Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
162 Cards in this Set
- Front
- Back
The ___ is a command and control facility established by the Joint Forward Operating Base (JFOB) commander to serve as the focal point for base defense, force protection and security operations.
|
Base defense operations center
|
|
____ is the product resulting from the collection, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas.
|
Intelligence
|
|
Within the normal structured organizational relationship on an installation, who is directly subordinate to the Installation Commander with responsibility for program oversight of the installation's antiterrorism programs?
|
installation ato
|
|
The ___ is used to identify the terrorist threats posed to dod assets and/or the threats that could be encountered in executing a mission.
|
threat assessment
|
|
___ helps to overcome the challenges created when different units from different commands with different missions are assigned to support the Joint Forward Operating Base's force protection mission.
|
Unity of Command
|
|
Antiterrorism is a ___________ responsibility and must be thoroughly integrated into every unit attached to the installation, to include tenants, sister services and attached agencies.
|
Installation Commander's
|
|
___ is information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign government or elements thereof, foreign organizations, foreign persons, or international terrorist activities.
|
counterintelligence
|
|
Who develops and provides AOR specific training and provide in-transit froces with threat information?
|
Geographic Combatant Commander (GCC)
|
|
An option is an action that can be taken or equipment that can be applied to reduce or eliminate one or more ___
|
module 7 - risk management considerations vulnerability assessment
|
|
Drag and drop each of the following steps in the risk management process to put them in their correct order with the first step on the top and the last step on the bottom.
|
assets threats vulnerabilities risks |
|
The at risk management process and procedures shall be reviewed at least annually. An at program review, higher headquarters assessment, or a jsiva visit satisfies this annual requirement. what is the normal frequency for higher headquarters assessments?
|
every third year
|
|
Which position is assigned the task of actually writing an AT plan?
|
Installation or self-supported facility ATO
|
|
The dod and usaf define terrorism as the ___ use or threat of unlawful violence to instill fear?
|
calculated
|
|
AT planning is critical to deterrence detection defense and ___
|
response to terrorist incidents
|
|
the systematic assessment of the at program against standards prescribed by dod instruction 2000.16 requires a comprehensive at program review be conducted to evaluate the effectiveness and adequacy of the program. during this at program review which of the following areas must be evaluated?
|
Risk management AT planning training and exercise |
|
The dod and usaf defines terrorism as the intention to coerce or intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.
|
true
|
|
Who is the af program element monitor (PEM) for the af at program?
|
Af/a7sx
|
|
Who will determine the appropriate FPCON level?
|
Commander assigned AT responsibility
|
|
family members that are ___ years or older traveling beyond conus on official business, shall receive level 1 at awareness training as part of their pre departure requirements
|
14
|
|
What document provides detailed information to assist in managing AT elements or activities?
|
DoD O-2000.12-H
|
|
___ includes focused information on potential terrorist threats and guidance on the development of tailored AT planning?
|
AOR-Specific Training for DoD Personnel and In-transit Forces
|
|
Which of the following plans contain command-specific guidance for the establishment of an Anti terrorism program and the implementation of antiterrorism standards?
|
Antiterrorism Plan
|
|
which of the following is not an element of the risk management process?
|
asset assessment
|
|
What helps to overcome the challenges created when different units from different commands with different missions are assigned to support the Joint Forward Operating Base's force protection mission?
|
Unity of Command
|
|
iaw dod instruction 2000.16, a __ assessment, addresses the effect of temporary or permanent loss of key assets or infrastructures on the installation or a unit's ability to perform its mission
|
criticality
|
|
the dbt does not provide a rational basis for making and justifying potentially expenise decisions, designing the security system, and evaluating the adequacy of the security system.
|
false
|
|
Which group is not required to have a charter?
|
TIFC
|
|
CAs shall provide the basis for identifying those assets that require specific protective ___ and ___ for resource allocation when developing and updating the AT plan.
|
measures and priorities
|
|
What Anti Terrorism group's purpose is to develop and refine terrorism threat assessments and coordinate and disseminate threat warnings reports and summaries?
|
Antiterrorism Working Group (ATWG)
|
|
no specific threat information equals an absence of threat
|
false
|
|
the ta matrix establishes a range of specific weapons and tactics
|
true
|
|
the small size of terrorist groups, their mobility, and training in CI and security measures are some of the factors that complicate ___ and ___ collection and operations.
|
intelligence counterintelligence |
|
a criticality assessment also examines the cost of recovery and constitution including time, funds, capability, and infrastructure support
|
true
|
|
the ___ assures that the integrated defense risk management process considers the most current data regarding the threat and operating environments.
|
module 6 - working groups, committees, and operation centers
|
|
dod instruction 2000.16 standard 5 requires a ca to identify classify and prioritize mission-essential assets, resources, and personnel critical to dod mission success
|
true
|
|
msharpp focuses mainly on the threat to the situations, activities, capabilities, and resources on an installation that are vulnerable to a terrorist attack.
|
true
|
|
the infocon system applies to both the nipr and sipr nets.
|
true
|
|
standard 6 - terrorism va, requires that terrorism vas be conducted for any personnel designated as high risk personnel (hrp). these assessment are referred to as a ___
|
Personal Security Vulnerability Assessments |
|
the proactive and reactive aspects of force protection are divided into four significant elements. which of the following are included in the four elements?
|
- physical security - weapons effect mitigation threat- vulnerability, and risk analysis |
|
the overriding concept of antiterrorism vulnerability reduction is to focus on two broad areas.
|
- substantially mitigating the effects of a terrorist attack. - preventing a terrorist incident from occurring. |
|
|
|
|
risk management is defined as the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost.
|
true
|
|
building system design consists of which of the following considerations.
|
signage circulation space planning |
|
one of the hhq team objectives is to assist the ___ commander in meeting the at/fp responsibilities
|
installation
|
|
servicing ___ detachments will provide a threat assessment for any to the supported installation
|
Air force office of special investigations
|
|
from the information derived from all assessments, the ___ will make a decision on how best to employ given resources and force protection measure to deter, mitigate, or prepare for a terrorist incident.
|
Installation Commander
|
|
activities involving hazardous, toxic, and/or explosive materials that should be isolated from other activities fall under which type of consideration
|
industrial safety and hygiene
|
|
site specific fpcon measures are designed for unique requirements of an installation or mission. each functional commander should develop and it can be base-wide or facility specific
|
true
|
|
units must have the ability to improvise in a ___ environment
|
tactical
|
|
when determining assets and threats, the same considerations should be given to the systems approach in the ___ environment as when in the cantonment area
|
tactical
|
|
click on the correct afi that is used to assist with the planning of installation vehicle inspection areas
|
AF 10-2401
|
|
the ato and ___ are responsible for ensuring the application of the commander's guidance
|
module 14 - at considerations in contracting
|
|
dod instruction 2000.16 and afi 10-245, standard 16 requires that a personnel security vulnerability assessment (osva) be completed for each person who is an 0-6 or above.
|
module 13
|
|
in cvamp if you are assigned the system administrator, commander, and assessors permissions you have full control of the program.
|
module 15 - CVAMP
|
|
a key element of a barrier plan should identify owner/users tasked with erecting barriers and ___
|
specified time periods
|
|
funds must be obligated within ___ days
|
module 15 - CVAMP
|
|
|
|
|
afi 10-245 is an air force instruction that implements the instructions in dodi 200.12 and dodi 2000.16
|
true
|
|
when integration an at plan with base defense plans, the new plan should be seamless in requirements and application
|
module 10
|
|
what did terrorists use to attack the uss cole
|
bomb-laden boat
|
|
what happened to brigadier general james dozier and where did it take place
|
kidnapped while in his home |
|
timothy mcveigh and terry nichols were convicted for which terrorist bombing
|
Murrah federal building in Oklahoma city
|
|
select the all the fundamental functions of the af lessons learned process
|
tracking collection dissemination validation |
|
cvamp provides the means to organize and manage ___ identified during an assessment
|
vulnerabilities
|
|
as part of your emergency evacuation plan, always post evacuation rally points on maps. it allows assigned personnel to quickly locate their rally point during an emergency
|
false
|
|
the DoD and USAF define terrorism as the ___ use or threat of unlawful violence to instill fear.
|
calculated
|
|
which document provides detailed information to assist in managing AT element/activities
|
Dod O-2000.12-H
|
|
Which level of AT training is designed to prepare ATOs to manage AT programs, advise the commander on all AT issues, and qualify individuals to administer AT awareness training?
|
Level II
|
|
Which level of AT training provides senior military and civilian executive leadership with the requisite knowledge to enable development of AT Program policies and facilitate oversight of all aspects of AT programs at the operational and strategic levels?
|
Level IV
|
|
Which funding source is the PRIMARY means for combatant commanders to react to unforeseen requirements from changes in a terrorist threat, threat levels, antiterrorism doctrine and standards, as well as unanticipated requirements identified as a result of vulnerability assessments, tactical operations, and exercising AT plans?
|
CCIF
|
|
in accordance with trainining and exercise standards, AT exercise documentation must be maintained for no less than ___ to ensure incorporation of lessons learned
|
2 years
|
|
antiterrorism is a/an ___ responsibility and must be thoroughly integrated into every unit attached to the installation, to include tenants, sister services, and attached agencies
|
installation commander's
|
|
in the joint environment, the ___ is responsible for base force protection and security operations,
|
joint forward operating base commander
|
|
which antiterrorism groups purpose is to develop and refine terrorism threat assessments and coordinate and disseminate threat warnings, reports and summaries?
|
TWG
|
|
which antiterrorism groups membership includes: the ato, commander, members of the staff, tenant unit representatives, appropriate representation from direct-hire, contractor, local, state, federal, and hot-nation law enforcement agencies and the intelligence community?
|
TWG
|
|
which antiterrorism group meets at least semi-annually and acts upon recommendations of the ATWG and TWG?
|
ATEC
|
|
The purpose of the ___ is to develop and refine AT program guidance, policy, and standards, act upon recommendations of the ATWG and TWG and determine resource allocation priorities to mitigate or eliminate terrorism-related vulnerabilities?
|
ATEC
|
|
Which antiterrorism group's charter should be developed to describe member responsibilities, minimum functional and SME participation?
|
ATWG
|
|
The MSG commander chairs the ___
|
EMWG
|
|
The ___ leverages information and intelligence to support the timely identification of indicators and warnings of emerging localized threats.
|
IFC
|
|
The ___ assures that the IDRMP considers the most current data regarding the threat and operating environments.
|
IFC
|
|
essential members of the base defense operations center (BDOC) include representatives from all of the units below EXCEPT ___
|
Transportation
|
|
How many emergency support functions are located in the emergency operations center?
|
Fifteen
|
|
the primary focus of the crisis action team is ___
|
Mission Continuation
|
|
Collectively, the threat analysis, intelligence, and counterintelligence provides priority information requirements to identify potential terrorist targets based on existing knowledge of an organization
|
true
|
|
Select the terrorist threat information source(s) that fall under the department of defense
|
combatant commands intelligence center/J-2 dia -- JITF-CT |
|
Terrorist threat information sources can include open source materials such as the internet, books and studies, newspaper and periodicals.
|
true
|
|
From the list below, select all that are individual components of the TA matrix
|
tactic weapon threat priority delivery method |
|
From the list below, select the three that are hazard categories
|
natural cyber accidents |
|
___ is a system of countermeasures protecting assets and includes the aggressor tactics and the associated weapons, explosives, tools, and agents
|
UFC 4-020-01
|
|
IAW dod directive 2000.12, a ___ asset is any facility, equipment, service, or resource considered essential to dod operations in peace, crisis, and war; warranting measures and precautions to ensure its continued efficient operation, protection from disruption, degradation or destruction, and its timely restoration.
|
critical
|
|
Critical assets may also be private assets, that if lost would seriously disrupt dod operations
|
true
|
|
CAs are also conducted on ___ assets such as high population facilities and mass gathering activities
|
non-mission essential
|
|
DoD instruction 2000.16, standard 5 requires CAs be updated at least every two years to determine the degree of asset critivality
|
false
|
|
Some of the goals for conducting a CA are:
|
A, B, C, D
|
|
The purpose of the CA process is to identify and prioritize all assets on an installation. Assets include personnel, equipment, stockpiles, buildings, recreation areas, or transportation systems.
|
true
|
|
The purpose of a CA matrix is to determine the vulnerability of security operations on an installation
|
false
|
|
The ___ provides the commander with a tool to assess the potential vulnerabilities of an installation, unit, exercise, port, ship, residence, facility, or other site.
|
vulnerability assessment
|
|
vulnerabilities fall into which three of the following categories
|
vulnerabilities options observations |
|
The three categories of observations are concern, positive, and neutral
|
true
|
|
An option is an action that can be taken or equipment that can be applied to reduce of eliminate one or more ___
|
vulnerabilities
|
|
Standard 6 -- Terrorism VA, requires that the assessment be conducted and updated at least ___ or more frequently if the terrorist threat assessment or mission requirements dictate.
|
annually
|
|
Upon completion of a Vulnerability Assessment, standard 6 requires that the CVAMP database be populated with the results within ___ days
|
90
|
|
A terrorism vulnerability assessment must be conducted for any event or activity determined to be a special event attended by ___ or more DoD personnel.
|
300
|
|
Deploying commanders shall implement appropriate ___ to reduce risk and vulnerability before and after deployment
|
antiterrorism measures
|
|
The installation ATO conducts a VA using key antiterrorism working group members in a collaborative effort as the assessment team
|
true
|
|
The operations readiness specialist is responsible for assessing the water supply and distribution systems to determine their vulnerability to waterborne contamination
|
false
|
|
When conducting a VA, you must step outside of your usual role and think like a/an ___
|
terrorist
|
|
The core VA management program is an automated and web-based means of managing a command's vulnerabilities and associated funding requirements
|
true
|
|
___ is covered in the CARVER method and should be used as a criterion for vulnerability
|
criticality
|
|
Security resources and measures are applied to ___ and to deter, detect, defend, and defeat the threat.
|
mitigate risks
|
|
who has authority to determine acceptable risk
|
installation commander
|
|
risk = criticality x threat x vulnerability
|
true
|
|
risk avoidance integrates the process of assessing the threat, the vulnerabilities, and the value of the asset to the owner. It also weighs the risk of compromise/loss against the cost of security practices
|
false
|
|
it is important to note that the asset RA table is meant to be an exact science. it is the only method of quantifying risk
|
false
|
|
the one method of reducing risk that is controllable is reducing the ___
|
Vulnerability
|
|
An action taken or a physical entity used to reduce or eliminate one or more vulnerability, threat, or impact is a ___
|
countermeasure
|
|
Which of the following titles is "a chairman of the joint chiefs of staff approved program standardizing the department's identification, recommended preventive actions, and responses to terrorist threats against U.S. personnel and facilities. the system is the primary means for a commander to apply an operational decision on how to protect against terrorism
|
FPCON
|
|
Commanders at all levels shall set local FPCONs
|
true
|
|
Random antiterrorism measures are FPCON measures selected from higher measures which are randomly implemented during lower FPCONs
|
true
|
|
Threat levels define the degree of threat; FPCONs define security measures to protect against that threat
|
true
|
|
The ___ system provides a framework of prescribed ___ and cycles necessary for reestablishing the confidence level and security information systems for the commander and thereby supporting the entire Global Information Grid
|
INFOCON actions |
|
Which two of the following categories are used for vulnerabilities
|
programmatic procedural |
|
___ options must be identified in order to develop controls, make decisions, implement controls, supervise, and review
|
mitigation
|
|
Which of the following are mitigation assistance groups
|
physical security equipment action group technical support working group rapid equipping force |
|
Antiterrorism construction standards were developed to identify appropriate and enforceable measures to eliminate further need for countermeasures for possible terrorist attacks
|
false
|
|
barrier plans establish access/entry control points contingencies
|
true
|
|
barrier systems are considered ___ if they require action by personnel or equipment to permit entry
|
active
|
|
barrier systems are considered ___ if their effectiveness relies on their bulk or mass and they have no moving parts
|
passive
|
|
barrier systems are considered ___ if they are permanently installed or if heavy equipment is required to move of dismantle the barriers
|
fixed
|
|
barrier systems are considered ___ if they can be transferred from place to place
|
movable
|
|
during contingency operations, key facilities or missions should be considered for ___ and visual assessment
|
electronic detection
|
|
An AT plan is not complete unless it is ___ and ___
|
signed exercised |
|
conduct comprehensive field and staff training to exercise AT plans at least ___. Ensure AT exercises encompass all aspect of AT and physical security plans
|
annually
|
|
which of the following is not considered a minimum essential element of an AT plan
|
intelligence support
|
|
when the FPCON checklist is linked to the AT plan, the entire document shall be classified at which level
|
confidential
|
|
the at plan must ensure the installation can warn its resident population in affected areas of CBRNE hazard identification immediately, but no longer than ___ minutes after detection
|
10
|
|
Establish ___ or other similarly constructed protocols with the appropriate local, state, and federal, or hot-nation authorities to support AT plan execution, augment incident response, and post-incident consequence management activities
|
mutual aid agreements
|
|
which of the following references is cited as an at planning tool
|
joint antiterrorism program manager's guide afm 10-4-1, volume 2, planning formats and guide joint pub 5-00.2, joint task force planning guidance and procedures |
|
which of the following is/are required annexes when developing a basic AT plan
|
medical services/forces health protection intelligence logistics |
|
The commander is responsible for the development of the AT plan; however, the security forces commander is normally assigned the task of actually writing the plan
|
false
|
|
when developing/writing an AT plan host nation, SOFA and ___ legal considerations must be addressed
|
jurisdictional
|
|
at plans incorporate the terrorist threat into the integrated defense plan
|
true
|
|
when integrating an at plan with integrated defense plans, the new plan should be seamless in requirements and application
|
true
|
|
barrier plans are used to support installation AT plans in all of the following examples, EXCEPT
|
installation beautification
|
|
as part of an effective evacuation plan, ensure that maps are marked with exits, are posted throughout each facility, and that all personnel knows the location of the rally point
|
true
|
|
the six who plotted the 2007 attack on fort dix were part of a home grown terrorist group
|
false
|
|
on which flight on 11 September 2001, did the passengers attempted to retake the airliner during a terrorist takeover
|
united flight 93
|
|
from 18 September 2001 to 9 October 2001 as many as ___ letters containing anthrax were mailed to addresses in Washington D.C. and New York
|
7
|
|
In August of 1998 two US Embassies were bombed. where did these attacks take place
|
Africa
|
|
After which bombing in 1996 did the DoD renew its efforts to improve force protection against terrorism while remaining engaged in the Middle East region.
|
khobar towers in Saudi arabia
|
|
How or why was SPC Edward F. Primental killed
|
killed for his military ID to enable terrorists to detonate a bomb inside the Rhein-Mein Air Base near Frankfurt
|
|
CVAMP is an optional tool used to manage Vulnerability Assessments (VA)
|
false
|
|
Which of the following are roles assignable to a CVAMP user
|
Commander ATO Assessor System administrator Resource manager |
|
In CVAMP, the ATO role creates Vulnerability Assessments, observations, and funding requests
|
true
|
|
In CVAMP, if you are assigned the System Administrator, Commander, and Assessors permissions you have full control of the program.
|
false
|
|
CVAMP functionality is determined by your ___
|
role
|
|
In CVAMP, programmatic observations are those that the Commander can write a policy, regulation or anything with his/her signature block to correct the deficiency
|
false
|
|
vulnerability assessments must be entered into CVAMP within how many days of the final report
|
120
|
|
Observations from the final report must be input into CVAMP within 60 days of receipt
|
true
|
|
when submitting a funding request in CVAMP, the assessment must be less than ___ years old
|
2
|
|
funds must be obligated within ___ days
|
90
|