Volume 4 Flashcards
- (601) Which of the following results from the measures taken by commanders to protect their forces?
c. Security.
- (601) Which principle of war is the most effective and decisive way to attain a clearly defined objective and is the means by which a military force seizes and holds the initiative while maintaining freedom of action and achieving decisive results?
b. Offensive.
- (602) What is achieved by the balanced employment of firepower and patrolling?
d. Aggressive defense.
- (602) A force can dominate an area, place direct or indirect fire on critical resources by capturing
a. key terrains.
- (603) After the threat has been neutralized, which integrated defense effect is implemented to consolidate and reorganize friendly forces and restore operations?
c. Recovery.
- (604) Which force is the Air Force enterprise leader for integrated defense operations?
b. Security forces.
- (605) Which agency will the base defense operations center up-channel COVERED WAGON reportable incidents through?
d. Installation command post.
- (605) The jettisoning of a nuclear weapon or nuclear component is an example of a nuclear weapons
a. accident.
- (606) Personnel assigned to the Priority III routine category should be evacuated within how many hours?
d. 24.
- (606) What may be the most dangerous type of improvised explosive device?
c. Vehicle-borne.
- (607) Who directs US forces to respond rapidly to certain crises either unilaterally or as a part of an interagency and/or multinational effort?
c. President or Secretary of Defense.
- (608) Which operation is principally conducted to evacuate US citizens?
d. Noncombatant evacuation.
- (608) Which operation may be clandestine, covert, or overt depending on whether the operational environment is hostile, uncertain, or permissive?
d. Recovery.
- (609) Which intelligence collection often may provide the most useful source of information?
c. HUMINT.
- (609) Force protection measures will be planned according with
b. the risks to the force
- (610) Which type of attack may involve an insider threat?
b. Penetration attack.
- (611) Which agency is the lead for terrorist incidents that occur outside the US?
a. Department of State.
- (611) The tactic terrorist groups use most commonly is
b. bombing.
- (612) Active terrorist groups are organized into cells that can be as small as two people or as large as
c. 25–30.
- (612) Which individuals/groups promote their cause by any means and are ideologically inspired?
d. Crusaders.
- (613) What threat level assessment indicates anti-US terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation?
c. High.
- (614) The key distinction between an insurgency and other types of movements is the decision to use
a. violence to achieve political goals.
- (614) COIN operations require leaders to exhibit
c. patience, persistence, and presence.
- (614) To avoid detection by the government, how will insurgents operate?
c. In small bands.
- (615) Which agency was created by a formal agreement between two or more governments?
d. Intergovernmental organization.
- (615) Which agency is the most notable intergovernmental organization?
a. The United Nations.
- (616) Aerial ports of debarkation, border crossings, and seaports of debarkation are all examples of key
c. sovereignty issues.
- (617) Which base is austerely manned but is capable of expanding into a full-scale air base operation?
d. Forward operating base.
- (617) What do peacetime or contingency operations require when planning how and where to use security forces unit UTC?
d. Flexibility.
- (618) During base defense operations what does the DFC use staff control tools for?
d. Disseminate his or her orders and manage the base defense operations plan.
- (618) An effective tool to control integrated defense operations is
a. charts and forms.
- (618) What should a flight sector sketch show?
b. Flight and squadron identification.
- (619) In what year did the Geneva Conventions become effective?
b. 1956.
- (620) Why is speed essential when processing captives, detainees, and prisoners?
c. The intelligence a CDP brings in is time sensitive.
- (621) The safe operating distance of radio frequency transmitters around refueling locations is
a. 20 meters.
- (621) To avoid receiving an electrical shock when disconnecting the battery from the electronic security systems (ESS),
b. remove the positive lead first.
- (622) Which function provides transmission of data between the TASS sensors and annunciators?
c. Communications.
- (623) What security system consists of a variety of sensors, repeaters, and a hand-held display monitor?
b. TMS.
- (624) A scanning method known as the self preservation method of search lasts approximately
d. 30 seconds.
- (624) When marking targets, the more effective means of delivering accurate fire is
b. aiming point.