• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/162

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

162 Cards in this Set

  • Front
  • Back
The ___ is a command and control facility established by the Joint Forward Operating Base (JFOB) commander to serve as the focal point for base defense, force protection and security operations.
Base defense operations center
____ is the product resulting from the collection, processing, integration, analysis, evaluation, and interpretation of available information concerning foreign countries or areas.
Intelligence
Within the normal structured organizational relationship on an installation, who is directly subordinate to the Installation Commander with responsibility for program oversight of the installation's antiterrorism programs?
installation ato
The ___ is used to identify the terrorist threats posed to dod assets and/or the threats that could be encountered in executing a mission.
threat assessment
___ helps to overcome the challenges created when different units from different commands with different missions are assigned to support the Joint Forward Operating Base's force protection mission.
Unity of Command
Antiterrorism is a ___________ responsibility and must be thoroughly integrated into every unit attached to the installation, to include tenants, sister services and attached agencies.
Installation Commander's
___ is information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign government or elements thereof, foreign organizations, foreign persons, or international terrorist activities.
counterintelligence
Who develops and provides AOR specific training and provide in-transit froces with threat information?
Geographic Combatant Commander (GCC)
An option is an action that can be taken or equipment that can be applied to reduce or eliminate one or more ___
module 7 - risk management considerations vulnerability assessment
Drag and drop each of the following steps in the risk management process to put them in their correct order with the first step on the top and the last step on the bottom.

assets


threats


vulnerabilities


risks

The at risk management process and procedures shall be reviewed at least annually. An at program review, higher headquarters assessment, or a jsiva visit satisfies this annual requirement. what is the normal frequency for higher headquarters assessments?
every third year
Which position is assigned the task of actually writing an AT plan?
Installation or self-supported facility ATO
The dod and usaf define terrorism as the ___ use or threat of unlawful violence to instill fear?
calculated
AT planning is critical to deterrence detection defense and ___
response to terrorist incidents
the systematic assessment of the at program against standards prescribed by dod instruction 2000.16 requires a comprehensive at program review be conducted to evaluate the effectiveness and adequacy of the program. during this at program review which of the following areas must be evaluated?

Risk management


AT planning


training and exercise

The dod and usaf defines terrorism as the intention to coerce or intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.
true
Who is the af program element monitor (PEM) for the af at program?
Af/a7sx
Who will determine the appropriate FPCON level?
Commander assigned AT responsibility
family members that are ___ years or older traveling beyond conus on official business, shall receive level 1 at awareness training as part of their pre departure requirements
14
What document provides detailed information to assist in managing AT elements or activities?
DoD O-2000.12-H
___ includes focused information on potential terrorist threats and guidance on the development of tailored AT planning?
AOR-Specific Training for DoD Personnel and In-transit Forces
Which of the following plans contain command-specific guidance for the establishment of an Anti terrorism program and the implementation of antiterrorism standards?
Antiterrorism Plan
which of the following is not an element of the risk management process?
asset assessment
What helps to overcome the challenges created when different units from different commands with different missions are assigned to support the Joint Forward Operating Base's force protection mission?
Unity of Command
iaw dod instruction 2000.16, a __ assessment, addresses the effect of temporary or permanent loss of key assets or infrastructures on the installation or a unit's ability to perform its mission
criticality
the dbt does not provide a rational basis for making and justifying potentially expenise decisions, designing the security system, and evaluating the adequacy of the security system.
false
Which group is not required to have a charter?
TIFC
CAs shall provide the basis for identifying those assets that require specific protective ___ and ___ for resource allocation when developing and updating the AT plan.
measures and priorities
What Anti Terrorism group's purpose is to develop and refine terrorism threat assessments and coordinate and disseminate threat warnings reports and summaries?
Antiterrorism Working Group (ATWG)
no specific threat information equals an absence of threat
false
the ta matrix establishes a range of specific weapons and tactics
true
the small size of terrorist groups, their mobility, and training in CI and security measures are some of the factors that complicate ___ and ___ collection and operations.

intelligence


counterintelligence

a criticality assessment also examines the cost of recovery and constitution including time, funds, capability, and infrastructure support
true
the ___ assures that the integrated defense risk management process considers the most current data regarding the threat and operating environments.
module 6 - working groups, committees, and operation centers
dod instruction 2000.16 standard 5 requires a ca to identify classify and prioritize mission-essential assets, resources, and personnel critical to dod mission success
true
msharpp focuses mainly on the threat to the situations, activities, capabilities, and resources on an installation that are vulnerable to a terrorist attack.
true
the infocon system applies to both the nipr and sipr nets.
true
standard 6 - terrorism va, requires that terrorism vas be conducted for any personnel designated as high risk personnel (hrp). these assessment are referred to as a ___

Personal Security Vulnerability Assessments

the proactive and reactive aspects of force protection are divided into four significant elements. which of the following are included in the four elements?

- physical security


- weapons effect mitigation


threat- vulnerability, and risk analysis

the overriding concept of antiterrorism vulnerability reduction is to focus on two broad areas.

- substantially mitigating the effects of a terrorist attack.


- preventing a terrorist incident from occurring.



risk management is defined as the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost.
true
building system design consists of which of the following considerations.

signage


circulation


space planning

one of the hhq team objectives is to assist the ___ commander in meeting the at/fp responsibilities
installation
servicing ___ detachments will provide a threat assessment for any to the supported installation
Air force office of special investigations
from the information derived from all assessments, the ___ will make a decision on how best to employ given resources and force protection measure to deter, mitigate, or prepare for a terrorist incident.
Installation Commander
activities involving hazardous, toxic, and/or explosive materials that should be isolated from other activities fall under which type of consideration
industrial safety and hygiene
site specific fpcon measures are designed for unique requirements of an installation or mission. each functional commander should develop and it can be base-wide or facility specific
true
units must have the ability to improvise in a ___ environment
tactical
when determining assets and threats, the same considerations should be given to the systems approach in the ___ environment as when in the cantonment area
tactical
click on the correct afi that is used to assist with the planning of installation vehicle inspection areas
AF 10-2401
the ato and ___ are responsible for ensuring the application of the commander's guidance
module 14 - at considerations in contracting
dod instruction 2000.16 and afi 10-245, standard 16 requires that a personnel security vulnerability assessment (osva) be completed for each person who is an 0-6 or above.
module 13
in cvamp if you are assigned the system administrator, commander, and assessors permissions you have full control of the program.
module 15 - CVAMP
a key element of a barrier plan should identify owner/users tasked with erecting barriers and ___
specified time periods
funds must be obligated within ___ days
module 15 - CVAMP


afi 10-245 is an air force instruction that implements the instructions in dodi 200.12 and dodi 2000.16
true
when integration an at plan with base defense plans, the new plan should be seamless in requirements and application
module 10
what did terrorists use to attack the uss cole
bomb-laden boat
what happened to brigadier general james dozier and where did it take place

kidnapped while in


his home

timothy mcveigh and terry nichols were convicted for which terrorist bombing
Murrah federal building in Oklahoma city
select the all the fundamental functions of the af lessons learned process

tracking


collection


dissemination


validation

cvamp provides the means to organize and manage ___ identified during an assessment
vulnerabilities
as part of your emergency evacuation plan, always post evacuation rally points on maps. it allows assigned personnel to quickly locate their rally point during an emergency
false
the DoD and USAF define terrorism as the ___ use or threat of unlawful violence to instill fear.
calculated
which document provides detailed information to assist in managing AT element/activities
Dod O-2000.12-H
Which level of AT training is designed to prepare ATOs to manage AT programs, advise the commander on all AT issues, and qualify individuals to administer AT awareness training?
Level II
Which level of AT training provides senior military and civilian executive leadership with the requisite knowledge to enable development of AT Program policies and facilitate oversight of all aspects of AT programs at the operational and strategic levels?
Level IV
Which funding source is the PRIMARY means for combatant commanders to react to unforeseen requirements from changes in a terrorist threat, threat levels, antiterrorism doctrine and standards, as well as unanticipated requirements identified as a result of vulnerability assessments, tactical operations, and exercising AT plans?
CCIF
in accordance with trainining and exercise standards, AT exercise documentation must be maintained for no less than ___ to ensure incorporation of lessons learned
2 years
antiterrorism is a/an ___ responsibility and must be thoroughly integrated into every unit attached to the installation, to include tenants, sister services, and attached agencies
installation commander's
in the joint environment, the ___ is responsible for base force protection and security operations,
joint forward operating base commander

which antiterrorism groups purpose is to develop and refine terrorism threat assessments and coordinate and disseminate threat warnings, reports and summaries?
TWG
which antiterrorism groups membership includes: the ato, commander, members of the staff, tenant unit representatives, appropriate representation from direct-hire, contractor, local, state, federal, and hot-nation law enforcement agencies and the intelligence community?
TWG
which antiterrorism group meets at least semi-annually and acts upon recommendations of the ATWG and TWG?
ATEC
The purpose of the ___ is to develop and refine AT program guidance, policy, and standards, act upon recommendations of the ATWG and TWG and determine resource allocation priorities to mitigate or eliminate terrorism-related vulnerabilities?
ATEC
Which antiterrorism group's charter should be developed to describe member responsibilities, minimum functional and SME participation?
ATWG
The MSG commander chairs the ___
EMWG
The ___ leverages information and intelligence to support the timely identification of indicators and warnings of emerging localized threats.
IFC
The ___ assures that the IDRMP considers the most current data regarding the threat and operating environments.
IFC
essential members of the base defense operations center (BDOC) include representatives from all of the units below EXCEPT ___
Transportation
How many emergency support functions are located in the emergency operations center?
Fifteen
the primary focus of the crisis action team is ___
Mission Continuation
Collectively, the threat analysis, intelligence, and counterintelligence provides priority information requirements to identify potential terrorist targets based on existing knowledge of an organization
true
Select the terrorist threat information source(s) that fall under the department of defense

combatant commands


intelligence center/J-2


dia -- JITF-CT

Terrorist threat information sources can include open source materials such as the internet, books and studies, newspaper and periodicals.
true
From the list below, select all that are individual components of the TA matrix

tactic


weapon


threat priority


delivery method

From the list below, select the three that are hazard categories

natural


cyber


accidents

___ is a system of countermeasures protecting assets and includes the aggressor tactics and the associated weapons, explosives, tools, and agents
UFC 4-020-01
IAW dod directive 2000.12, a ___ asset is any facility, equipment, service, or resource considered essential to dod operations in peace, crisis, and war; warranting measures and precautions to ensure its continued efficient operation, protection from disruption, degradation or destruction, and its timely restoration.
critical
Critical assets may also be private assets, that if lost would seriously disrupt dod operations
true
CAs are also conducted on ___ assets such as high population facilities and mass gathering activities
non-mission essential
DoD instruction 2000.16, standard 5 requires CAs be updated at least every two years to determine the degree of asset critivality
false
Some of the goals for conducting a CA are:
A, B, C, D
The purpose of the CA process is to identify and prioritize all assets on an installation. Assets include personnel, equipment, stockpiles, buildings, recreation areas, or transportation systems.
true
The purpose of a CA matrix is to determine the vulnerability of security operations on an installation
false
The ___ provides the commander with a tool to assess the potential vulnerabilities of an installation, unit, exercise, port, ship, residence, facility, or other site.
vulnerability assessment
vulnerabilities fall into which three of the following categories

vulnerabilities


options


observations

The three categories of observations are concern, positive, and neutral
true
An option is an action that can be taken or equipment that can be applied to reduce of eliminate one or more ___
vulnerabilities
Standard 6 -- Terrorism VA, requires that the assessment be conducted and updated at least ___ or more frequently if the terrorist threat assessment or mission requirements dictate.
annually
Upon completion of a Vulnerability Assessment, standard 6 requires that the CVAMP database be populated with the results within ___ days
90
A terrorism vulnerability assessment must be conducted for any event or activity determined to be a special event attended by ___ or more DoD personnel.
300
Deploying commanders shall implement appropriate ___ to reduce risk and vulnerability before and after deployment
antiterrorism measures
The installation ATO conducts a VA using key antiterrorism working group members in a collaborative effort as the assessment team
true
The operations readiness specialist is responsible for assessing the water supply and distribution systems to determine their vulnerability to waterborne contamination
false
When conducting a VA, you must step outside of your usual role and think like a/an ___
terrorist
The core VA management program is an automated and web-based means of managing a command's vulnerabilities and associated funding requirements
true
___ is covered in the CARVER method and should be used as a criterion for vulnerability
criticality
Security resources and measures are applied to ___ and to deter, detect, defend, and defeat the threat.
mitigate risks
who has authority to determine acceptable risk
installation commander
risk = criticality x threat x vulnerability
true
risk avoidance integrates the process of assessing the threat, the vulnerabilities, and the value of the asset to the owner. It also weighs the risk of compromise/loss against the cost of security practices
false
it is important to note that the asset RA table is meant to be an exact science. it is the only method of quantifying risk
false
the one method of reducing risk that is controllable is reducing the ___
Vulnerability
An action taken or a physical entity used to reduce or eliminate one or more vulnerability, threat, or impact is a ___
countermeasure
Which of the following titles is "a chairman of the joint chiefs of staff approved program standardizing the department's identification, recommended preventive actions, and responses to terrorist threats against U.S. personnel and facilities. the system is the primary means for a commander to apply an operational decision on how to protect against terrorism
FPCON
Commanders at all levels shall set local FPCONs
true
Random antiterrorism measures are FPCON measures selected from higher measures which are randomly implemented during lower FPCONs
true
Threat levels define the degree of threat; FPCONs define security measures to protect against that threat
true
The ___ system provides a framework of prescribed ___ and cycles necessary for reestablishing the confidence level and security information systems for the commander and thereby supporting the entire Global Information Grid

INFOCON


actions

Which two of the following categories are used for vulnerabilities

programmatic


procedural

___ options must be identified in order to develop controls, make decisions, implement controls, supervise, and review
mitigation
Which of the following are mitigation assistance groups

physical security equipment action group


technical support working group


rapid equipping force

Antiterrorism construction standards were developed to identify appropriate and enforceable measures to eliminate further need for countermeasures for possible terrorist attacks
false
barrier plans establish access/entry control points contingencies
true
barrier systems are considered ___ if they require action by personnel or equipment to permit entry
active
barrier systems are considered ___ if their effectiveness relies on their bulk or mass and they have no moving parts
passive
barrier systems are considered ___ if they are permanently installed or if heavy equipment is required to move of dismantle the barriers
fixed
barrier systems are considered ___ if they can be transferred from place to place
movable
during contingency operations, key facilities or missions should be considered for ___ and visual assessment
electronic detection
An AT plan is not complete unless it is ___ and ___

signed


exercised

conduct comprehensive field and staff training to exercise AT plans at least ___. Ensure AT exercises encompass all aspect of AT and physical security plans
annually
which of the following is not considered a minimum essential element of an AT plan
intelligence support
when the FPCON checklist is linked to the AT plan, the entire document shall be classified at which level
confidential
the at plan must ensure the installation can warn its resident population in affected areas of CBRNE hazard identification immediately, but no longer than ___ minutes after detection
10
Establish ___ or other similarly constructed protocols with the appropriate local, state, and federal, or hot-nation authorities to support AT plan execution, augment incident response, and post-incident consequence management activities
mutual aid agreements
which of the following references is cited as an at planning tool

joint antiterrorism program manager's guide


afm 10-4-1, volume 2, planning formats and guide


joint pub 5-00.2, joint task force planning guidance and procedures

which of the following is/are required annexes when developing a basic AT plan

medical services/forces health protection


intelligence


logistics

The commander is responsible for the development of the AT plan; however, the security forces commander is normally assigned the task of actually writing the plan
false
when developing/writing an AT plan host nation, SOFA and ___ legal considerations must be addressed
jurisdictional
at plans incorporate the terrorist threat into the integrated defense plan
true
when integrating an at plan with integrated defense plans, the new plan should be seamless in requirements and application
true
barrier plans are used to support installation AT plans in all of the following examples, EXCEPT
installation beautification
as part of an effective evacuation plan, ensure that maps are marked with exits, are posted throughout each facility, and that all personnel knows the location of the rally point
true
the six who plotted the 2007 attack on fort dix were part of a home grown terrorist group
false
on which flight on 11 September 2001, did the passengers attempted to retake the airliner during a terrorist takeover
united flight 93
from 18 September 2001 to 9 October 2001 as many as ___ letters containing anthrax were mailed to addresses in Washington D.C. and New York
7
In August of 1998 two US Embassies were bombed. where did these attacks take place
Africa
After which bombing in 1996 did the DoD renew its efforts to improve force protection against terrorism while remaining engaged in the Middle East region.
khobar towers in Saudi arabia
How or why was SPC Edward F. Primental killed
killed for his military ID to enable terrorists to detonate a bomb inside the Rhein-Mein Air Base near Frankfurt
CVAMP is an optional tool used to manage Vulnerability Assessments (VA)
false
Which of the following are roles assignable to a CVAMP user

Commander


ATO


Assessor


System administrator


Resource manager

In CVAMP, the ATO role creates Vulnerability Assessments, observations, and funding requests
true
In CVAMP, if you are assigned the System Administrator, Commander, and Assessors permissions you have full control of the program.
false
CVAMP functionality is determined by your ___
role
In CVAMP, programmatic observations are those that the Commander can write a policy, regulation or anything with his/her signature block to correct the deficiency
false
vulnerability assessments must be entered into CVAMP within how many days of the final report
120
Observations from the final report must be input into CVAMP within 60 days of receipt
true
when submitting a funding request in CVAMP, the assessment must be less than ___ years old
2
funds must be obligated within ___ days
90