Antiterrorism Officer (ATO) Level II
1. Which of the following are potential indicators of insider threat?
-All of the above
2. Factors contributing to the onset of the stockhom syndrome include the hostage____________ (select all apply)
-Seeing the captors human qualities
- Having positive contact with the captors
3. Which of the following statements are true?
-Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats
-DoD 5200.8-R addresses the physical security of personnel, installations, operations, and assets of DoD components
4. A State supported terrorist group operates:
-Independently, but receives substantial outside support
5. An AT plan __________________. Select all that apply
- All are true
6. Training conducted in a clandestine fashion at the cell level by members of the terrorist group within the targeted country is considered__________.
- Internal training
7. Which of the following are foundation documents for building an AT Program? Select all that apply
-DOD instruction O-2000.16
-DOD instruction 2000.12
8. Which placing vehicle barriers, consider____________.
-All of the above
9. Which of the following are considered common goals of terrorist groups?
-All of the above
10. Which paragraph of the AT plan defines the requirements to supporting the AT Plan?
-Administration and Logistics
11. What resources are available to develop an AT plan?
DoD ATO Guide, DoDI 2000.12, DoDI O-2000.16 Vol 1 & 2
12. During a Risk Assessment, which element(s) must be considered to make well informed decisions?
-All of the above
13. Which of the following are reasons why AT plan exercise are important?
-All of the above
14. Security functions that must be performed for a physical security system to protect DoD assets include__________________.
-All of the above
15. Match the type of terrorist attack with its description.
-Raid = Surprise attack on a defined target
-Assassination = Murder of a prominent person usually for political reasons
-Ambush = Sudden attack from a concealed position
-Seizure = Occupying and holding a prominent building
-Bombing = Most common type of terrorist attack
-Hijacking = Forceful seizure of a surface vehicle
-Sabotage = Weaken an entitu through disruption or destruction
16. A terrorist threat level is_____________. Select all that apply
-Identified as High, sig…
-An indication that a terrorist…
17. A dirty bomb________________. Select all that apply.
-Combines conventional explosives with radioactive materials
-Is used by terrorists to frighten people and make the land around the explosion unusable for a long period of time
18. During an active shooter situation, you should: Select all that apply
-Evacuate
-Hide
-Take Action
19. Which of the following are common characteristics of a ramming attack? Select all that apply
-Lack of observable indicators immediately before the attack
-Targeting of public venues
20. A typical AT program organization includes the following members: Select all that apply
The answer is NOT all of them
The answer is not only the ATO and installation commander, The Threat working group
21. To minimize the insider threat, practice:
-Awareness, prevention, and deterrence
22. Which of the following statements are true?
-The commander is responsible for the development of the AT plan
- The ATO is responsible for leveraging the capabilities of the organizations AT working group to assist with creating the AT plan.
-The ATO is responsible for writing the AT plan
23. Which of the following statements illustrate the correct application of DoD Code of Conduct? Select all that apply
-As a hostage, service members should not, under any circumstances, support or encourage their captors
-Service members on assignment in an area prone to terrorist activity shall follow the appropriate counterterrorism measures
24. Which of the following are considered tactics of terrorist groups? Select all that apply.
-Everything but –being rurally based is incorrect
25. Which of the following are types of biological agents (Select all that apply)
-nerve agents and toxins only was incorrect
26. The combating terrorism Readiness Initiatives Fund (CbT RIF)
-Finances emergent or emergency high-priority combating terrorism requirements
27. What must be addressed in an AT plan (Select all that apply)
Coordination and intelligence only was incorrect
28. When Law enforcement arrives you should (select all that apply)
-Incorrect answer: all except ask for help
-Incorrect answer: all except ask for help and immediately raise hands
29. When documenting requirements, it is important to address_________. Select all that apply.
What resource is needed and how it fits into the AT plan.
Why the resource is needed
30. Force Protection conditions are __________________. Select all that apply
-Identified as Normal, alpha…
-A system of preventative measures used by DoD to mitigate hostile actions
31. There are several techniques hostages can use to help them survive a hostage situation. They should:
-Maintain a regular exercise routine
32. Different perspectives to any terrorist event include which of the following? Select all that apply.
-The general public…
-The victim…
-The terrorist…
33. Which paragraph of the AT plan lists the specific task for each subordinate unit?
The answer is NOT Annexes or Mission
34. Match each phase of a terrorist operation with its description.
-Phase1
-Phase 2
-phase 3
-Phase IV
-Phase V
-Phase VI
-Phase VII
35. Which funding category does a resources fall in if it is important to the mission, but has a low vulnerability?
- Should fund
36. As part of assessing the existence of a terrorist threat, the DoD analyzed a terrorist groups actual record of conducting an attack, and their ability and desire to conduct future attacks. Which of the following methodology factors did the DoD take into account A (select all that apply)
-Terrorist history and intentions
-Terrorist operational capabilities
37. The ATO is ______________ (select all that apply)
-The expert within an organization for generating, prioritizing, and appropriately documenting AT requirements
-Responsible for continuously documenting funding requirements
38. A Threat Assessment (TA):
Incorrect answer – Is considered complete with the development of the TM.
39. Which of the following are examples of expedient perimeters barriers? Select all that apply.
-Ropes
-Jersey wall segments
40. Why do terrorists use a compartmented cell structure?
-Makes it difficult to penetrate the entire organization
-Compromise or loss of one cell does not compromise the other cells
41. DoD AT Construction Standards:
-All are correct
42. Which AT Plan exercise(s) uses scenario driven events to test specific portions of the AT Plan?
-Drill
43. Chemical agents are:
-Identifiable with the sudden onset of symptoms
-Nerve agents, such as sarin, that interfere with the functioning of the nervous system
44. If a hostage senses or realizes a rescue attempt is imminent, the hostage should:
-All of the above is NOT the answer
-Prepare to escape… is NOT the answer
45. Which of the following statements are true regarding terrorist operations?
-Terrorists rehearse the operation in an environment mirroring the target location or in the target location itself
-Terrorists select multiple targets as potential locations for the actual operation
46. Why might a potential captor take a victim hostage?
-Because the victim is in the wrong place at the wrong time
-For the publicity the situation would generate
-Because the victim may be a source of trouble otherwise
47. Which of the following is an ATM responsible for? Select all that apply.
-XXXXXXXXXX
48. Which of the following statement(s) are true?
-The purpose of Criticality Assessment
-The critically assessment only focuses on assets located on the installation.
-Critically Assessments assist the Commander in making resources allocation
- All of the above – Is incorrect answer
49. Which of the following statement(s) are true?
-The Commander uses a vulnerability assessment
-A vulnerability assessment should focus only on WMD
-Higher Headquarters vulnerability assessment
- All of the above – Is incorrect answer