We thoroughly check each answer to a question to provide you with the most correct answers. Found a mistake? Tell us about it through the REPORT button at the bottom of the page. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions.
Contents hide
1 AFTP Antiterrorism Level 1 Pre-Test Answers
2 Importance of Antiterrorism Training
3 Understanding Terrorism
3.1 Common Forms of Terrorism
4 Threat Awareness
Overview of AFTP Antiterrorism Level 1 Course:
The AFTP (Air Force Training Program) Antiterrorism Level 1 Course is designed to provide foundational knowledge and understanding of antiterrorism principles.
The course aims to equip individuals with essential skills to identify and respond to potential terrorist threats.
It is intended for all Department of Defense (DoD) affiliated personnel. This includes military service members, civilian personnel, and family members.
The content is divided into several key areas, including the nature of terrorism, threat awareness, antiterrorism measures, emergency preparedness, reporting procedures, and real-world case studies.
AFTP Antiterrorism Level 1 Pre-Test Answers
No. Question Choices Correct Answer
1 True or False: When possible, it is best to always travel with a cell phone. (Antiterrorism Scenario Training, Page 2) [objective25] False, True True
2 True or False: In the event of a skyjacking, you should immediately attempt to subdue the skyjackers. (Antiterrorism Scenario Training, Page 4) [objective24] False, True False
3 True or False: The ticketing area is more secure than the area beyond the security check point. (Antiterrorism Scenario Training, Page 3) [objective12] False, True False
4 Keeping a well-maintained vehicle is considered a “best practice” from both a security and safety perspective. True or False? (Antiterrorism Scenario Training, Page 2) [objective13] False, True True
5 True or False: Internet acquaintances can pose a security threat and should be carefully monitored. (Antiterrorism Scenario Training, Page 5) [objective22] True, False True
6 Force Protection Condition DELTA means that your base is at which one of the following? (Introduction to Antiterrorism, Page 10) [objective3] The least increased level of protection, The most increased level of protection, A medium level of protection The most increased level of protection
7 Which of the following is NOT a recommended response to an active shooter incident? (Antiterrorism Scenario Training, Pages 3 and 4) [objective9] Look for a place to hide or an area that can be barricaded, Look for possible escape routes from the area, Find something solid to dive behind, Provide instructions to arriving emergency response personnel, If necessary, actively resist the perpetrator Provide instructions to arriving emergency response personnel
8 Which one of the following is NOT an early indicator of a potential insider threat? (Antiterrorism Scenario Training, Page 3) [objective8] Anti-American statements asserting that US policy and authority is illegitimate, Abnormal mood swings, depression, and suicidal remarks, Aggression or threats toward co-workers, Presence of unauthorized weapons, A reasonable disagreement with a US Government policy A reasonable disagreement with a US Government policy
9 Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Antiterrorism Scenario Training, Page 1) [objective11] None of these answers, Political events, Sporting events, Places of religious association, Public infrastructure None of these answers
10 True or False: Terrorists usually avoid tourist locations since they are not DOD-related. (Antiterrorism Scenario Training, Page 1) True, False False
11 Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting. True or False? (Antiterrorism Scenario Training, Page 2) [objective10] False, True True
12 Select all factors that are ways in which you might become the victim of a terrorist attack. (Introduction to Antiterrorism, Page 4) [objective2] Opportunity, Predictability, Location, Association All
13 Alerts from the National Terrorism Advisory System apply only to the United States and its possessions. (Introduction to Antiterrorism, Page 12) [objective4] True, False True
14 Electronic audio and video devices are never used by terrorists for surveillance purposes. True or False? (Antiterrorism Scenario Training, Page 4) [objective6] True, False False
15 True or False: The initial moments of a hostage taking incident can be extremely dangerous. (Antiterrorism Scenario Training, Page 2) [objective27] True, False True
16 Which of the following is NOT an Antiterrorism Level I theme? (Antiterrorism Scenario Training, Page 2) [objective5] Report and Respond, Counter-surveillance, Don’t be a Target, Be Vigilant, Anticipate Counter-surveillance
17 Persons who have been given access to an installation can be counted on to be of no threat. True or False? (Antiterrorism Scenario Training, Page 3) [objective7] True, False False
18 True or False: Room invasions are a significant security issue for hotels located in CONUS. (Antiterrorism Scenario Training, Page 1) [objective26] True, False True
19 True or False: In an active shooter incident involving firearms you should immediately lie on the ground. (Antiterrorism Scenario Training, Page 2) [objective21] True, False False
20 True or False: From a security perspective, the best rooms are directly next to emergency exits. (Antiterrorism Scenario Training, Page 3) [objective14] False, True False
21 From the following choices, select the factors you should consider to understand the threat in your environment. (Introduction to Antiterrorism, Page 3) [objective1] Are terrorist groups in the area?, How sophisticated are terrorist groups?, What tactics and weapons are used by terrorist groups?, Will local citizens warn Americans about terrorist groups?, Are terrorist groups violent?, Are terrorist groups predictable?, Do terrorist groups attack Americans?, How active are terrorist groups? All
22 True or False: Everyone on an installation has shared responsibility for security. (Antiterrorism Scenario Training, Page 2) [objective19] False, True True
23 IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment. True or False? (Antiterrorism Scenario Training, Page 3) [objective28] True, False True
24 Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident. (Antiterrorism Scenario Training, Page 4) [objective20] False, True True
25 What should you NOT do during a hostage rescue attempt? (Antiterrorism Scenario Training, Page 4) [objective15] Remain still and low to the ground, Expect to be handcuffed and detained by hostage rescue team, Try to assist hostage rescue team, Encourage others around you to remain calm, Follow instructions of hostage rescue team Try to assist hostage rescue team
26 Early symptoms of a biological attack may appear the same as common illnesses. True or False? (Antiterrorism Scenario Training, Page 2) [objective16] True, False True
27 True or False: Security is a team effort. (Antiterrorism Scenario Training, Page 6) [objective17] False, True True
28 True or False: Surveillance can be performed through either stationary or mobile means. (Antiterrorism Scenario Training, Page 3) [objective18] True, False True
29 Which of the following is NOT a useful vehicle feature from a security perspective? Air bags, Power locks, Power windows, Internal hood release lever, Lock on gas cap Air bags
30 If you identify a possible surveillance attempt you should try to handle the situation yourself. (Antiterrorism Scenario Training, Page 2) True, False False
31 Which one of these does NOT pose a risk to security at a government facility? (Antiterrorism Scenario Training, Page 2) A person found in an inappropriate location of the facility, Inattentive guard personnel, A visitor showing an unusual interest in details of security procedures, An “escort required” visitor found without an escort, A person expressing boredom with the US mission A person expressing boredom with the US mission
32 True or False: Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom. (Antiterrorism Scenario Training, Page 1) True, False True
33 Which one of these is a possible indicator of a suspicious letter or package? (Antiterrorism Scenario Training, Page 4) Misspellings of common words, Correct amount of postage, Mailing address providing a complete and correct name, Evenly distributed and well balanced parcel, A return address that matches the postmark Misspellings of common words
34 Which one of these is NOT a physical security feature you should check when inspecting your hotel room? (Antiterrorism Scenario Training, Page 4) Operational telephone, Functioning locks on doors and windows, Proximity of room to emergency exits, Lockbox or safe, Whether or not the door is solid Lockbox or safe
35 What is NOT a physical security measure for your home? (Antiterrorism Scenario Training, Page 2) Hiding a key outside to ensure family members can get in if they lose their keys, Monitoring Internet acquaintances of all family members, Confirming that a cleaning company is reliable and licensed, Changing locks to ensure key control, Having good relations with neighbors and looking out for each other Hiding a key outside to ensure family members can get in if they lose their keys
36 True or False: Active resistance should be the immediate response to an active shooter incident. (Antiterrorism Scenario Training, Page 4) True, False False
Importance of Antiterrorism Training
Antiterrorism training is crucial for ensuring the safety and security of individuals, groups, and institutions affiliated with the DoD. In the face of evolving global security challenges, understanding the threat of terrorism is essential. The training helps to build a culture of vigilance, awareness, and readiness to respond to potential threats.
It aids in the prevention and mitigation of terrorist activities by providing the tools to recognize suspicious behaviors, manage risks, and act appropriately in case of a terrorist incident.
Furthermore, the training underscores the role that each individual plays in the collective security of the DoD and the nation as a whole.
Understanding Terrorism
Terrorism is typically defined as the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims. It can also be described as a strategy of coercion that involves the spread of fear, disruption, and violence, initiated for political, religious, or ideological goals. It’s important to note that definitions of terrorism can vary slightly among different organizations and legal systems.
Terrorism as a tactic has been employed throughout history, from the Zealots of the first century AD to the Anarchist movement of the 19th century.
More recent examples of terrorist groups include Al-Qaeda responsible for the 9/11 attacks, the Irish Republican Army (IRA) active in the late 20th century, and ISIS, which declared a caliphate in portions of Syria and Iraq.
These historical instances demonstrate that terrorism is not limited to any one region, belief system, or time period and can manifest differently depending on the context.
Terrorist Goals and Tactics:
While specific objectives can vary greatly among terrorist groups, common goals often include political change, destabilization of an existing power structure, or bringing attention to a cause.
Terrorist tactics are usually characterized by surprise attacks on civilian targets. These tactics aim to create a climate of fear that can lead to overreactions from the targeted government or population, furthering the terrorists’ goals.
Tactics can include bombings, shootings, hostage-taking, cyber attacks, and even the use of vehicles as weapons.
Common Forms of Terrorism
There are several types of terrorism, including domestic terrorism (occurring primarily within the territorial jurisdiction of the home country), international terrorism (transcending national boundaries), and state-sponsored terrorism (supported by national governments).
Other forms include religious terrorism (motivated by religious ideologies), eco-terrorism (violence in the interests of environmentalism), and cyber terrorism (use of computers and the Internet to commit violent acts that harm or kill).
Each form of terrorism presents its own unique set of threats and requires a nuanced approach for prevention and response.
Threat Awareness
Identifying Potential Threats:
Identifying potential threats involves being aware of one’s environment, both physical and digital, and being vigilant for signs of potential terrorist activity.
Threats can come in various forms, including suspicious individuals, unattended packages, vehicles, or unusual activities.
It’s also important to consider the online landscape, such as the spread of extremist ideologies on social media, or cyber threats targeting critical infrastructure.
Understanding Threat Levels:
Threat levels provide a means of communicating the risk of a terrorist attack to the public and law enforcement agencies.
These levels can range from low (an attack is unlikely) to critical (an attack is expected imminently), and are typically set by government security agencies based on the current intelligence picture.
Understanding threat levels can help individuals and organizations take appropriate security measures and stay vigilant.
Recognizing Suspicious Behaviors and Activities:
Suspicious behaviors can range from a person showing unusual interest in critical locations (e.g., power plants, bridges, government buildings), to unusual purchases (e.g., large quantities of fertilizer, chemicals, or suspiciously obtained police or military equipment).
Suspicious activities can also include unscheduled deliveries, abandoned vehicles, or unusual patterns of travel.
Cyber activities such as frequent visits to extremist websites, online posts supporting violent actions, or attempts to gather sensitive information can also signal potential threats.
Recognizing these behaviors and activities can aid in reporting and preventing possible terrorist activities.