Weapons of Mass Destruction (WMD) is any weapon that is designed...
Terrorists tend to look for targets that are high profile, have...
What are the four key elements in defining terrorism?
List three factor terrorists use in selecting a target?
Decontamination is the process of removing gross contaminants from...
What are the four routes of exposure that chemical, biological,...
International terrorism is usually perpetrated against the...
The TLO is the agency point-person for the focusing of...
Information is anything we know about any person, place or...
Establishing a perimeter at a WMD is the on-scene officers...
NIMS was created to integrate effective practices in...
Common methods, motivations and tactics for terrorists include...
Methods to improve methods of prevention and deterrence...
What are the six components of NIMS?
Secondary devices, Secondary contamination, and Suspects...
The two kinds of explosives are high and low explosives.
Toxic agents include:
Basic general law enforcement actions/responsibilities at a...
The five phases of a WMD incident are:> Prevention and...
What are the five categories of WMD as related in the B-NICE acronym?
Components of an incendiary device is an: ignition...
Intelligence resources accessible to a patrol officer are:
STTAC provides timely collection, coordination,...
The components of SEMS are:
How are Incendiary devices deployed?
A pathway by which a hazardous material can enter the human body...
Isolation, Identification, Notification,...
What is the purpose of ICS?
The California State Warning Center (CSWC) is the state...
The Louisiana State University (LSU), WMD Response Guidebook...
The Emergency Response Guide (ERG) was designed primarily to...
Critical Infrastructures are defined as those systems and...
A Water plant would be considered a critical infrastructure in...
Which of the following is not one of the 12 "Building Blocks to...
Inhalation of hazardous materials is the leading cause of injuries...
SEMS Incorporates ICS.
Features of ICS are:Command, Organization , Planning...
The Terrorism Screening Center (TSC) can allow an officer access...
SEMS Incorporates ICS.
Which position is the only one that is always staffed in...
What does the acronym R.A.I.N. mean as it relates to first...
What two biological agents are most likely identified to be used...
The Primary features of ICS are:
One goal of Counter-terrorism is to prevent deter...
Which of the following is considered a Critical Asset?
According to the FBI, Terrorism is defined as the unlawful use...
Incapacitating agents include a variety of chemical...
The Intelligence Cycle, which is ongoing and never-ending,...
Which of the following group is not a Domestic terrorism group?
What is the relationship between the State Warning Center and...
International terrorist groups are categorized as State...
Nuclear WMD have advantages because:
Blister agents are also called "vesicants".
The three types of incendiary device activators...
A WMD that has disease-causing organisms or the toxins produced...
The KKK is a form of right wing terrorist group.
How is terrorist activity classified?
Which terrorist groups attempt, through their violent...
The five functional areas of the Incident Command System (ICS) are
Numerous sick or dead victims, reports of strange odors, a...
When the country is at a severe risk of terrorist attack, what is...
Methods for establishing a perimeter at a hazardous...
The Incident Command System is a management system used at only...
Biological WMD agents are:
What are the two types of decontamination in the event of...
What are the reasons for conducting a Vulnerability Assessment?
International terrorist groups include all of the following...
Which of the following are three main segments of domestic...
Which of the public agencies listed can law enforcement...
Information that has gone through the intelligence cycle is which...
SEMS is a component of ICS?
ELF and ALF are forms of what type of terrorist groups?
Which one of the following is not one of the 12 "Government/...
Isolation, Identification, Notification,...
Prevention and deterrence, notification, response phase...
A counter measure for terrorist surveillance (recon) would be to cut...
SEMS is designed to ensure that all public agencies have a...
Indicators that may precede the deployment of a WMD include:
One ICS principle relates to the supervisory structure of...
Which of the following is not a critical infrastructure?
The ability to communicate within ICS is absolutely critical....
\Which of the following is clearly the "weapons of choice"...
The highest level for skin, eyes, or respiratory tract protection...