Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Quizzma Latest Articles

AFTP Antiterrorism Level 1 Pre-Test Answers

Overview of AFTP Antiterrorism Level 1 Course:

  • The AFTP (Air Force Training Program) Antiterrorism Level 1 Course is designed to provide foundational knowledge and understanding of antiterrorism principles.
  • The course aims to equip individuals with essential skills to identify and respond to potential terrorist threats.
  • It is intended for all Department of Defense (DoD) affiliated personnel. This includes military service members, civilian personnel, and family members.
  • The content is divided into several key areas, including the nature of terrorism, threat awareness, antiterrorism measures, emergency preparedness, reporting procedures, and real-world case studies.

AFTP Antiterrorism Level 1 Pre-Test Answers

No.QuestionChoicesCorrect Answer
1True or False: When possible, it is best to always travel with a cell phone. (Antiterrorism Scenario Training, Page 2) [objective25]False, TrueTrue
2True or False: In the event of a skyjacking, you should immediately attempt to subdue the skyjackers. (Antiterrorism Scenario Training, Page 4) [objective24]False, TrueFalse
3True or False: The ticketing area is more secure than the area beyond the security check point. (Antiterrorism Scenario Training, Page 3) [objective12]False, TrueFalse
4Keeping a well-maintained vehicle is considered a “best practice” from both a security and safety perspective. True or False? (Antiterrorism Scenario Training, Page 2) [objective13]False, TrueTrue
5True or False: Internet acquaintances can pose a security threat and should be carefully monitored. (Antiterrorism Scenario Training, Page 5) [objective22]True, FalseTrue
6Force Protection Condition DELTA means that your base is at which one of the following? (Introduction to Antiterrorism, Page 10) [objective3]The least increased level of protection, The most increased level of protection, A medium level of protectionThe most increased level of protection
7Which of the following is NOT a recommended response to an active shooter incident? (Antiterrorism Scenario Training, Pages 3 and 4) [objective9]Look for a place to hide or an area that can be barricaded, Look for possible escape routes from the area, Find something solid to dive behind, Provide instructions to arriving emergency response personnel, If necessary, actively resist the perpetratorProvide instructions to arriving emergency response personnel
8Which one of the following is NOT an early indicator of a potential insider threat? (Antiterrorism Scenario Training, Page 3) [objective8]Anti-American statements asserting that US policy and authority is illegitimate, Abnormal mood swings, depression, and suicidal remarks, Aggression or threats toward co-workers, Presence of unauthorized weapons, A reasonable disagreement with a US Government policyA reasonable disagreement with a US Government policy
9Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Antiterrorism Scenario Training, Page 1) [objective11]None of these answers, Political events, Sporting events, Places of religious association, Public infrastructureNone of these answers
10True or False: Terrorists usually avoid tourist locations since they are not DOD-related. (Antiterrorism Scenario Training, Page 1)True, FalseFalse
11Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting. True or False? (Antiterrorism Scenario Training, Page 2) [objective10]False, TrueTrue
12Select all factors that are ways in which you might become the victim of a terrorist attack. (Introduction to Antiterrorism, Page 4) [objective2]Opportunity, Predictability, Location, AssociationAll
13Alerts from the National Terrorism Advisory System apply only to the United States and its possessions. (Introduction to Antiterrorism, Page 12) [objective4]True, FalseTrue
14Electronic audio and video devices are never used by terrorists for surveillance purposes. True or False? (Antiterrorism Scenario Training, Page 4) [objective6]True, FalseFalse
15True or False: The initial moments of a hostage taking incident can be extremely dangerous. (Antiterrorism Scenario Training, Page 2) [objective27]True, FalseTrue
16Which of the following is NOT an Antiterrorism Level I theme? (Antiterrorism Scenario Training, Page 2) [objective5]Report and Respond, Counter-surveillance, Don’t be a Target, Be Vigilant, AnticipateCounter-surveillance
17Persons who have been given access to an installation can be counted on to be of no threat. True or False? (Antiterrorism Scenario Training, Page 3) [objective7]True, FalseFalse
18True or False: Room invasions are a significant security issue for hotels located in CONUS. (Antiterrorism Scenario Training, Page 1) [objective26]True, FalseTrue
19True or False: In an active shooter incident involving firearms you should immediately lie on the ground. (Antiterrorism Scenario Training, Page 2) [objective21]True, FalseFalse
20True or False: From a security perspective, the best rooms are directly next to emergency exits. (Antiterrorism Scenario Training, Page 3) [objective14]False, TrueFalse
21From the following choices, select the factors you should consider to understand the threat in your environment. (Introduction to Antiterrorism, Page 3) [objective1]Are terrorist groups in the area?, How sophisticated are terrorist groups?, What tactics and weapons are used by terrorist groups?, Will local citizens warn Americans about terrorist groups?, Are terrorist groups violent?, Are terrorist groups predictable?, Do terrorist groups attack Americans?, How active are terrorist groups?All
22True or False: Everyone on an installation has shared responsibility for security. (Antiterrorism Scenario Training, Page 2) [objective19]False, TrueTrue
23IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment. True or False? (Antiterrorism Scenario Training, Page 3) [objective28]True, FalseTrue
24Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident. (Antiterrorism Scenario Training, Page 4) [objective20]False, TrueTrue
25What should you NOT do during a hostage rescue attempt? (Antiterrorism Scenario Training, Page 4) [objective15]Remain still and low to the ground, Expect to be handcuffed and detained by hostage rescue team, Try to assist hostage rescue team, Encourage others around you to remain calm, Follow instructions of hostage rescue teamTry to assist hostage rescue team
26Early symptoms of a biological attack may appear the same as common illnesses. True or False? (Antiterrorism Scenario Training, Page 2) [objective16]True, FalseTrue
27True or False: Security is a team effort. (Antiterrorism Scenario Training, Page 6) [objective17]False, TrueTrue
28True or False: Surveillance can be performed through either stationary or mobile means. (Antiterrorism Scenario Training, Page 3) [objective18]True, FalseTrue
29Which of the following is NOT a useful vehicle feature from a security perspective?Air bags, Power locks, Power windows, Internal hood release lever, Lock on gas capAir bags
30If you identify a possible surveillance attempt you should try to handle the situation yourself. (Antiterrorism Scenario Training, Page 2)True, FalseFalse
31Which one of these does NOT pose a risk to security at a government facility? (Antiterrorism Scenario Training, Page 2)A person found in an inappropriate location of the facility, Inattentive guard personnel, A visitor showing an unusual interest in details of security procedures, An “escort required” visitor found without an escort, A person expressing boredom with the US missionA person expressing boredom with the US mission
32True or False: Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom. (Antiterrorism Scenario Training, Page 1)True, FalseTrue
33Which one of these is a possible indicator of a suspicious letter or package? (Antiterrorism Scenario Training, Page 4)Misspellings of common words, Correct amount of postage, Mailing address providing a complete and correct name, Evenly distributed and well balanced parcel, A return address that matches the postmarkMisspellings of common words
34Which one of these is NOT a physical security feature you should check when inspecting your hotel room? (Antiterrorism Scenario Training, Page 4)Operational telephone, Functioning locks on doors and windows, Proximity of room to emergency exits, Lockbox or safe, Whether or not the door is solidLockbox or safe
35What is NOT a physical security measure for your home? (Antiterrorism Scenario Training, Page 2)Hiding a key outside to ensure family members can get in if they lose their keys, Monitoring Internet acquaintances of all family members, Confirming that a cleaning company is reliable and licensed, Changing locks to ensure key control, Having good relations with neighbors and looking out for each otherHiding a key outside to ensure family members can get in if they lose their keys
36True or False: Active resistance should be the immediate response to an active shooter incident. (Antiterrorism Scenario Training, Page 4)True, FalseFalse

Importance of Antiterrorism Training

Antiterrorism training is crucial for ensuring the safety and security of individuals, groups, and institutions affiliated with the DoD. In the face of evolving global security challenges, understanding the threat of terrorism is essential. The training helps to build a culture of vigilance, awareness, and readiness to respond to potential threats.

It aids in the prevention and mitigation of terrorist activities by providing the tools to recognize suspicious behaviors, manage risks, and act appropriately in case of a terrorist incident.

Furthermore, the training underscores the role that each individual plays in the collective security of the DoD and the nation as a whole.

Understanding Terrorism

Terrorism is typically defined as the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims. It can also be described as a strategy of coercion that involves the spread of fear, disruption, and violence, initiated for political, religious, or ideological goals. It’s important to note that definitions of terrorism can vary slightly among different organizations and legal systems.

Terrorism as a tactic has been employed throughout history, from the Zealots of the first century AD to the Anarchist movement of the 19th century.

More recent examples of terrorist groups include Al-Qaeda responsible for the 9/11 attacks, the Irish Republican Army (IRA) active in the late 20th century, and ISIS, which declared a caliphate in portions of Syria and Iraq.

These historical instances demonstrate that terrorism is not limited to any one region, belief system, or time period and can manifest differently depending on the context.

Terrorist Goals and Tactics:

  • While specific objectives can vary greatly among terrorist groups, common goals often include political change, destabilization of an existing power structure, or bringing attention to a cause.
  • Terrorist tactics are usually characterized by surprise attacks on civilian targets. These tactics aim to create a climate of fear that can lead to overreactions from the targeted government or population, furthering the terrorists’ goals.
  • Tactics can include bombings, shootings, hostage-taking, cyber attacks, and even the use of vehicles as weapons.

Common Forms of Terrorism

  • There are several types of terrorism, including domestic terrorism (occurring primarily within the territorial jurisdiction of the home country), international terrorism (transcending national boundaries), and state-sponsored terrorism (supported by national governments).
  • Other forms include religious terrorism (motivated by religious ideologies), eco-terrorism (violence in the interests of environmentalism), and cyber terrorism (use of computers and the Internet to commit violent acts that harm or kill).
  • Each form of terrorism presents its own unique set of threats and requires a nuanced approach for prevention and response.

Threat Awareness

Identifying Potential Threats:

  • Identifying potential threats involves being aware of one’s environment, both physical and digital, and being vigilant for signs of potential terrorist activity.
  • Threats can come in various forms, including suspicious individuals, unattended packages, vehicles, or unusual activities.
  • It’s also important to consider the online landscape, such as the spread of extremist ideologies on social media, or cyber threats targeting critical infrastructure.

Understanding Threat Levels:

  • Threat levels provide a means of communicating the risk of a terrorist attack to the public and law enforcement agencies.
  • These levels can range from low (an attack is unlikely) to critical (an attack is expected imminently), and are typically set by government security agencies based on the current intelligence picture.
  • Understanding threat levels can help individuals and organizations take appropriate security measures and stay vigilant.

Recognizing Suspicious Behaviors and Activities:

  • Suspicious behaviors can range from a person showing unusual interest in critical locations (e.g., power plants, bridges, government buildings), to unusual purchases (e.g., large quantities of fertilizer, chemicals, or suspiciously obtained police or military equipment).
  • Suspicious activities can also include unscheduled deliveries, abandoned vehicles, or unusual patterns of travel.
  • Cyber activities such as frequent visits to extremist websites, online posts supporting violent actions, or attempts to gather sensitive information can also signal potential threats.
  • Recognizing these behaviors and activities can aid in reporting and preventing possible terrorist activities.

Was this helpful?




Quizzma Team

Quizzma Team

The Quizzma Team is a collective of experienced educators, subject matter experts, and content developers dedicated to providing accurate and high-quality educational resources. With a diverse range of expertise across various subjects, the team collaboratively reviews, creates, and publishes content to aid in learning and self-assessment.
Each piece of content undergoes a rigorous review process to ensure accuracy, relevance, and clarity. The Quizzma Team is committed to fostering a conducive learning environment for individuals and continually strives to provide reliable and valuable educational resources on a wide array of topics. Through collaborative effort and a shared passion for education, the Quizzma Team aims to contribute positively to the broader learning community.

Related Posts