202.02B Fireground Strategy Flashcards
Once a structure is determined safe, an offensive fire attack is centered around?
Rescue
What two strategies do fireground operations fall under?
Offensive and Defensive
What are the two fireground strategies based on?
Risk Management Plan
What is the Risk Management Plan?
- We may risk our lives a lot to save savable lives
- We may risk our lives a little to protect savable property
- We will not risk our lives at all to save what is already lost.
Who will choose the proper strategy to be used during an incident?
Incident Commander
What are 5 factors the IC considers when deciding what strategy?
- Building
- contents vs. structural involvement
- fire load
- fire and smoke conditions
- rescue profile
When does managing fireground strategy start?
Arrival of first unit and constantly monitored and evaluated throughout incident
In some cases the most effective tactical analysis involves an evaluation of what is ________ rather than what is actually on fire
Not burning
You should avoid Offensive and Defensive strategies in the same fire area. (true/false)
True
What are 5 guidelines for an offensive fire attack?
- assign IRIC team
- support primary search
- determine fire conditions and extent
- fought from interior unburned side
- avoid exterior application of water
Command must consider the most critical direction & avenues of fire extension, plus its speed, particularly as they affect what?
- Rescue activities
- Level of risk to FF
- Confinement efforts
- Exposure protection
What are the 7 sides of a fire?
- Front -Both sides -Top
- Rear - bottom -interior
The rescue/fire control-extension/exposure problem is solved in the majority of cases by what?
a fast, strong, well-placed attack
Command must establish an attack plan that overpowers the fire with actual?
-Water Application
Failure to check all seven sides of the fire leads to?
Extension
-What is a major support item that must be addressed early during concealed space attacks?
Early Ventilation
-What are the 3 basic variables relating to attack operations?
- Location/position of attack
- size of attack
- support functions