Flt Sgt 2 Flashcards
- How often should Flight Sergeants conduct post checks? (AFMAN 31-201v3 para 1.12.2.3)
at least once each tour of duty
What information should the Fight Sergeant ensure is briefed during guard mount? (AFI 31-118 para 4.2.1)
Answer: Weapons safety, ground safety, K9 safety, vehicle safety, exercise safety, current FPCON, sign/countersign, duress words and BOLO bulletins
The Desk Sergeant will instruct installation entry control points to stop all in bound and out bound traffic when an alarm originates from AA&E facilities. (EXHIBIT 1 TO TAB I TO APPENDIX 1 TO ANNEX M OF 412 TW IDP 31, Vol.1 para. 3.2.1.3)
true
. How many Security Forces members make up a “Response Force” and what is their response time? (TAB S TO APPENDIX 2 TO ANNEX M OF 412 TW IDP 31, Vol.1 para. 2.2.4.2)
Answer: 15 Security Forces members capable of responding within 5 minutes
How many Security Forces members make up an “Augmentation Force” and what is their response time? (EXHIBIT 2 TO TAB D TO APPENDIX 23 TO ANNEX X OF 412 TW IDP 31,
Answer: 44 military personnel capable of responding in 4 hours.
Security for limited life components, classified nuclear support material, and sanitized aircraft, is referred to as______. (EXHIBIT 1 TO TAB D TO APPENDIX 23 TO ANNEX X OF 412 TW IDP 31, Vol.1 para 3.1.1.2)
Answer: Type II
. During a Bomb Threat, what is the proper initial cordon size if the device is LARGER than a 55 gallon drum? (TAB D TO APPENDIX 2 TO ANNEX M OF 412 TW IDP 31, Vol.1 para
1000 ft cordon
Who can you release an enlisted military member to? (AFI 31-118 para. 11.7.4)
Answer: First Sergeant, Unit or Section Commander, Supervisor in the grade of E-7 or above.
Under what circumstances are OFF-BASE vehicle pursuits authorized? (APPENDIX 2 TO ANNEX K OF EADB IDP 31, VOL 1. para 2.5.3)
Answer: To contain a suspect who has committed a felony, theft of classified materials, or if weapons are involved and only when approved by the on-duty Flight Sergeant or above.
many Security Forces members make up a “Backup Force” and what is their response time? (Attachment How 1 to Exhibit 3 To Tab D To Appendix 23 to Annex X Of 412 TW IDP 31, Vol.1 Per. Note 2)
Answer: 17 Security Forces members capable of responding in 30 minutes.
The 412th Security Forces Squadron will provide escorts for funds in excess of______.
(EXHIBIT 1 TO TAB D TO APPENDIX 1 TO ANNEX M OF 412 TW IDP 31, Vol.1 para
2.1.1 and 2.1.3)
Answer: $25,000
Security Forces (SF) personnel conducting a funds escort are authorized to carry money for the funds custodian. (AFI 31-101 para 8.4.4.7)
false
. During a Bomb Threat, what is the proper initial cordon size if the device is SMALLER than a 55 gallon drum? (TAB D TO APPENDIX 2 TO ANNEX M OF 412 TW IDP 31, Vol.1 para.
500 ft cordon
. What is a “TACAMO” aircraft? (AFI 31-101 par 9.2.2.2)
Answer: Navy E-6 aircraft that temporarily fly in and out of Edwards AFB. The letters stand for “Take Charge and Move Out”.
What is the term used to describe an unclassified up-channel report informing higher headquarters of an unusual incident affecting Protection Level (PL) 1, 2, or 3 resources, probably or actually hostile, occurring at an installation or dispersed site? (AFI 31-101 para 2.8.1)
covered wagon
- Who should be present when advising a JUVENILE suspect of his/her legal rights? (AFI 31118 para 6.8.6.6)
parents or legal guardian
An unclassified message relayed by the Emergency Control Center (ECC) to the Edwards AFB Command Post of an unusual incident, possibly hostile, affecting Protection Level I, II, or III resources is called a what? (SFTRG 1 section 8.1)
Security Incident
RIEVC
Random Installation ENTRY/EXIT Vehicle Check
What are the 5 phase for AFIMS
Airforce incident management system
Prevention, protection, response, recovery and mitigation
What is prevention in AFIMS
Prevention gathers intelligence collection and analysis, active defense, fire prevention disease prevention and contamination prevention
What is protection in AFIMS
Protection from terrorism and man made or natural disasters
What is response in AFIMS
Action taken during an incident which include deploying the disaster response force, implementing response plans and initiating the installation notification and warning system.
What is recovery in AFIMS
Casualty treatment, rendering unexploded ordnance safe, personnel and resources decontamination. Recovery planning start immediately
What is mitagation in AFIMS
Every phase of the incident management. It is designed to reduce or eliminate risks to persons or property