3P071 Volume 2

90 Questions | Attempts: 185
Please wait...
Question 1 / 91
🏆 Rank #--
Score 0/100

1. What is the staff make-up for the S3?

Submit
Please wait...
About This Quiz
3P071 Quizzes & Trivia

VOLUME 2

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What is a base already possessing resources and an established infrastructure?

Submit

3. The tactic most commonly used by terrorist groups is

Submit

4. When should commanders and planners identify mission-critical information?

Submit

5. Where is an excellent position to place a marksman in an urban area?

Submit

6. What provides key information to the defense force commander (DFC) and support staffs (S staff) on specific air base defense (ABD) activities in order to make decisions, and develop and implement tactical plans and orders?

Submit

7. Observation post (OP)/listening post (LP) teams are not equipped to

Submit

8. When conducting ambushes, units refer to the engagement areas as

Submit

9. A typical organization of a terrorist group consists of

Submit

10. Our first line of defense against intelligence collection efforts is

Submit

11. Since unit type codes (UTC) are functionally grouped, what will all security forces UTCs have as a designator?

Submit

12. What is one of the fundamental purposes of the Law of Armed Conflict (LOAC)?

Submit

13. What should always be your first priority of work?

Submit

14. What would necessitate the need to dig hasty firing positions in the field?

Submit

15. Where is the best position for you to locate an observation post (OP)/listening post (LP)?

Submit

16. A terrorist group that generally operates independently of, but receives support from, one or more governments is

Submit

17. To modify to prevent recognition of the true identity or character of an asset or activity is to

Submit

18. Guidance on the application of force and exercising of the inherent right and obligation of self-defense is the purpose of the

Submit

19. What should the defense force commander (DFC) consider in the sectorization scheme to provide maximum protection for base critical resources?

Submit

20. What does not need to be shown on a sketch?

Submit

21. At a minimum, which two S-functions must operate within the base defense operations center (BDOC)?

Submit

22. When terrorists attack DOD affiliated personnel and facilities, what is their mission?

Submit

23. Compiling and examining all available information concerning potential threats by threat analysts is a/an

Submit

24. Based on the integrated base defense (IBD) concept of operations (CONOP), what are all Airmen considered?

Submit

25. A relatively secure area that allows for positive identification of personnel and vehicles is defined as

Submit

26. Protective barriers consist of what two major categories?

Submit

27. Commanders do not use rules of engagement (ROE) to ensure operations

Submit

28. The USAF Antiterrorism Program is designed around what three principles?

Submit

29. Which threat level I activity is identified by random acts against targets of opportunity?

Submit

30. In terms of engagement ranges, machine guns in the base-of-fire element may find themselves firing at targets within how many meters of the element?

Submit

31. Against what threat levels can close precision engagement (CPE) add significantly to delaying actions by enhancing the standoff capabilities of defense forces?

Submit

32. The primary responsibility of air base defense (ABD) forces is

Submit

33. What is the time limit for an air and space expeditionary force (AEF) package to respond to any unexpected contingency?

Submit

34. When the machine gun is not assigned to the maneuver element, what is its primary mission?

Submit

35. You should make restricted areas as small as possible to eliminate the

Submit

36. The tactical area of responsibility (TAOR) begins at the

Submit

37. The authority for establishing a national defense area (NDA) is shown with

Submit

38. The primary mission of a joint operation is

Submit

39. Generally, specially trained terrorists are of above average intelligence and between the ages of

Submit

40. The political-military nature of military operations other than war (MOOTW) requires you to coordinate your activities

Submit

41. Military operations other than war (MOOTW) missions do not include

Submit

42. Which essential element of the integrated base defense (IBD) concept slows the enemy without the need for a massive response at the outset of an engagement?

Submit

43. Fixed bases having well-established perimeters usually have limited

Submit

44. What is an engagement priority for machine gun gunners to direct their fire?

Submit

45. The environment for security forces (SF) personnel working in the entry control facilities (ECF) must be

Submit

46. What factor is the stated desire or history of terrorist attacks against US interests?

Submit

47. How long are the majority of security forces (SF) unit type codes (UTC) capable of existing without support?

Submit

48. What two factors add depth to the battle outside the perimeter, allowing the base to continue its primary mission with minimal interference?

Submit

49. Because the danger increases with the size of the weapons, how should artillery be used when integrating indirect suppressive fires to support the breach and assault?

Submit

50. What is the list of all unit type codes (UTC) approved for use in planning?

Submit

51. Directing your operation toward a defined and attainable objective that contributes to operational and tactical claim is what principle of war?

Submit

52. Avoiding unnecessary complexity in organizing, preparing, planning, and conducting military operations is what principle of war?

Submit

53. What is the main mission of the machine gun?

Submit

54. A "call for fire" is a message

Submit

55. When are terrorist team members brought together for final rehearsal?

Submit

56. The capability to reduce the capability of attacking forces and reconnaissance assets through the principles of hide, blend, disguise, and decoy to protect friendly assets and aim points with materials and equipment that alter or obscure part or all of their multispectral signatures is

Submit

57. What group routinely manages the risk assessment process for commanders?

Submit

58. When the need for a new unit type code (UTC) or a major change in an existing UTC is required, who may initiate the action for the change?

Submit

59. The immediate impression the entry control facility (ECF) must impart through its design is one of       

Submit

60. What assessment addresses the broad range of physical threats to the security of personnel and assets, and should be conducted periodically?

Submit

61. What does security forces (SF) provide for the Integrated Base Defense (IBD) concept?

Submit

62. What does the Air Force maintain to support the on-call air and space expeditionary force (AEF), as well as on-call lead wings to open expeditionary bases?

Submit

63. When establishing base sectors, you must ensure critical resources and areas are

Submit

64. What pre-deployment factor is considered a constant?

Submit

65. What placement allows for redundancy in observation and better sector coverage?

Submit

66. What does the risk management process allow the commander to determine?

Submit

67. What is not an example of a routine in defense measure?

Submit

68. Once fully implemented, what will the Integrated Base Defense Security System (IBDSS) greatly enhance in base defensive operations?

Submit

69. What are the two types of obstacles you may encounter?

Submit

70. What operations are key to assembling an accurate picture of the battle space

Submit

71. Proper machine gun placement maximizes fire in

Submit

72. Which threat level uses doctrine that stresses the use of battalion-size units to conduct helicopter insertions to a depth of 50 kilometers (km)?

Submit

73. What unit type code (UTC) is essential to direct the fire of and provide support for the mortar teams?

Submit

74. What unit type code (UTC) is composed of one home station-validated explosive detection dog and an assigned handler?

Submit

75. What unit type code (UTC) consists of a 3-person team of specially trained and equipped security forces (SF) personnel, who deploy as mission essential ground personnel (MEGP) on airlift aircraft transiting or operating out of high-risk locations?

Submit

76. The primary purpose of the operations security (OPSEC) program is to

Submit

77. The key to force protection (FP) countermeasure planning is

Submit

78. As a Total Force organization, a typical air and space expeditionary force (AEF) is responsive and capable of

Submit

79. Which principle of indirect fire aims to destroy enemy soldiers and degrade the effectiveness of enemy vehicles by causing them to fight buttoned-up?

Submit

80. Missions that primarily target nuclear weapons-related facilities are what threat spectrum level?

Submit

81. An expeditionary military force is defined as a force that conducts military operations

Submit

82. What unit type code (UTC) is a 4-person team designed to provide 24-hour security forces (SF) augmentation to immediate headquarters for ground defense and weapons systems security functions?

Submit

83. In what way can subordinate joint force commands organize?

Submit

84. What is the key element in the design of forces that should be paramount to planners?

Submit

85. What unit type code (UTC), when deployed with UTCs QFEBB and QFEBS, provides HQ staff support for a medium to large (130 – 180 personnel) deployed security forces (SF) unit?

Submit

86. What three subordinate areas are search areas divided into?

Submit

87. During peacetime operation, what unit type code (UTC) would provide the initial security for USAF resources and personnel, conduct convoys; and defend local and other security missions as required?

Submit

88. Which threat spectrum level consists of small tactical units, unconventional warfare forces, and guerrillas?

Submit

89. The key to optimizing peacetime participation of the traditional guardsman and reservists who must balance military duties with full-time civilian employment is

Submit

90. Which military operations other than war (MOOTW) principle never permits hostile factions to acquire a military, political, or informational advantage?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (90)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the staff make-up for the S3?
What is a base already possessing resources and an established...
The tactic most commonly used by terrorist groups is
When should commanders and planners identify mission-critical...
Where is an excellent position to place a marksman in an urban area?
What provides key information to the defense force commander (DFC) and...
Observation post (OP)/listening post (LP) teams are not equipped to
When conducting ambushes, units refer to the engagement areas as
A typical organization of a terrorist group consists of
Our first line of defense against intelligence collection efforts is
Since unit type codes (UTC) are functionally grouped, what will all...
What is one of the fundamental purposes of the Law of Armed Conflict...
What should always be your first priority of work?
What would necessitate the need to dig hasty firing positions in the...
Where is the best position for you to locate an observation post...
A terrorist group that generally operates independently of, but...
To modify to prevent recognition of the true identity or character of...
Guidance on the application of force and exercising of the inherent...
What should the defense force commander (DFC) consider in the...
What does not need to be shown on a sketch?
At a minimum, which two S-functions must operate within the base...
When terrorists attack DOD affiliated personnel and facilities, what...
Compiling and examining all available information concerning potential...
Based on the integrated base defense (IBD) concept of operations...
A relatively secure area that allows for positive identification of...
Protective barriers consist of what two major categories?
Commanders do not use rules of engagement (ROE) to ensure operations
The USAF Antiterrorism Program is designed around what three...
Which threat level I activity is identified by random acts against...
In terms of engagement ranges, machine guns in the base-of-fire...
Against what threat levels can close precision engagement (CPE) add...
The primary responsibility of air base defense (ABD) forces is
What is the time limit for an air and space expeditionary force (AEF)...
When the machine gun is not assigned to the maneuver element, what is...
You should make restricted areas as small as possible to eliminate the
The tactical area of responsibility (TAOR) begins at the
The authority for establishing a national defense area (NDA) is shown...
The primary mission of a joint operation is
Generally, specially trained terrorists are of above average...
The political-military nature of military operations other than war...
Military operations other than war (MOOTW) missions do not include
Which essential element of the integrated base defense (IBD) concept...
Fixed bases having well-established perimeters usually have limited
What is an engagement priority for machine gun gunners to direct their...
The environment for security forces (SF) personnel working in the...
What factor is the stated desire or history of terrorist attacks...
How long are the majority of security forces (SF) unit type codes...
What two factors add depth to the battle outside the perimeter,...
Because the danger increases with the size of the weapons, how should...
What is the list of all unit type codes (UTC) approved for use in...
Directing your operation toward a defined and attainable objective...
Avoiding unnecessary complexity in organizing, preparing, planning,...
What is the main mission of the machine gun?
A "call for fire" is a message
When are terrorist team members brought together for final rehearsal?
The capability to reduce the capability of attacking forces and...
What group routinely manages the risk assessment process for...
When the need for a new unit type code (UTC) or a major change in an...
The immediate impression the entry control facility (ECF) must impart...
What assessment addresses the broad range of physical threats to the...
What does security forces (SF) provide for the Integrated Base Defense...
What does the Air Force maintain to support the on-call air and space...
When establishing base sectors, you must ensure critical resources and...
What pre-deployment factor is considered a constant?
What placement allows for redundancy in observation and better sector...
What does the risk management process allow the commander to...
What is not an example of a routine in defense measure?
Once fully implemented, what will the Integrated Base Defense Security...
What are the two types of obstacles you may encounter?
What operations are key to assembling an accurate picture of the...
Proper machine gun placement maximizes fire in
Which threat level uses doctrine that stresses the use of...
What unit type code (UTC) is essential to direct the fire of and...
What unit type code (UTC) is composed of one home station-validated...
What unit type code (UTC) consists of a 3-person team of specially...
The primary purpose of the operations security (OPSEC) program is to
The key to force protection (FP) countermeasure planning is
As a Total Force organization, a typical air and space expeditionary...
Which principle of indirect fire aims to destroy enemy soldiers and...
Missions that primarily target nuclear weapons-related facilities are...
An expeditionary military force is defined as a force that conducts...
What unit type code (UTC) is a 4-person team designed to provide...
In what way can subordinate joint force commands organize?
What is the key element in the design of forces that should be...
What unit type code (UTC), when deployed with UTCs QFEBB and QFEBS,...
What three subordinate areas are search areas divided into?
During peacetime operation, what unit type code (UTC) would provide...
Which threat spectrum level consists of small tactical units,...
The key to optimizing peacetime participation of the traditional...
Which military operations other than war (MOOTW) principle never...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!