Secfo Journeyman Vol. 4

80 Questions | Total Attempts: 33

SettingsSettingsSettings
Please wait...
Secfo Journeyman Vol. 4

.


Questions and Answers
  • 1. 
    What analytical process is used to achieve integrated defense?
    • A. 

      ID Threat Risk

    • B. 

      ID Principles of Risk

    • C. 

      ID Risk Management

    • D. 

      ID Principles of Critical

  • 2. 
    Who must review the installation entry procedures for legal sufficiency?
    • A. 

      Staff Judge Advocate

    • B. 

      Installation Commander

    • C. 

      Defense Force Commander

    • D. 

      Air Force Office of Investigations

  • 3. 
    The first step in risk analysis is asset
    • A. 

      Risk assessment

    • B. 

      Threat assessment

    • C. 

      Criticality assessment

    • D. 

      Vulnerability assessment

  • 4. 
    Through which agency will the BDOC up-channel COVERED WAGON reportable incidents?
    • A. 

      Site security control.

    • B. 

      Security Forces.

    • C. 

      Higher headquarters.

    • D. 

      Installation command post.

  • 5. 
    The jettisoning of a nuclear weapon or nuclear weapon component is an example of a nuclear weapon
    • A. 

      Accident

    • B. 

      Incident

    • C. 

      Mistake

    • D. 

      Mishap

  • 6. 
    What does the color yellow indicate when calling in a LACE report?
    • A. 

      Less than 33 percent available

    • B. 

      Less than 66 percent available

    • C. 

      Greater than 33 percent available

    • D. 

      Greater than 66 percent available

  • 7. 
    Personnel assigned to the Priority II priority category should be evacuated within how many hours?
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 8. 
    Personnel assigned to the Priority III routine category should be evacuated within how many hours?
    • A. 

      6

    • B. 

      12

    • C. 

      18

    • D. 

      24

  • 9. 
    Who must approve each installation localized integrated defense plan (IDP)?
    • A. 

      SJA

    • B. 

      Installation Commander

    • C. 

      Defense Force Commander

    • D. 

      Air Force Office of Investigation

  • 10. 
    Who determines what posts are not staffed during funding or personnel shortages?
    • A. 

      Flight Chief

    • B. 

      Operations Officer

    • C. 

      Flight Commander

    • D. 

      Defense Force Commander

  • 11. 
    How many days are the majority of security forces unit type codes (UTC) capable of existing without support?
    • A. 

      5

    • B. 

      10

    • C. 

      15

    • D. 

      20

  • 12. 
    Which type of attack may involve an insider threat?
    • A. 

      Standoff

    • B. 

      Penetration

    • C. 

      Chemical, biological

    • D. 

      Information operation

  • 13. 
    Which agency is the lead for terrorist incidents that occur outside the US?
    • A. 

      Department of State

    • B. 

      Department of Justice

    • C. 

      Department of Defense

    • D. 

      Federal Bureau of Investigation

  • 14. 
    Which terrorist threat level factor focuses on the attack method used by the group and other measures enhancing its effectiveness, such as a state sponsorship and ingenious use of technology?
    • A. 

      Activity

    • B. 

      Intentions

    • C. 

      Operational capability

    • D. 

      Operational environment

  • 15. 
    What type of supporters do not actually commit violent acts but assist the terrorists by providing money, intelligence, legal or medical services?
    • A. 

      Passive Supporter

    • B. 

      Active Supporters

    • C. 

      Hardcore Leadership

    • D. 

      Active operational cadre

  • 16. 
    What threat level assessment indicates anti-US terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation?
    • A. 

      Significant

    • B. 

      Moderate

    • C. 

      High

    • D. 

      Low

  • 17. 
    What terrorist threat level factor focuses on the attack method used by the group and other measures enhancing its effectiveness, such as a state sponsorship and ingenious use of technology?
    • A. 

      Activity

    • B. 

      Intentions

    • C. 

      Operational capability

    • D. 

      Operational environment

  • 18. 
    What threat level is considered a peacetime threat and increases in frequency and transitions to a wartime threat before the beginning of open hostilities or a rise in hostilities?
    • A. 

      Threat Level I

    • B. 

      Threat Level II

    • C. 

      Threat Level III

    • D. 

      Threat Level IV

  • 19. 
    What threat level consists of guerilla forces, unconventional warfare forces, or small tactical units?
    • A. 

      Threat Level I

    • B. 

      Threat Level II

    • C. 

      Threat Level III

    • D. 

      Threat Level IV

  • 20. 
    What Desired Effect is achieved with lighting, intrusion detection systems, early warning systems, and closed-circuit television?
    • A. 

      Anticipate

    • B. 

      Deter

    • C. 

      Detect

    • D. 

      Warn

  • 21. 
    How many random antiterrorism measures (RAM) chosen from higher force protection conditions (FPCON) are required daily?
    • A. 

      At least one

    • B. 

      At least two

    • C. 

      At least three

    • D. 

      At least four

  • 22. 
    What Desired Effect is achieved through threat-and-effects-based planning that integrate all friendly forces into a single, comprehensive plan, ensuring friendly forces are trained and qualified on arming and use of force?
    • A. 

      Warn

    • B. 

      Defeat

    • C. 

      Delay

    • D. 

      Defend

  • 23. 
    How long has the US military been called upon to defeat insurgencies?
    • A. 

      Less than one century

    • B. 

      Less than two centuries

    • C. 

      Within the last 50 years

    • D. 

      More than two centuries

  • 24. 
    What must units develop about the area of responsibility (AOR) to include religious customs, nuances of local leaders, local culture, and terrain?
    • A. 

      Insurgency picture

    • B. 

      Counterinsurgency picture

    • C. 

      Common Operating Picture

    • D. 

      Operational Environment Picture

  • 25. 
    What will insurgents resort to if they cannot persuade locals to help or refrain from hindering them?
    • A. 

      Bribery

    • B. 

      Coercion

    • C. 

      Persuasion

    • D. 

      Encouragement

Back to Top Back to top