Security Forces Journeyman CDC Volume 4

58 Questions | Total Attempts: 1627

SettingsSettingsSettings
Please wait...
Security Forces Journeyman CDC Volume 4

In this security centred quiz, we’ll be looking at the protocols of security force journeymen in their role of nailing their target and defending their employer. How much do you know about the actions needed to be undertaken?


Questions and Answers
  • 1. 
    Which principle of war is the most effective and decisive way to attain a clearly defined objective and is the means by which a military force seizes and holds the initiative while maintaining freedom of action and achieving decisive results?
    • A. 

      Mass

    • B. 

      Offensive

    • C. 

      Manuever

    • D. 

      Economy of force

  • 2. 
    Which of the following results from the measures taken by commanders to protect their forces?
    • A. 

      Simplicity

    • B. 

      Surprise

    • C. 

      Security

    • D. 

      Safety

  • 3. 
    What is achieved by the balanced employment of firepower and patrolling?
    • A. 

      Key terrain

    • B. 

      Defense in depth

    • C. 

      All around defense

    • D. 

      Aggressive defense

  • 4. 
    A force can dominate an area, place direct or indirect fire on critical resources by capturing?
    • A. 

      Key terrain

    • B. 

      High grounds

    • C. 

      Avenues of approach

    • D. 

      Pockets of resistance

  • 5. 
    After the threat has been neutralized which integrated defense effect is implemented to consolidate and reorganize friendly forces and restore operations?
    • A. 

      Warn

    • B. 

      Assess

    • C. 

      Recovery

    • D. 

      Anticipate

  • 6. 
    Which force is the Air Force enterprise leader for integrated defense operations?
    • A. 

      Special force

    • B. 

      Security forces

    • C. 

      Joint forces

    • D. 

      Air and Space forces

  • 7. 
    Which agency will the base defense operations center up-channel covered wagon reportable incidents through?
    • A. 

      Site security control

    • B. 

      Security forces

    • C. 

      Higher headquarters

    • D. 

      Installation command post

  • 8. 
    The jettisoning of a nuclear weapon or nuclear component is an example of a nuclear weapons?
    • A. 

      Accident

    • B. 

      Incident

    • C. 

      Mistake

    • D. 

      Mishap

  • 9. 
    Personnel assigned to the priority III routine category should be evacuated within how many hours?
    • A. 

      2

    • B. 

      4

    • C. 

      12

    • D. 

      24

  • 10. 
    What may be the most dangerous type of improved explosive devise?
    • A. 

      Static

    • B. 

      Roadside

    • C. 

      Vehicle-borne

    • D. 

      Romote detonated

  • 11. 
    Who directs US forces to respond rapidly to certain crises either unilaterlly or as part of an interagency and/or multinational effort?
    • A. 

      President only

    • B. 

      Secretary of defense only

    • C. 

      President or secretary of defense

    • D. 

      President or defense force commander

  • 12. 
    Which operation is principally conducted to evacuate US citizens
    • A. 

      Recovery

    • B. 

      Peace

    • C. 

      Peace enforcement

    • D. 

      Noncompatant evacuation

  • 13. 
    Which operation may be clandestine, covery, or overt depending on whether the operational environment is hostile, uncertain, or permissive?
    • A. 

      Foreign humanitarian assistance

    • B. 

      Consequence management

    • C. 

      Homeland defense

    • D. 

      Recovery

  • 14. 
    Which intelligence collection often may provide the most useful source of information
    • A. 

      OSINT

    • B. 

      COMINT

    • C. 

      HUMINT

    • D. 

      INFOMINT

  • 15. 
    Force protection measures will be planned according with
    • A. 

      Determination of the force

    • B. 

      The risk to the force

    • C. 

      Location of the force

    • D. 

      Size of the force

  • 16. 
    Which type of attack may involve an insider threat?
    • A. 

      Standoff attack

    • B. 

      Penetration attack

    • C. 

      Information operation

    • D. 

      Chemical, biological attack

  • 17. 
    Which agency is the lead for terrorist incidents that occur outside the US?
    • A. 

      Department of state

    • B. 

      Department of justice

    • C. 

      Department of defense

    • D. 

      Federal bureau of investigation

  • 18. 
    The tactic terrorist groups use most commonly is?
    • A. 

      Arson

    • B. 

      Bombing

    • C. 

      Highjacking

    • D. 

      Kidnapping and hostage taking

  • 19. 
    Active terrorist groups are organized into cells that can be as small as two people or as large as?
    • A. 

      5-10

    • B. 

      10-15

    • C. 

      25-30

    • D. 

      35-40

  • 20. 
    Which individual/groups promote their cause by and means and are ideologically inspired?
    • A. 

      Crimanals or professionals

    • B. 

      Emotionally disturbed

    • C. 

      Passive soldiers

    • D. 

      Crusaders

  • 21. 
    What threat level assessment indicates anti-US terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation?
    • A. 

      Moderate

    • B. 

      Significant

    • C. 

      High

    • D. 

      Low

  • 22. 
    The key distinction between an insurgency and other types of movements is the decision to use?
    • A. 

      Violence to achieve political goals

    • B. 

      Violence to achieve religious goals

    • C. 

      Non-violence to achieve political goals

    • D. 

      Use violence to achieve ideological goals

  • 23. 
    COIN operations require leaders to exhibit?
    • A. 

      Fairness, firmness and fight

    • B. 

      Logic, lotalty, and leadership

    • C. 

      Patience, persistence, and presence

    • D. 

      Cooperation, cohesiveness, and confidence

  • 24. 
    To avoid detection by the government how wil insurgents operate?
    • A. 

      Underground

    • B. 

      In disguise

    • C. 

      In small bands

    • D. 

      During the hours of darkness

  • 25. 
    Which agency was created by a formal agreement between two or more governments?
    • A. 

      Multinational corporation

    • B. 

      Governmental organization

    • C. 

      Host nation security council

    • D. 

      Intergovernmental organization