3P071 Volume 2

90 Questions | Attempts: 185
Share
Please wait...
Question 1 / 90
0 %
0/100
Score 0/100
1. What is the staff make-up for the S3?
Submit
Please wait...
About This Quiz
3P071 Quizzes & Trivia

VOLUME 2

Personalize your quiz and earn a certificate with your name on it!
2. What is a base already possessing resources and an established infrastructure?
Submit
3. The tactic most commonly used by terrorist groups is
Submit
4. When should commanders and planners identify mission-critical information?
Submit
5. Where is an excellent position to place a marksman in an urban area?
Submit
6. What provides key information to the defense force commander (DFC) and support staffs (S staff) on specific air base defense (ABD) activities in order to make decisions, and develop and implement tactical plans and orders?
Submit
7. Observation post (OP)/listening post (LP) teams are not equipped to
Submit
8. When conducting ambushes, units refer to the engagement areas as
Submit
9. A typical organization of a terrorist group consists of
Submit
10. Our first line of defense against intelligence collection efforts is
Submit
11. Since unit type codes (UTC) are functionally grouped, what will all security forces UTCs have as a designator?
Submit
12. What is one of the fundamental purposes of the Law of Armed Conflict (LOAC)?
Submit
13. What should always be your first priority of work?
Submit
14. What would necessitate the need to dig hasty firing positions in the field?
Submit
15. Where is the best position for you to locate an observation post (OP)/listening post (LP)?
Submit
16. A terrorist group that generally operates independently of, but receives support from, one or more governments is
Submit
17. To modify to prevent recognition of the true identity or character of an asset or activity is to
Submit
18. Guidance on the application of force and exercising of the inherent right and obligation of self-defense is the purpose of the
Submit
19. What should the defense force commander (DFC) consider in the sectorization scheme to provide maximum protection for base critical resources?
Submit
20. What does not need to be shown on a sketch?
Submit
21. At a minimum, which two S-functions must operate within the base defense operations center (BDOC)?
Submit
22. When terrorists attack DOD affiliated personnel and facilities, what is their mission?
Submit
23. Compiling and examining all available information concerning potential threats by threat analysts is a/an
Submit
24. Based on the integrated base defense (IBD) concept of operations (CONOP), what are all Airmen considered?
Submit
25. A relatively secure area that allows for positive identification of personnel and vehicles is defined as
Submit
26. Protective barriers consist of what two major categories?
Submit
27. Commanders do not use rules of engagement (ROE) to ensure operations
Submit
28. The USAF Antiterrorism Program is designed around what three principles?
Submit
29. Which threat level I activity is identified by random acts against targets of opportunity?
Submit
30. In terms of engagement ranges, machine guns in the base-of-fire element may find themselves firing at targets within how many meters of the element?
Submit
31. Against what threat levels can close precision engagement (CPE) add significantly to delaying actions by enhancing the standoff capabilities of defense forces?
Submit
32. The primary responsibility of air base defense (ABD) forces is
Submit
33. What is the time limit for an air and space expeditionary force (AEF) package to respond to any unexpected contingency?
Submit
34. When the machine gun is not assigned to the maneuver element, what is its primary mission?
Submit
35. You should make restricted areas as small as possible to eliminate the
Submit
36. The tactical area of responsibility (TAOR) begins at the
Submit
37. The authority for establishing a national defense area (NDA) is shown with
Submit
38. The primary mission of a joint operation is
Submit
39. Generally, specially trained terrorists are of above average intelligence and between the ages of
Submit
40. The political-military nature of military operations other than war (MOOTW) requires you to coordinate your activities
Submit
41. Military operations other than war (MOOTW) missions do not include
Submit
42. Which essential element of the integrated base defense (IBD) concept slows the enemy without the need for a massive response at the outset of an engagement?
Submit
43. Fixed bases having well-established perimeters usually have limited
Submit
44. What is an engagement priority for machine gun gunners to direct their fire?
Submit
45. The environment for security forces (SF) personnel working in the entry control facilities (ECF) must be
Submit
46. What factor is the stated desire or history of terrorist attacks against US interests?
Submit
47. How long are the majority of security forces (SF) unit type codes (UTC) capable of existing without support?
Submit
48. What two factors add depth to the battle outside the perimeter, allowing the base to continue its primary mission with minimal interference?
Submit
49. Because the danger increases with the size of the weapons, how should artillery be used when integrating indirect suppressive fires to support the breach and assault?
Submit
50. What is the list of all unit type codes (UTC) approved for use in planning?
Submit
51. Directing your operation toward a defined and attainable objective that contributes to operational and tactical claim is what principle of war?
Submit
52. Avoiding unnecessary complexity in organizing, preparing, planning, and conducting military operations is what principle of war?
Submit
53. What is the main mission of the machine gun?
Submit
54. A "call for fire" is a message
Submit
55. When are terrorist team members brought together for final rehearsal?
Submit
56. The capability to reduce the capability of attacking forces and reconnaissance assets through the principles of hide, blend, disguise, and decoy to protect friendly assets and aim points with materials and equipment that alter or obscure part or all of their multispectral signatures is
Submit
57. What group routinely manages the risk assessment process for commanders?
Submit
58. When the need for a new unit type code (UTC) or a major change in an existing UTC is required, who may initiate the action for the change?
Submit
59. The immediate impression the entry control facility (ECF) must impart through its design is one of       
Submit
60. What assessment addresses the broad range of physical threats to the security of personnel and assets, and should be conducted periodically?
Submit
61. What does security forces (SF) provide for the Integrated Base Defense (IBD) concept?
Submit
62. What does the Air Force maintain to support the on-call air and space expeditionary force (AEF), as well as on-call lead wings to open expeditionary bases?
Submit
63. When establishing base sectors, you must ensure critical resources and areas are
Submit
64. What pre-deployment factor is considered a constant?
Submit
65. What placement allows for redundancy in observation and better sector coverage?
Submit
66. What does the risk management process allow the commander to determine?
Submit
67. What is not an example of a routine in defense measure?
Submit
68. Once fully implemented, what will the Integrated Base Defense Security System (IBDSS) greatly enhance in base defensive operations?
Submit
69. What are the two types of obstacles you may encounter?
Submit
70. What operations are key to assembling an accurate picture of the battle space
Submit
71. Proper machine gun placement maximizes fire in
Submit
72. Which threat level uses doctrine that stresses the use of battalion-size units to conduct helicopter insertions to a depth of 50 kilometers (km)?
Submit
73. What unit type code (UTC) is essential to direct the fire of and provide support for the mortar teams?
Submit
74. What unit type code (UTC) is composed of one home station-validated explosive detection dog and an assigned handler?
Submit
75. What unit type code (UTC) consists of a 3-person team of specially trained and equipped security forces (SF) personnel, who deploy as mission essential ground personnel (MEGP) on airlift aircraft transiting or operating out of high-risk locations?
Submit
76. The primary purpose of the operations security (OPSEC) program is to
Submit
77. The key to force protection (FP) countermeasure planning is
Submit
78. As a Total Force organization, a typical air and space expeditionary force (AEF) is responsive and capable of
Submit
79. Which principle of indirect fire aims to destroy enemy soldiers and degrade the effectiveness of enemy vehicles by causing them to fight buttoned-up?
Submit
80. Missions that primarily target nuclear weapons-related facilities are what threat spectrum level?
Submit
81. An expeditionary military force is defined as a force that conducts military operations
Submit
82. What unit type code (UTC) is a 4-person team designed to provide 24-hour security forces (SF) augmentation to immediate headquarters for ground defense and weapons systems security functions?
Submit
83. In what way can subordinate joint force commands organize?
Submit
84. What is the key element in the design of forces that should be paramount to planners?
Submit
85. What unit type code (UTC), when deployed with UTCs QFEBB and QFEBS, provides HQ staff support for a medium to large (130 – 180 personnel) deployed security forces (SF) unit?
Submit
86. What three subordinate areas are search areas divided into?
Submit
87. During peacetime operation, what unit type code (UTC) would provide the initial security for USAF resources and personnel, conduct convoys; and defend local and other security missions as required?
Submit
88. Which threat spectrum level consists of small tactical units, unconventional warfare forces, and guerrillas?
Submit
89. The key to optimizing peacetime participation of the traditional guardsman and reservists who must balance military duties with full-time civilian employment is
Submit
90. Which military operations other than war (MOOTW) principle never permits hostile factions to acquire a military, political, or informational advantage?
Submit
View My Results

Quiz Review Timeline (Updated): Dec 31, 2014 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 31, 2014
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 20, 2014
    Quiz Created by
    M_Jefferson1385
Cancel
  • All
    All (90)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the staff make-up for the S3?
What is a base already possessing resources and an established...
The tactic most commonly used by terrorist groups is
When should commanders and planners identify mission-critical...
Where is an excellent position to place a marksman in an urban area?
What provides key information to the defense force commander (DFC) and...
Observation post (OP)/listening post (LP) teams are not equipped to
When conducting ambushes, units refer to the engagement areas as
A typical organization of a terrorist group consists of
Our first line of defense against intelligence collection efforts is
Since unit type codes (UTC) are functionally grouped, what will all...
What is one of the fundamental purposes of the Law of Armed Conflict...
What should always be your first priority of work?
What would necessitate the need to dig hasty firing positions in the...
Where is the best position for you to locate an observation post...
A terrorist group that generally operates independently of, but...
To modify to prevent recognition of the true identity or character of...
Guidance on the application of force and exercising of the inherent...
What should the defense force commander (DFC) consider in the...
What does not need to be shown on a sketch?
At a minimum, which two S-functions must operate within the base...
When terrorists attack DOD affiliated personnel and facilities, what...
Compiling and examining all available information concerning potential...
Based on the integrated base defense (IBD) concept of operations...
A relatively secure area that allows for positive identification of...
Protective barriers consist of what two major categories?
Commanders do not use rules of engagement (ROE) to ensure operations
The USAF Antiterrorism Program is designed around what three...
Which threat level I activity is identified by random acts against...
In terms of engagement ranges, machine guns in the base-of-fire...
Against what threat levels can close precision engagement (CPE) add...
The primary responsibility of air base defense (ABD) forces is
What is the time limit for an air and space expeditionary force (AEF)...
When the machine gun is not assigned to the maneuver element, what is...
You should make restricted areas as small as possible to eliminate the
The tactical area of responsibility (TAOR) begins at the
The authority for establishing a national defense area (NDA) is shown...
The primary mission of a joint operation is
Generally, specially trained terrorists are of above average...
The political-military nature of military operations other than war...
Military operations other than war (MOOTW) missions do not include
Which essential element of the integrated base defense (IBD) concept...
Fixed bases having well-established perimeters usually have limited
What is an engagement priority for machine gun gunners to direct their...
The environment for security forces (SF) personnel working in the...
What factor is the stated desire or history of terrorist attacks...
How long are the majority of security forces (SF) unit type codes...
What two factors add depth to the battle outside the perimeter,...
Because the danger increases with the size of the weapons, how should...
What is the list of all unit type codes (UTC) approved for use in...
Directing your operation toward a defined and attainable objective...
Avoiding unnecessary complexity in organizing, preparing, planning,...
What is the main mission of the machine gun?
A "call for fire" is a message
When are terrorist team members brought together for final rehearsal?
The capability to reduce the capability of attacking forces and...
What group routinely manages the risk assessment process for...
When the need for a new unit type code (UTC) or a major change in an...
The immediate impression the entry control facility (ECF) must impart...
What assessment addresses the broad range of physical threats to the...
What does security forces (SF) provide for the Integrated Base Defense...
What does the Air Force maintain to support the on-call air and space...
When establishing base sectors, you must ensure critical resources and...
What pre-deployment factor is considered a constant?
What placement allows for redundancy in observation and better sector...
What does the risk management process allow the commander to...
What is not an example of a routine in defense measure?
Once fully implemented, what will the Integrated Base Defense Security...
What are the two types of obstacles you may encounter?
What operations are key to assembling an accurate picture of the...
Proper machine gun placement maximizes fire in
Which threat level uses doctrine that stresses the use of...
What unit type code (UTC) is essential to direct the fire of and...
What unit type code (UTC) is composed of one home station-validated...
What unit type code (UTC) consists of a 3-person team of specially...
The primary purpose of the operations security (OPSEC) program is to
The key to force protection (FP) countermeasure planning is
As a Total Force organization, a typical air and space expeditionary...
Which principle of indirect fire aims to destroy enemy soldiers and...
Missions that primarily target nuclear weapons-related facilities are...
An expeditionary military force is defined as a force that conducts...
What unit type code (UTC) is a 4-person team designed to provide...
In what way can subordinate joint force commands organize?
What is the key element in the design of forces that should be...
What unit type code (UTC), when deployed with UTCs QFEBB and QFEBS,...
What three subordinate areas are search areas divided into?
During peacetime operation, what unit type code (UTC) would provide...
Which threat spectrum level consists of small tactical units,...
The key to optimizing peacetime participation of the traditional...
Which military operations other than war (MOOTW) principle never...
Alert!

Advertisement