for writing the AT plan

23. Which of the following statements illustrate the correct application of DoD Code of Conduct? Select all that apply

-As a hostage, service members should not, under any circumstances, support or encourage their captors

-Service members on assignment in an area prone to terrorist activity shall follow the appropriate counterterrorism measures

24. Which of the following are considered tactics of terrorist groups? Select all that apply.

-Everything but –being rurally based is incorrect

25. Which of the following are types of biological agents (Select all that apply)

-nerve agents and toxins only was incorrect

26. The combating terrorism Readiness Initiatives Fund (CbT RIF)

-Finances emergent or emergency high-priority combating terrorism requirements

27. What must be addressed in an AT plan (Select all that apply)

Coordination and intelligence only was incorrect

28. When Law enforcement arrives you should (select all that apply)

-Incorrect answer: all except ask for help

-Incorrect answer: all except ask for help and immediately raise hands

29. When documenting requirements, it is important to address_________. Select all that apply.

What resource is needed and how it fits into the AT plan.

Why the resource is needed

30. Force Protection conditions are __________________. Select all that apply

-Identified as Normal, alpha…

-A system of preventative measures used by DoD to mitigate hostile actions

31. There are several techniques hostages can use to help them survive a hostage situation. They should:

-Maintain a regular exercise routine

32. Different perspectives to any terrorist event include which of the following? Select all that apply.

-The general public…

-The victim…

-The terrorist…

33. Which paragraph of the AT plan lists the specific task for each subordinate unit?

The answer is NOT Annexes or Mission

34. Match each phase of a terrorist operation with its description.

-Phase1

-Phase 2

-phase 3

-Phase IV

-Phase V

-Phase VI

-Phase VII

35. Which funding category does a resources fall in if it is important to the mission, but has a low vulnerability?

- Should fund

36. As part of assessing the existence of a terrorist threat, the DoD analyzed a terrorist groups actual record of conducting an attack, and their ability and desire to conduct future attacks. Which of the following methodology factors did the DoD take into account A (select all that apply)

-Terrorist history and intentions

-Terrorist operational capabilities

37. The ATO is ______________ (select all that apply)

-The expert within an organization for generating, prioritizing, and appropriately documenting AT requirements

-Responsible for continuously documenting funding requirements

38. A Threat Assessment (TA):

Incorrect answer – Is considered complete with the development of the TM.

39. Which of the following are examples of expedient perimeters barriers? Select all that apply.

-Ropes

-Jersey wall segments

40. Why do terrorists use a compartmented cell structure?

-Makes it difficult to penetrate the entire organization

-Compromise or loss of one cell does not compromise the other cells

41. DoD AT Construction Standards:

-All are correct

42. Which AT Plan exercise(s) uses scenario driven events to test specific portions of the AT Plan?

-Drill

43. Chemical agents are:

-Identifiable with the sudden onset of symptoms

-Nerve agents, such as sarin, that interfere with the functioning of the nervous system

44. If a hostage senses or realizes a rescue attempt is imminent, the hostage should:

-All of the above is NOT the answer

-Prepare to escape… is NOT the answer

45. Which of the following statements are true regarding terrorist operations?

-Terrorists rehearse the operation in an environment mirroring the target location or in the target location itself

-Terrorists select multiple targets as potential locations for the actual operation

46. Why might a potential captor take a victim hostage?

-Because the victim is in the wrong place at the wrong time

-For the publicity the situation would generate

-Because the victim may be a source of trouble otherwise

47. Which of the following is an ATM responsible for? Select all that apply.

-XXXXXXXXXX

48. Which of the following statement(s) are true?

-The purpose of Criticality Assessment

-The critically assessment only focuses on assets located on the installation.

-Critically Assessments assist the Commander in making resources allocation

- All of the above – Is incorrect answer

49. Which of the following statement(s) are true?

-The Commander uses a vulnerability assessment

-A vulnerability assessment should focus only on WMD

-Higher Headquarters vulnerability assessment

- All of the above – Is incorrect answer