7 Level Vol 2(aircraft Technology)

90 Questions

Settings
Please wait...
7 Level Vol 2(aircraft Technology)

This is CDC's volume 2.   This quiz consist of 90 questions.   you must pass with a score of at least a 95


Questions and Answers
  • 1. 
    The tactical area of responsibility begins at the
    • A. 

      Base defense operations center

    • B. 

      Point o insertion

    • C. 

      Base perimeter

    • D. 

      Resource

  • 2. 
    The primary responsibility of air base defense forces is
    • A. 

      Defeating level I threats, and disruping or delaying level II threats in the tactical area of responsibility surrounding the air base

    • B. 

      Defeating level II threats, and disrupting or delaying level IV threat in the TAOR surrounding the air base.

    • C. 

      Stalling level I threats, and sisrupting o delaying level II threats in the TAOR surrounding the air base

    • D. 

      Defeating level II threats, and disrupting or delaying level I threats in the TAOR surrounding the air base.

  • 3. 
    At a minimum, which two S-functions must operate within the base defense operations center?
    • A. 

      S1 and S3

    • B. 

      S2 and S4

    • C. 

      S2 and S3

    • D. 

      S3 and S4

  • 4. 
    What is the staff make-up for the S3?
    • A. 

      The operations officer and staff

    • B. 

      Supply noncommissioned officer

    • C. 

      First sergeant or section commander

    • D. 

      Intelligence officers and security forces investigators

  • 5. 
    In what way can subordinate joint force commands organize?
    • A. 

      By rank and function

    • B. 

      By function and location

    • C. 

      By service component or function

    • D. 

      By service component and location

  • 6. 
    The primay mission of a joint operation is
    • A. 

      Lead host nation forces in defending and securing the rear area

    • B. 

      Sustain the campaign and major operations of the joint force

    • C. 

      Disaster relief operations

    • D. 

      Humanitarian operations

  • 7. 
    When terrorists attack DOD affiliated personnel and facilities, what is their mission?
    • A. 

      Determine which other countries support their beliefts

    • B. 

      Ensure state funding would continue to finance cause

    • C. 

      Destroy as much property as possible in a short period

    • D. 

      Persuade US and/or foreign governments to chance their policies

  • 8. 
    A terrorist grup that generally operatss independently of , but receives support from, on or more governments is
    • A. 

      Non-state supported

    • B. 

      State-supported

    • C. 

      Stated-directed

    • D. 

      State-organized

  • 9. 
    A typical organization of a terrorist group consist of
    • A. 

      Group leader, intelligenc officer, explosive specialist, and weapons specialist

    • B. 

      Hard-core leadership, active cadre, active support, and passive support

    • C. 

      Hard-core cadre, submissive support, inactive leadrs, and low suppport

    • D. 

      Intelligence officer, inactive leaders, and active cadre

  • 10. 
    Generally, specially trained terrorists are of abover average intelligence and between the ages of
    • A. 

      16-24

    • B. 

      21-28

    • C. 

      23-30

    • D. 

      25-32

  • 11. 
    When are terrorist team members brought toegher for final rehearsal?
    • A. 

      Before execution of attack

    • B. 

      Just before departing for the target sight

    • C. 

      One week prior to schduled attack exectuion

    • D. 

      Never; terrorist team members do not conduct rehearsals.

  • 12. 
    The tactic most commonly used by terrorist groups is
    • A. 

      Arson

    • B. 

      Bombing

    • C. 

      Hijacking

    • D. 

      Assassination

  • 13. 
    The USAF antiterrorism program is designed around what three principles?
    • A. 

      State department intelligence assessments, threat levels, and threat conditions

    • B. 

      Force protection conditions, assessment factors, and threat levels

    • C. 

      Intelligence gathersing, threat level, and THREATCONSs

    • D. 

      Criminal threat, FPCONs, and the CARVER matrix

  • 14. 
    What factor is the stated desire or history of terrorist attacks against US interets?
    • A. 

      Activity

    • B. 

      Intentions

    • C. 

      Operational capability

    • D. 

      Operating environment

  • 15. 
    Our first line o defense against intelligence collection efforts is
    • A. 

      Communication security

    • B. 

      Computer security

    • C. 

      Information security

    • D. 

      Operations security

  • 16. 
    The primary purpose of the operations security program is to
    • A. 

      Support the OPSEC non commissioned officer-in-charge by ensuring the command or oragnization actively practices OPSEC.

    • B. 

      Support the wing commander by ensuring the command or organization has an OPSEC program

    • C. 

      Support the commander by ensuring the command or organization actively practices OPESEC

    • D. 

      Prevent our communications from fallig into the wrong hands

  • 17. 
    When should commanders and planners identify mission-critical information?
    • A. 

      At the earliest possile moment

    • B. 

      Only after the subordinate commanders have been notified

    • C. 

      Only after the review and approval from higher-head quarters commanders

    • D. 

      Never; commanders and planners should not have to identify and any critical information.

  • 18. 
    Which threat spectrum level consits of small tactical units, unconventional warfare forces, and guerrillas?
    • A. 

      I

    • B. 

      II

    • C. 

      III

    • D. 

      IV

  • 19. 
    Which threat level I activity is identified by random acts against targets of opportunity?
    • A. 

      Partisans

    • B. 

      Terrorists

    • C. 

      Sympathizers

    • D. 

      Agent activity

  • 20. 
    Missions that primarilyy target nuclear weapons-related facilities are what threat spectrum levels?
    • A. 

      IV

    • B. 

      III

    • C. 

      II

    • D. 

      I

  • 21. 
    Which threat level uses doctrine that stresses the use of battalion-size units to conduct helicopter insertions to a depth of 50 kilometers?
    • A. 

      I

    • B. 

      II

    • C. 

      III

    • D. 

      IV

  • 22. 
    What group routinely manages the risk assessment process fro commanders?
    • A. 

      Force protection working

    • B. 

      Anti-terrorism working

    • C. 

      Physical security

    • D. 

      Threat working

  • 23. 
    Compliling and examining all available information concerning potential threats by threat analysts is a/an
    • A. 

      Annual process

    • B. 

      Bi-annual process

    • C. 

      Monthly process

    • D. 

      Continual process

  • 24. 
    What assesment addresses the broad range of physical threats to the security of personnel and assets, and should be conducted periodically?
    • A. 

      Risk

    • B. 

      Threat

    • C. 

      Vulnerability

    • D. 

      Anti-terrorism

  • 25. 
    The key to force protection countermeasure planning is
    • A. 

      The classified protection plan

    • B. 

      Protecting sensitive information

    • C. 

      The offensive force protection plan

    • D. 

      The defensive force protection plan

  • 26. 
    The capability to reduce the capability of attacking forces and reconnaissance assets through the principles of hide, blend, disguise, and decoy to protect friendly assets and aim points with mateials and equipment that alter or obscure part of al of their multispectral signatures is
    • A. 

      Cover, camouflage, and deception

    • B. 

      Concealing camouflage deceitfully

    • C. 

      Deceptive camouflage concealment

    • D. 

      Camouflage, concealment, and deception

  • 27. 
    To modify to prevent recognition of the true identiy of character of an asset or activity is to
    • A. 

      Hide

    • B. 

      Blend

    • C. 

      Decoy

    • D. 

      Disguise

  • 28. 
    The political-military nature of military operations other than war requires you to coordinate your activities
    • A. 

      Through the department of state, drug enforcement agency, and immigration and naturalization service

    • B. 

      With a number of government and civilian agencies outside the depatment of defense

    • C. 

      Through the red cross, red crescent, and cooperative for assistance and relief everywhere

    • D. 

      Through the joint rear area commander

  • 29. 
    Military operations other than war missions do not include
    • A. 

      Quarantine

    • B. 

      Peacekeeping

    • C. 

      Clandestine infiltration

    • D. 

      Humanitarian assistance

  • 30. 
    Which millitary operations other than war principle never permeis hostile factions to acquire a military, political, or infomational advantage?
    • A. 

      Unity of effort

    • B. 

      Objective

    • C. 

      Restraint

    • D. 

      Security

  • 31. 
    As a total force organization, a typical air and space expeditionary force is responsive and capable of
    • A. 

      Full spectrum of air and space domination

    • B. 

      Deploying to multiple geographic locations simultaneously

    • C. 

      Deploying to conduct broad range operations with minimum warning time

    • D. 

      Supporting multi-national forces under the control of host nation commanders

  • 32. 
    What is the time limit for an air and space expeditionary force package to respond to any unexpected contingency?
    • A. 

      12 hours

    • B. 

      24 hours

    • C. 

      48 hours

    • D. 

      72 hours

  • 33. 
    What does securiy forces provide for the integrated base defense concept?
    • A. 

      Support

    • B. 

      Foundation

    • C. 

      Tactical operation

    • D. 

      Retrograde ooperations

  • 34. 
    Based on the integrated base defense concept of operations, what are all airmen cosidered?
    • A. 

      Detectors

    • B. 

      Monitors

    • C. 

      Fighters

    • D. 

      Sensors

  • 35. 
    Which essential element of the integrated base defense concepts slows the enemy whithout the need or a massive response at the outset of an engagement?
    • A. 

      Antcipate

    • B. 

      Detect

    • C. 

      Delay

    • D. 

      Deny

  • 36. 
    What does the risk management process llow the commander to determine?
    • A. 

      Countermeasures options

    • B. 

      If reassessments and ollow ups are needed

    • C. 

      Whether to introduce risk management process raining

    • D. 

      If there is a need to maximize live-fire training on full impact ranges

  • 37. 
    An expeditionary military force is defined as a force that conducts military operations
    • A. 

      Within 24 hours of notification in response to a crisis with forces tailoed to achieve limited and clearly stated objectives

    • B. 

      On short notice in response to crises with forces tailored to achieve limited and clearly stated objectives

    • C. 

      On short notice in response to crises with forces tailored to achieve unlimited and unclear objectives

    • D. 

      Within 72 hours in response to crises with forces tailored to achieve limited and clearly stateed objectives

  • 38. 
    What does the air force maintain to support the on-call air and space expeditionary force, as well as on-call lead wings to open expeditionary bases?
    • A. 

      Two bomber group leads

    • B. 

      Three BGL's

    • C. 

      Four BGL's

    • D. 

      Five BGL's

  • 39. 
    The key to potimizing peacetime participation of the traditional guardsman and reservists whomust balance military duties wit full-time ivilian employment is
    • A. 

      Predictability

    • B. 

      Flexibility

    • C. 

      Mobility

    • D. 

      Stability

  • 40. 
    Since unit type codes are functionally grouped, what will all security forces UTCs have as a designator?
    • A. 

      UT

    • B. 

      FP

    • C. 

      AT

    • D. 

      QF

  • 41. 
    When the need for a new unity type code or a major change in an exiting UTC is required, who may initiate the action for the change?
    • A. 

      Any level

    • B. 

      Unit level

    • C. 

      Major command level

    • D. 

      Air staff level only

  • 42. 
    What is the list of all unit type codes approved for use in planning?
    • A. 

      Air force unit tasking document

    • B. 

      Air force-wide unit type code roster

    • C. 

      Air expeitionary unit tasking summary sheet

    • D. 

      Air force-wide unit type code availability system

  • 43. 
    Directing your operaion toward a defined and attainable objective that contributes to operational and tactical claim is what principle of war?
    • A. 

      Maneuver

    • B. 

      Offensive

    • C. 

      Objective

    • D. 

      Mass

  • 44. 
    Avoiding unnecessary complexity in norganizing, preparing, planning, and conductging military operations is what principle of war?
    • A. 

      Unity of command

    • B. 

      Simplicity

    • C. 

      Objective

    • D. 

      Offensive

  • 45. 
    Commanders do not use rules of engagement to ensure operations
    • A. 

      Follow the rule of law

    • B. 

      Meet manning standards

    • C. 

      Follow national policy goals

    • D. 

      Follow mission requirements

  • 46. 
    Guidance on the application of force and exercising of the inherent right and oblligation of self-defense is the purpose of the
    • A. 

      United nations

    • B. 

      Geneva convention

    • C. 

      Joint force commander's directives

    • D. 

      US military's standing rules of engagement

  • 47. 
    What is one of the fundamental purposes of the law of armed conflict?
    • A. 

      Prevent unnecessary suffering

    • B. 

      Prevent use of political influence

    • C. 

      Maintain a well-defined military plan

    • D. 

      Provide equal representation of all combatants

  • 48. 
    What is the key elment in the design of forces that should be paramount to plannerrs?
    • A. 

      Sustainability

    • B. 

      Attainability

    • C. 

      Flexibility

    • D. 

      Simplicity

  • 49. 
    What unit type code is a r person team designed to provide 24 hour security forces augmentation to immediate headquarters for ground defense and weapons systems security functions?
    • A. 

      QFDB9

    • B. 

      QFEBA

    • C. 

      QFEBB

    • D. 

      QFEBD

  • 50. 
    What unit type code , when deployed with UTCs QFEBB and QFEBS, provides HQ staff support for a medium to large deployed security forces unit?
    • A. 

      QFEBU

    • B. 

      QFEPR

    • C. 

      QFFPF

    • D. 

      QFEBA

  • 51. 
    What unit type code is composed of one home station validated explosive detection dog and an assigned handler?
    • A. 

      QFEBM

    • B. 

      QFEBN

    • C. 

      QFEBP

    • D. 

      QFEBR

  • 52. 
    What unit type code consists of a 3 person team of specially trained and equipped security forces personnel, who deply as mission essential ground personnel on airlift transiting or operating ou of high risk locations?
    • A. 

      QFEBU

    • B. 

      QFEPR

    • C. 

      QFFPF

    • D. 

      QFFPG

  • 53. 
    During peacetime operation, what unit type code would provide the initial security for USAF resources and personnel, conduct convoys; and defend local and other security missions as required?
    • A. 

      QFEB2

    • B. 

      QFEB3

    • C. 

      QFEB4

    • D. 

      QFEB5

  • 54. 
    What unit type code is ssential to direct the fire of and provide support for the mortar teams?
    • A. 

      QFEBK

    • B. 

      QFEBR

    • C. 

      QFEBJ

    • D. 

      QFERT

  • 55. 
    What pre deployment factor is considered a constant?
    • A. 

      Weather

    • B. 

      Treaties

    • C. 

      Inteligence

    • D. 

      Political climate

  • 56. 
    How long are the majority of security forces unit type codes capable of existing without support?
    • A. 

      5 days

    • B. 

      7 days

    • C. 

      14 days

    • D. 

      30 days

  • 57. 
    What is a base already possessing resources and an established infrastructure?
    • A. 

      Bare base

    • B. 

      Standy base

    • C. 

      Main operating base

    • D. 

      Collocated operating base

  • 58. 
    What operations are key to assembling an accurate picture of the battle space?
    • A. 

      Ground defense

    • B. 

      Clandestine

    • C. 

      Intelligence

    • D. 

      Aerial

  • 59. 
    Fixed ases having well estalished perimeters usually have limited
    • A. 

      Depth

    • B. 

      Intelligence

    • C. 

      Denial capabilities

    • D. 

      All around defense

  • 60. 
    What two factors add depth to the battle outside the perimeter, allowing the base to continue its primary mission with minimal interference?
    • A. 

      Counter reconnaissance and counter attack

    • B. 

      Counter espiionage and counterattack

    • C. 

      Counterattack and counter resistance

    • D. 

      Counter defense and counterattack

  • 61. 
    What is not an example of a routine in defense measure?
    • A. 

      Personal hygiene, sanitation, rest, relieft, and rotation

    • B. 

      Area of operation policing for cleanliness

    • C. 

      Weapons maintenance and cleaning schedules

    • D. 

      Assign sectors of fire.

  • 62. 
    What should always be your first priority of work?
    • A. 

      Establish local security

    • B. 

      Emplace obstacles and mines

    • C. 

      Prepare primary fighting positions

    • D. 

      Mark or improve marking for target reference points

  • 63. 
    What should the drense force commander consider in the sectorization scheme to provide maimum protection for base critical resources?
    • A. 

      The entire base tactical boundary

    • B. 

      The entire air base defense plan

    • C. 

      The entire tactical area of responsibility

    • D. 

      The limmiting factors to the defense of the air base

  • 64. 
    When establishing base sectors, you must ensure critical resources and areas are
    • A. 

      Located on unidentifiable terrain

    • B. 

      Split between to sectors

    • C. 

      Evenly grouped

    • D. 

      Camouflaged

  • 65. 
    What would necessitae the need to dig hasty firing positions in the field?
    • A. 

      When you have made contact with the enemy

    • B. 

      When time and materials are not a factor

    • C. 

      When there is ample natural cover

    • D. 

      When aerial strikes are imminent

  • 66. 
    Where is an excellent position to place a marksman in an urban area?
    • A. 

      A scrape out

    • B. 

      A shell crate

    • C. 

      Peak of a roof

    • D. 

      Under a parked vehicle

  • 67. 
    When the machine gun is not assigned to the maneuver element, what is its primary mission?
    • A. 

      Provide covering fire for the assault element

    • B. 

      Its only function is with the maneuver element

    • C. 

      Provide over head fire for maneuvering fire teams

    • D. 

      Lay down covering fire for reconnaissance elements

  • 68. 
    In terms of engagement ranges, machine guns in the base of fire element may find themselves firing at targes within how many meters of the element?
    • A. 

      400

    • B. 

      600

    • C. 

      800

    • D. 

      1,000

  • 69. 
    Proper machine gun placement maximizes fire in
    • A. 

      Area and mass

    • B. 

      Width and depth

    • C. 

      Length and width

    • D. 

      Length and depth

  • 70. 
    What is the main mission of the machine gun?
    • A. 

      To provide a high rate of fire to fight off enemyy attacks

    • B. 

      To protect and defendthrough defensive and offensive missions

    • C. 

      To protect the wounded and criical resources from further injury or destruction

    • D. 

      To provide the most effective firepower again and weapon the enemy can attack with

  • 71. 
    What does not need to be shown on a sketch?
    • A. 

      Observation post/ listening post locations and patrol routes, if any

    • B. 

      Maximum engagement lines for the light anti-tank weapons

    • C. 

      Mines, sensors, and obstacles

    • D. 

      Location of home station flight

  • 72. 
    What provides key information to the defense force commander and support staffs on specific air bae defense activities in order to make decisions, and develop and implement tactical plans and orders?
    • A. 

      Maps

    • B. 

      Signals

    • C. 

      Reports

    • D. 

      Telegrams

  • 73. 
    What is an engagement priority for machine gun gunners to direct their fire?
    • A. 

      Individual personnel

    • B. 

      Light armored vehicles in sector

    • C. 

      Crew-served automatic weapons

    • D. 

      Groups of five or more in the primary sector

  • 74. 
    When conducting ambushes, units refer to the engagement areas as
    • A. 

      ENGAGEMENT ZONE

    • B. 

      AMBUSH ZONE

    • C. 

      DEATH ZONE

    • D. 

      KILL ZONE

  • 75. 
    Which proinciple of indirect fire aims to destroy enemy soldiers and degrade the effectiveness of enemy behicles by causing them to fight buttoned-up?
    • A. 

      Integrating indirect suppressive fires

    • B. 

      Unit protection as rounds impact

    • C. 

      Required effect

    • D. 

      Timing

  • 76. 
    Because the danger increases with the size of the weapons, how should artillery be used when integrating indirect suppressive fires to support the breach and asssault?
    • A. 

      On enemy positions away from the breach site

    • B. 

      To isolate the objective

    • C. 

      For close suppression

    • D. 

      To clear a path

  • 77. 
    A "call for fire" is a message
    • A. 

      Given to an observer

    • B. 

      Prepared by the unit

    • C. 

      Prepared by the observer

    • D. 

      Prepared by the flight leader

  • 78. 
    Against what threat levels can close precision engagement add significantly to delaying actions by enhancing the standoff capabilities of defense forces?
    • A. 

      III and IV

    • B. 

      II and III

    • C. 

      II and IV

    • D. 

      I and IV

  • 79. 
    Once fully implemented, what will the integrated base defense security system greatly enhance in base defensive operations?
    • A. 

      Alarms and detection

    • B. 

      Detection and security

    • C. 

      Security and prevention

    • D. 

      Detection and alert notifications

  • 80. 
    Where is the best position for you to locate and observatioon post/listening post?
    • A. 

      In a water tower

    • B. 

      In a stand alone position

    • C. 

      In a single small gathering of trees

    • D. 

      In a position that doesnt draw attention

  • 81. 
    Observation post/listening post teams are not equipped to
    • A. 

      Indicate enemy location using flares

    • B. 

      Protect themselves

    • C. 

      Report information

    • D. 

      Observe the area

  • 82. 
    What placement allows for redundancey in observation and better sector coverage?
    • A. 

      All around

    • B. 

      In depth

    • C. 

      Area

    • D. 

      Sport

  • 83. 
    A relatively secure area that allows for positve identification fo personnel and vehicles is defined as
    • A. 

      Exclusion area

    • B. 

      Search area

    • C. 

      Denial area

    • D. 

      Safe area

  • 84. 
    What three subordinate areas are search areas divided into?
    • A. 

      Personnel, vehicle, and safe

    • B. 

      Personnel, vehicle, and denial

    • C. 

      Personnel, vehicle, and reaction forcce

    • D. 

      Personnel, vehicle, and response force

  • 85. 
    What are the two types of obstacles you may encounter?
    • A. 

      Existing and reinforcing

    • B. 

      Disrupting and turning

    • C. 

      Blocking and turning

    • D. 

      Turning and fixing

  • 86. 
    Protective barriers consist of what two major categories?
    • A. 

      Man-made and fabricated

    • B. 

      Natural and structural

    • C. 

      Hard and soft

    • D. 

      Left and right

  • 87. 
    The environment for security forces personnel working in the entry control facilities must be
    • A. 

      Protected and guarded

    • B. 

      Safe and comfortable

    • C. 

      Well lit and elevated

    • D. 

      Cool and calm

  • 88. 
    The immediate impression the entry control facilityy must imparr through its design is one of
    • A. 

      Strict and rigid rules

    • B. 

      Relaxation and friendliness

    • C. 

      Professionalism and commitment

    • D. 

      Openness, professionalism and commitment

  • 89. 
    You should make restricted areas as small as possible to elminate the
    • A. 

      The number of troops required guarding it

    • B. 

      Amount of time it would take to patrol the area

    • C. 

      Need for securing and maintaining the unnecessary terrain

    • D. 

      Necessity of care and maintenance required for a larger area

  • 90. 
    The authorty for establishing a national defense area is shown with
    • A. 

      A red line

    • B. 

      Temporary sign

    • C. 

      Rope marking off the area

    • D. 

      Posted guards every 50 feet