AFTP Antiterrorism Level 1 Pre-Test Answers 2023/2024 - Learnexams (2024)

We thoroughly check each answer to a question to provide you with the most correct answers. Found a mistake? Tell us about it through the REPORT button at the bottom of the page. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions.

Contents hide
1 AFTP Antiterrorism Level 1 Pre-Test Answers
2 Importance of Antiterrorism Training
3 Understanding Terrorism
3.1 Common Forms of Terrorism
4 Threat Awareness
Overview of AFTP Antiterrorism Level 1 Course:

The AFTP (Air Force Training Program) Antiterrorism Level 1 Course is designed to provide foundational knowledge and understanding of antiterrorism principles.
The course aims to equip individuals with essential skills to identify and respond to potential terrorist threats.
It is intended for all Department of Defense (DoD) affiliated personnel. This includes military service members, civilian personnel, and family members.
The content is divided into several key areas, including the nature of terrorism, threat awareness, antiterrorism measures, emergency preparedness, reporting procedures, and real-world case studies.
AFTP Antiterrorism Level 1 Pre-Test Answers
No. Question Choices Correct Answer
1 True or False: When possible, it is best to always travel with a cell phone. (Antiterrorism Scenario Training, Page 2) [objective25] False, True True
2 True or False: In the event of a skyjacking, you should immediately attempt to subdue the skyjackers. (Antiterrorism Scenario Training, Page 4) [objective24] False, True False
3 True or False: The ticketing area is more secure than the area beyond the security check point. (Antiterrorism Scenario Training, Page 3) [objective12] False, True False
4 Keeping a well-maintained vehicle is considered a “best practice” from both a security and safety perspective. True or False? (Antiterrorism Scenario Training, Page 2) [objective13] False, True True
5 True or False: Internet acquaintances can pose a security threat and should be carefully monitored. (Antiterrorism Scenario Training, Page 5) [objective22] True, False True
6 Force Protection Condition DELTA means that your base is at which one of the following? (Introduction to Antiterrorism, Page 10) [objective3] The least increased level of protection, The most increased level of protection, A medium level of protection The most increased level of protection
7 Which of the following is NOT a recommended response to an active shooter incident? (Antiterrorism Scenario Training, Pages 3 and 4) [objective9] Look for a place to hide or an area that can be barricaded, Look for possible escape routes from the area, Find something solid to dive behind, Provide instructions to arriving emergency response personnel, If necessary, actively resist the perpetrator Provide instructions to arriving emergency response personnel
8 Which one of the following is NOT an early indicator of a potential insider threat? (Antiterrorism Scenario Training, Page 3) [objective8] Anti-American statements asserting that US policy and authority is illegitimate, Abnormal mood swings, depression, and suicidal remarks, Aggression or threats toward co-workers, Presence of unauthorized weapons, A reasonable disagreement with a US Government policy A reasonable disagreement with a US Government policy
9 Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Antiterrorism Scenario Training, Page 1) [objective11] None of these answers, Political events, Sporting events, Places of religious association, Public infrastructure None of these answers
10 True or False: Terrorists usually avoid tourist locations since they are not DOD-related. (Antiterrorism Scenario Training, Page 1) True, False False
11 Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting. True or False? (Antiterrorism Scenario Training, Page 2) [objective10] False, True True
12 Select all factors that are ways in which you might become the victim of a terrorist attack. (Introduction to Antiterrorism, Page 4) [objective2] Opportunity, Predictability, Location, Association All
13 Alerts from the National Terrorism Advisory System apply only to the United States and its possessions. (Introduction to Antiterrorism, Page 12) [objective4] True, False True
14 Electronic audio and video devices are never used by terrorists for surveillance purposes. True or False? (Antiterrorism Scenario Training, Page 4) [objective6] True, False False
15 True or False: The initial moments of a hostage taking incident can be extremely dangerous. (Antiterrorism Scenario Training, Page 2) [objective27] True, False True
16 Which of the following is NOT an Antiterrorism Level I theme? (Antiterrorism Scenario Training, Page 2) [objective5] Report and Respond, Counter-surveillance, Don’t be a Target, Be Vigilant, Anticipate Counter-surveillance
17 Persons who have been given access to an installation can be counted on to be of no threat. True or False? (Antiterrorism Scenario Training, Page 3) [objective7] True, False False
18 True or False: Room invasions are a significant security issue for hotels located in CONUS. (Antiterrorism Scenario Training, Page 1) [objective26] True, False True
19 True or False: In an active shooter incident involving firearms you should immediately lie on the ground. (Antiterrorism Scenario Training, Page 2) [objective21] True, False False
20 True or False: From a security perspective, the best rooms are directly next to emergency exits. (Antiterrorism Scenario Training, Page 3) [objective14] False, True False
21 From the following choices, select the factors you should consider to understand the threat in your environment. (Introduction to Antiterrorism, Page 3) [objective1] Are terrorist groups in the area?, How sophisticated are terrorist groups?, What tactics and weapons are used by terrorist groups?, Will local citizens warn Americans about terrorist groups?, Are terrorist groups violent?, Are terrorist groups predictable?, Do terrorist groups attack Americans?, How active are terrorist groups? All
22 True or False: Everyone on an installation has shared responsibility for security. (Antiterrorism Scenario Training, Page 2) [objective19] False, True True
23 IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment. True or False? (Antiterrorism Scenario Training, Page 3) [objective28] True, False True
24 Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident. (Antiterrorism Scenario Training, Page 4) [objective20] False, True True
25 What should you NOT do during a hostage rescue attempt? (Antiterrorism Scenario Training, Page 4) [objective15] Remain still and low to the ground, Expect to be handcuffed and detained by hostage rescue team, Try to assist hostage rescue team, Encourage others around you to remain calm, Follow instructions of hostage rescue team Try to assist hostage rescue team
26 Early symptoms of a biological attack may appear the same as common illnesses. True or False? (Antiterrorism Scenario Training, Page 2) [objective16] True, False True
27 True or False: Security is a team effort. (Antiterrorism Scenario Training, Page 6) [objective17] False, True True
28 True or False: Surveillance can be performed through either stationary or mobile means. (Antiterrorism Scenario Training, Page 3) [objective18] True, False True
29 Which of the following is NOT a useful vehicle feature from a security perspective? Air bags, Power locks, Power windows, Internal hood release lever, Lock on gas cap Air bags
30 If you identify a possible surveillance attempt you should try to handle the situation yourself. (Antiterrorism Scenario Training, Page 2) True, False False
31 Which one of these does NOT pose a risk to security at a government facility? (Antiterrorism Scenario Training, Page 2) A person found in an inappropriate location of the facility, Inattentive guard personnel, A visitor showing an unusual interest in details of security procedures, An “escort required” visitor found without an escort, A person expressing boredom with the US mission A person expressing boredom with the US mission
32 True or False: Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom. (Antiterrorism Scenario Training, Page 1) True, False True
33 Which one of these is a possible indicator of a suspicious letter or package? (Antiterrorism Scenario Training, Page 4) Misspellings of common words, Correct amount of postage, Mailing address providing a complete and correct name, Evenly distributed and well balanced parcel, A return address that matches the postmark Misspellings of common words
34 Which one of these is NOT a physical security feature you should check when inspecting your hotel room? (Antiterrorism Scenario Training, Page 4) Operational telephone, Functioning locks on doors and windows, Proximity of room to emergency exits, Lockbox or safe, Whether or not the door is solid Lockbox or safe
35 What is NOT a physical security measure for your home? (Antiterrorism Scenario Training, Page 2) Hiding a key outside to ensure family members can get in if they lose their keys, Monitoring Internet acquaintances of all family members, Confirming that a cleaning company is reliable and licensed, Changing locks to ensure key control, Having good relations with neighbors and looking out for each other Hiding a key outside to ensure family members can get in if they lose their keys
36 True or False: Active resistance should be the immediate response to an active shooter incident. (Antiterrorism Scenario Training, Page 4) True, False False
Importance of Antiterrorism Training
Antiterrorism training is crucial for ensuring the safety and security of individuals, groups, and institutions affiliated with the DoD. In the face of evolving global security challenges, understanding the threat of terrorism is essential. The training helps to build a culture of vigilance, awareness, and readiness to respond to potential threats.

It aids in the prevention and mitigation of terrorist activities by providing the tools to recognize suspicious behaviors, manage risks, and act appropriately in case of a terrorist incident.

Furthermore, the training underscores the role that each individual plays in the collective security of the DoD and the nation as a whole.

Understanding Terrorism
Terrorism is typically defined as the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims. It can also be described as a strategy of coercion that involves the spread of fear, disruption, and violence, initiated for political, religious, or ideological goals. It’s important to note that definitions of terrorism can vary slightly among different organizations and legal systems.

Terrorism as a tactic has been employed throughout history, from the Zealots of the first century AD to the Anarchist movement of the 19th century.

More recent examples of terrorist groups include Al-Qaeda responsible for the 9/11 attacks, the Irish Republican Army (IRA) active in the late 20th century, and ISIS, which declared a caliphate in portions of Syria and Iraq.

These historical instances demonstrate that terrorism is not limited to any one region, belief system, or time period and can manifest differently depending on the context.

Terrorist Goals and Tactics:

While specific objectives can vary greatly among terrorist groups, common goals often include political change, destabilization of an existing power structure, or bringing attention to a cause.
Terrorist tactics are usually characterized by surprise attacks on civilian targets. These tactics aim to create a climate of fear that can lead to overreactions from the targeted government or population, furthering the terrorists’ goals.
Tactics can include bombings, shootings, hostage-taking, cyber attacks, and even the use of vehicles as weapons.
Common Forms of Terrorism
There are several types of terrorism, including domestic terrorism (occurring primarily within the territorial jurisdiction of the home country), international terrorism (transcending national boundaries), and state-sponsored terrorism (supported by national governments).
Other forms include religious terrorism (motivated by religious ideologies), eco-terrorism (violence in the interests of environmentalism), and cyber terrorism (use of computers and the Internet to commit violent acts that harm or kill).
Each form of terrorism presents its own unique set of threats and requires a nuanced approach for prevention and response.
Threat Awareness
Identifying Potential Threats:

Identifying potential threats involves being aware of one’s environment, both physical and digital, and being vigilant for signs of potential terrorist activity.
Threats can come in various forms, including suspicious individuals, unattended packages, vehicles, or unusual activities.
It’s also important to consider the online landscape, such as the spread of extremist ideologies on social media, or cyber threats targeting critical infrastructure.
Understanding Threat Levels:

Threat levels provide a means of communicating the risk of a terrorist attack to the public and law enforcement agencies.
These levels can range from low (an attack is unlikely) to critical (an attack is expected imminently), and are typically set by government security agencies based on the current intelligence picture.
Understanding threat levels can help individuals and organizations take appropriate security measures and stay vigilant.
Recognizing Suspicious Behaviors and Activities:

Suspicious behaviors can range from a person showing unusual interest in critical locations (e.g., power plants, bridges, government buildings), to unusual purchases (e.g., large quantities of fertilizer, chemicals, or suspiciously obtained police or military equipment).
Suspicious activities can also include unscheduled deliveries, abandoned vehicles, or unusual patterns of travel.
Cyber activities such as frequent visits to extremist websites, online posts supporting violent actions, or attempts to gather sensitive information can also signal potential threats.
Recognizing these behaviors and activities can aid in reporting and preventing possible terrorist activities.

AFTP Antiterrorism Level 1 Pre-Test Answers 2023/2024 - Learnexams (2024)

FAQs

How long is antiterrorism level 1 good for? ›

To comply with DODI 2000.16-V1 Antiterrorism Standards, all Defense Department employees and DOD contractors must follow the outlined instructions and information listed below to ensure you have a safe trip: Level I Antiterrorism Training must be completed within 12 months of travel.

What is the course code for anti terrorism level 1? ›

To access a course, type in the title of the course, "Joint Anti-Terrorism Level 1" or course code "JATLV10000", into the search window and click the search catalog button. In the next window, click enroll icon to launch the course.

Where can I find antiterrorism level 1? ›

Access AT Level I Awareness training on Joint Knowledge Online (JKO) by accessing the JKO website: http://jko.jten.mil/courses/atl1/launch.html. 2. Start training by clicking the “Start” tab at the top of the page.

What are the level 1 antiterrorism themes? ›

The four AT Level I themes: Anticipate, Be Vigilant, Don't be a Target, and Respond and Report. Anticipating threats, risks, and vulnerabilities is key to antiterrorism security and personal protection.

Is at level 1 an annual requirement? ›

Level I Antiterrorism Awareness Training. This stand alone training is sponsored by the Joint Staff in coordination with the Military Services. Completion of this training meets the annual requirement for Level I Antiterrorism Training prescribed by DoDI 2000.16.

How long is the SERE 100 good for? ›

SERE certificates are valid for 2-3 years, depending on the destination AOR. The SERE 100.2 training takes approximately 3 hours to complete and it must be done in a single sitting.

What are the five elements of the antiterrorism program? ›

(U) According to DoDI 0-2000.16, the five minimum required elements ofa DoD Component antiterrorism program are risk management, planning, training and exercises, resource application, and comprehensive antiterrorism program review.

What is ATFP awareness training? ›

The purpose of this training is to increase your awareness of terrorism and to improve your ability to apply personal protective measures.

How do terrorists select their targets? ›

How Terrorists Select their Targets: Consider ways you might become a victim of a terrorist attack. Factors to keep in mind include: Location: Terrorists may target locations frequented by Americans or US military personnel such as certain hotels, apartment buildings, public transportation centers, and nightclubs.

What is an antiterrorism officer? ›

ATFP/RIVERINE - Anti-Terrorism Force Protection Officer/Riverine Forces Personnel. Collateral Duty/Assignment Description. ATFP: Directs, plans, administers and supervises a command's force protection efforts and anti-terrorism training programs.

What type of program is antiterrorism? ›

The Antiterrorism Assistance program (ATA) is the U.S. government's premier provider of counterterrorism training and equipment grants to foreign law enforcement. ATA was created by the U.S. Congress in 1983 following a series of devastating terrorist attacks overseas, particularly in Beirut, Lebanon.

What is the most increased force protection? ›

FPCON Delta, the highest and most protective level, limits installation access to mission-essential personnel and other personnel as determined by the commander.

What are the 5 levels of force protection? ›

GRAFENWOEHR, Germany — The Army in Europe relies on five Force Protection Condition (FPCON) levels — Normal, A, B, C and D — or as the Army says, Normal, Alpha, Bravo, Charlie and Delta.

What are the 5 threat levels set by JTAC? ›

There are 5 levels of threat:
  • low - an attack is highly unlikely.
  • moderate - an attack is possible but not likely.
  • substantial - an attack is likely.
  • severe - an attack is highly likely.
  • critical - an attack is highly likely in the near future.

What would you do to counter the insider threat? ›

The key steps to mitigate insider threat are Define, Detect and Identify, Assess, and Manage. Threat detection and identification is the process by which persons who might present an insider threat risk due to their observable, concerning behaviors come to the attention of an organization or insider threat team.

How long are army certs good for? ›

After the exam, they are taken outside to perform mock scenarios as a culminating experience. Upon successful completion of the course, the Soldier is certified for one year and an annual recertification is required.

How often should I update isoprep? ›

Personnel are required to digitally submit their ISOPREP within six months of entering USSOUTHCOM AOR or, if already completed, personnel must review/update their ISOPREP every six months at the minimum, and prior to travel within the AOR.

How long is SERE CBT good for? ›

In order to stay current, members must complete the course once every 20 months.

How long does SERE last? ›

The SERE Specialist training pipeline lasts approximately one year. During this time you'll learn global SERE techniques and procedures, PR planning and execution functions and attend Basic Army Airborne School.

References

Top Articles
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 6625

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.