SF 4 Flashcards
What analytical process is used to achieve integrated defense?
ID risk management
The first step and risk analysis is asset
Criticality assessment
Who must review the installation entry procedures for legal sufficiency?
Staff judge advocate
Through which agency will the base defense operation center up channel covered wagon reportable incidents?
Installation command post
The jettisoning of a nuclear weapon or nuclear component is an example of a nuclear weapon
Accident
What does the color code yellow indicate when calling in a lace report?
Greater than 33% available
Personnel assigned the priority II priority category should be evacuated with and how many hours?
4
Personals onto the priority III routine category should be evacuated with and how many hours?
24
We must approve each installation localized integrated defense plan?
Installation commander
Who determines what post are not staffed during funding or personal shortages?
Defense force commander
How many days are the majority of security forces unit take codes capable of existing without support?
Five
Which type of attack me involve an insider threat?
Penetration
Which agency is the need for terrorist incidents that occur outside the US?
Department of state
Which agency is the lead for domestic terrorism within US?
Department of justice
What type of supporters do not actually commit violent acts but assist the terrorists by providing money, intelligence, legal, or medical services?
Active supporters
What threat level assessment indicates anti-US terrorists or operationally active and use large casualty producing attacks as their preferred method of operation?
Significant
What terrorist threat level factor focuses on the attack method used by the group and other measures enhancing it’s effectiveness, such as a state sponsorship and ingenious use of technology?
Operational capability
What threat level is considered a peacetime threat and increases in frequency and transitions to a wartime threat before the beginning of open hostilities or a rise in hostilities?
Threat level I
What threat level consists of gorilla forces, unconventional warfare forces, or small tactical units?
Threat level II
What does artifact is achieved good lighting, intrusion detection systems, early warning systems, and closed – circuit television?
Detect
What desired effect is achieved through threat and effects based planning that integrate all friendly forces into a single, comprehensive plan, and ensuring friendly forces are trained and qualified on arming and use of force?
Defend
How many random antiterrorist measures choosing from higher force protection conditions are required daily?
At least three
How long has the US military been called upon to defeat insurgencies?
More than two centuries
What most units to develop about the area of responsibility to include religious customs, nuances of local leaders, local culture, And terrain?
Common operating picture
What will insurgents resort to if they cannot persuade locals to help or refrain from hindering them?
Coercion
Joint doctrine defines a non-governmental organization as a
Private self-governing, not-for-profit organization
What type of agency is created by formal agreement between two or more governments?
Intergovernmental organization
Which agency is the most notable intergovernmental organization in the world?
United Nations
To avoid adverse affect on operations, commanders should address also sovereignty issues through the chain of command to the US
Ambassador
Ariel ports of debarkation, border crossings, and seaports debarkation are all examples of key
Sovereignty issues
If countries do not use the English alphabet, combatant command wide standard for spelling names should be set by the
Non-DOD agencies
Who primarily uses alternate funding positions?
Crew-served weapons operator