The purpose of Flight level exercises for Security Forces (SF) members...
Before releasing a military working dog to search a suspected...
If a personality conflict occurs during an interview, the investigator...
Your conduct when apprehending suspects should be according to
Air Police Security (APS) battalions were designed to protect...
On 1 September 1950, what was established at Tyndall AFB,...
The Security Forces (SF) beret with the Defensor Fortis flash
Which operation provided the US military its first significant...
When conducting individual searches, what essential step should you...
Defender's Edge training was developed by
Which legal document contains military laws that apply to all branches...
The mission of all Security Forces (SF) is to
The types of jurisdiction found on US government installations are
The federal government has sole authority to enforce laws on...
In the Security Forces' (SF) unit S-function structure, which...
As a Security Forces member, what is the primary rule in court...
The Fifth Amendment of the Constitution protects against
What information should leadership brief all personnel on before...
Conducting building checks is an excellent form of
Air Force personnel who are subjects of an investigation must be...
Defense Biometric Identification System (DBIDS) is capable of reading...
If a same sex Security Forces (SF) member cannot be present during an...
As a Security Forces (SF) member, adhering to what system(s) of...
You have failed to follow what general conduct guideline if you issued...
During the Global War on Terrorism, assisting sister services brought...
Under concurrent jurisdiction
Which US service has the primary responsibility of operations and...
Which position requires individuals to achieve at least 79 percent to...
What should Security Forces (SF) members be familiar with prior to...
What is the purpose of call signs?
Who determines the frequency of testing and documentation of duress...
Which is not a required piece of equipment for Security Forces (SF)...
Security Forces Management Information System's (SFMIS) users report...
You must complete Phase II training within how many calendar days of...
At least how many days are required for significant heat...
Where was the military police (MP) (aviation) training camp...
In 1971, Security Police was split into two separate functions; what...
What was the "first in" Security Forces (SF) concept adopted...
The military operation launched against the Taliban in Dec 2001 was...
As Security Forces (SF) members dealing with stress, who are our...
What example of international law was reached at The Hague and Geneva...
If a person subject to military law commits an offense overseas that...
Which description correctly describes our Security Force symbol?
Which interview approach is primarily used to interrogate?
What law sets the standard of behavior for members of the Armed Forces...
Whenever you have doubts concerning rights advisement, who or what...
Military working dog teams used in law enforcement activities provide...
Skills obtained through a tiered training approach and target...
What is your first responsibility when assuming your post as an...
As a Security Force (SF) member, prior to testifying in court, you...
Which of the following is not a purpose behind Security Management and...
When is a military working dog's (MWD) detection ability more...
The military working dog's primary mission is to
The success of what special unit in Vietnam led to the...
Which Uniform Code of Military Justice's (UCMJ) article states who is...
The goal of any interview is to
Who may request a civil proceeding under the federal tort law?
Which US military service is the executive agency for Level III...
National Crime Information Center (NCIC) training must meet
When conducting building checks, the military working dog is normally
The military working dog team should always approach buildings from...
Dealing with offenders in a dignified manner adheres to which conduct...
In what year was the name of the career field changed from...
What is the single most important source of viruses in the workplace?
The stress response system (SRS) is composed of the
When an occupying power exercises all authority over an occupied...
A Stan/Eval inspection of each functional area is conducted every
If a victim becomes emotionally upset during an interview, you should
What "S" function uses Electronic Tactics, Techniques and...
What document is used for issuing firearms to personnel on a frequent...
What type of land mobile radio do walking patrols, security patrols,...
Military working dogs should be kept on leash except when they must
What are the types of interview approaches?
What course must a trainee attend for awarding of the 7-skill level,...
The humane treatment/incarceration procedures of confinees is the...
In what year did the Air Force approve the first trial issue...
The Vietnam Conflict pointed out the need for a revised doctrine,...
Specific procedures you must follow on the job to reduce your risk of...
In the Security Forces' (SF) unit S-function structure, which...
Which Uniform Code of Military Justice (UCMJ) article gives you the...
Who is responsible for the overall management of the Stan/Eval...
Which base agency is responsible for routinely testing firing range...
Individuals awaiting the filing of charges, disposition of charges,...
What are the two types of martial law?
What office is responsible for the management, program development,...
Which type of interviewee is normally interviewed to develop facts in...
What form is used for personnel who use firearms on a temporary basis?
When conducting a building check, what is the first step you take if...
What Security Forces (SF) unit conducted the career field's first...
Under ideal conditions, at what distance can the average military...
Who is responsible to ensure personnel are Security Forces Management...
Restrict access to National Crime Information Center (NCIC) data as
You must complete live-fire sustainment training within how many...
Which type of training is considered universal training regardless of...
In determining whether an individual is a suspect, you should not base...
Which custody classification is assigned to confinees who may be...
Which confinement facility (CF) or joint regional correctional...
What are the two types of searches used in confinement facilities?
Localized training alarm monitors receive must be approved by the
Which type of martial law exists when military authority totally...