Defensor Fortis - Volume 4

80 Questions | Total Attempts: 42

SettingsSettingsSettings
Defensor Fortis - Volume 4

5 Level


Questions and Answers
  • 1. 
    What analytical process is used to achieve integrated defense (ID)?
    • A. 

      ID Threat Risk.

    • B. 

      ID Principles of Risk.

    • C. 

      ID Risk Management

    • D. 

      ID Principles of Critical

  • 2. 
    The first step in risk analysis is asset
    • A. 

      Risk assessment.

    • B. 

      Threat assessment

    • C. 

      Criticality assessment

    • D. 

      vulnerability assessment.

  • 3. 
    Who must review the installation entry procedures for legal sufficiency?
    • A. 

      Staff Judge Advocate

    • B. 

      Installation Commander

    • C. 

      Defense Force Commander

    • D. 

      Air Force Office of Investigation

  • 4. 
    Through which agency will the Base Defense Operations Center (BDOC) up-channel COVERED WAGON reportable incidents?
    • A. 

      Site security control.

    • B. 

      Security forces

    • C. 

      Higher headquarters.

    • D. 

      Installation command post.

  • 5. 
    The jettisoning of a nuclear weapon or nuclear component is an example of a nuclear weapon
    • A. 

      Accident.

    • B. 

      Incident

    • C. 

      Mistake

    • D. 

      Mishap.

  • 6. 
    What does the color code yellow indicate when calling in a LACE report?
    • A. 

      Less than 33 percent available

    • B. 

      Less than 66 percent available.

    • C. 

      Greater than 33 percent available.

    • D. 

      Greater than 66 percent available

  • 7. 
    Personnel assigned to the Priority II priority category should be evacuated within how many hours?
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 8. 
    Personnel assigned to the Priority III routine category should be evacuated within how many hours?
    • A. 

      6

    • B. 

      12

    • C. 

      18

    • D. 

      24

  • 9. 
    Who must approve each installation localized integrated defense plan (IDP)?
    • A. 

      Staff Judge Advocate.

    • B. 

      Installation commander.

    • C. 

      Defense force commander

    • D. 

      Air Force Office of Investigation.

  • 10. 
    Who determines what posts are not staffed during funding or personnel shortages?
    • A. 

      Flight chief

    • B. 

      Operations officer

    • C. 

      Flight commander

    • D. 

      Defense force commander

  • 11. 
    How many days are the majority of security forces (SF) unit type codes (UTC) capable of existing without support?
    • A. 

      5

    • B. 

      10

    • C. 

      15

    • D. 

      20

  • 12. 
    Which type of attack may involve an insider threat?
    • A. 

      Standoff

    • B. 

      Penetration.

    • C. 

      Chemical, biological

    • D. 

      Information operation.

  • 13. 
    Which agency is the lead for terrorist incidents that occur outside the US?
    • A. 

      Department of State.

    • B. 

      Department of Justice

    • C. 

      Department of Defense.

    • D. 

      Federal Bureau of Investigation

  • 14. 
    Which agency is the lead for domestic terrorism within the US?
    • A. 

      Department of State

    • B. 

      Department of Justice

    • C. 

      Department of Defense.

    • D. 

      Federal Bureau of Investigation.

  • 15. 
    What type of supporters do not actually commit violent acts but assist the terrorists by providing money, intelligence, legal, or medical services?
    • A. 

      Passive supporter.

    • B. 

      Active supporters.

    • C. 

      Hardcore leadership.

    • D. 

      Active operational cadre

  • 16. 
    What threat level assessment indicates anti-US terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation?
    • A. 

      Significant.

    • B. 

      Moderate.

    • C. 

      High.

    • D. 

      Low

  • 17. 
    What terrorist threat level factor focuses on the attack method used by the group and other measures enhancing its effectiveness, such as a state sponsorship and ingenious use of technology?
    • A. 

      Activity.

    • B. 

      Intentions

    • C. 

      Operational capability

    • D. 

      Operational environment

  • 18. 
    What threat level is considered a peacetime threat and increases in frequency and transitions to a wartime threat before the beginning of open hostilities or a rise in hostilities?
    • A. 

      Threat Level I.

    • B. 

      Threat Level II

    • C. 

      Threat Level III.

    • D. 

      Threat Level IV.

  • 19. 
    What threat level consists of guerrilla forces, unconventional warfare forces, or small tactical units?
    • A. 

      Threat Level I

    • B. 

      Threat Level II

    • C. 

      Threat Level III

    • D. 

      Threat Level IV

  • 20. 
    What Desired Effect is achieved with lighting, intrusion detection systems, early warning systems, and closed-circuit television?
    • A. 

      Anticipate.

    • B. 

      Deter.

    • C. 

      Detect

    • D. 

      Warn.

  • 21. 
    What Desired Effect is achieved through threat-and-effects-based planning that integrate all friendly forces into a single, comprehensive plan, ensuring friendly forces are trained and qualified on arming and use of force?
    • A. 

      Warn

    • B. 

      Defeat

    • C. 

      Delay

    • D. 

      Defend

  • 22. 
    How many random antiterrorist measures (RAM) chosen from higher force protection conditions (FPCON) are required daily?
    • A. 

      At least one.

    • B. 

      At least two

    • C. 

      At least three

    • D. 

      At least four

  • 23. 
    How long has the US military been called upon to defeat insurgencies?
    • A. 

      Less than one century.

    • B. 

      Less than two centuries.

    • C. 

      Within the last 50 years.

    • D. 

      More than two centuries.

  • 24. 
    What must units develop about the area of responsibility (AOR) to include religious customs, nuances of local leaders, local culture, and terrain?
    • A. 

      Insurgency picture

    • B. 

      Counterinsurgency picture

    • C. 

      Common Operating Picture.

    • D. 

      Operational Environment Picture.

  • 25. 
    What will insurgents resort to if they cannot persuade locals to help or refrain from hindering them?
    • A. 

      Bribery

    • B. 

      Coercion

    • C. 

      Persuasion

    • D. 

      Encouragement.

Related Topics
Back to Top Back to top