Force Protection
True or false: Terrorism is the spontaneous use of violence; it does not include threats of violence to cause fear. False Scenario. TSgt Brown is assigned overseas and is planning a vacation to a nearby country. She remembers from her Force Protection training that there are eight factors she should consider to understand terrorist threats. […]
Approver (COL/TAOCO) – Annual TAOCO (COL) Refresher Training
What does Federal law say about certifying officers? DoD must use them, and they always have full pecuniary liability. Which of the following statements is TRUE about negligence as it applies to a certifying officer? A certifying officer is presumed negligent when there is a fiscal irregularity. Which of the following is a TRUE statement […]
DoD Mandatory Controlled Unclassified Information (CUI) Training 2024
CUI documents must be reviewed according to which procedures before destruction? Records Management It is mandatory to include a banner marking at the top of the page to alert the user that CUI is present. True Who can decontrol CUI? All of the above What is controlled unclassified information (CUI)? Unclassified information requiring safeguarding and […]
Concussion Training for Service Members – JKO
After being involved in an accident during a training event, Corporal Morales hit her head and was dazed and confused for a couple of seconds. Corporal Morales brushed off her injury and was reluctant to go to the medical center to get checked out. If Corporal Morales did not get checked out and had sustained […]
Marking Special Categories of Classified Information
Information may become classified when _____. national security could be jeopardized What is the purpose of marking classified information? Provide required information about classification, including handling and dissemination instructions The Information Security Oversight Office (ISOO) released 32 CFR Parts 2001 and 2003, which established _____. an implementation guide for the classification of national security information […]
Non-Kinetic Operations
Drag each Service logo to its perspective IW/IO definition: Air Force – The employment of military capabilities in and through the information environment to deliberately affect adversary human and system behavior and preserve friendly freedom of action during cooperation, competition, and conflict. Army – The Information Advantage (IA) and Decision Dominance (DD) doctrinal framework, where […]
Concussion Training for Service Members
You are looking for guidance on the management of concussion prior to a deployment. Where would be the best place to locate this information? Select the correct answer. Visit the DVBIC (TBI Center of Excellence) website. Which of the following are associated with sustaining multiple concussions? Select ALL that apply. You may experience more severe […]
DOD Initial Orientation and Awareness Training
Which of the following methods may be used to transmit Top Secret material? Appropriately cleared courier Protected facsimile, message or voice Good Operations Security (OPSEC) practices DO NOT include: Discussing sensitive information carefully in public In addition to foreign travel requirements, those with SCI access must: Complete a foreign travel questionnaire prior to proceeding on […]
Annual Security Awareness Refresher
The Personnel Security Program protects national security by ensuring that individuals granted access to classified information? Are, and will remain, loyal, trustworthy, and reliable Trusted Workforce 2.0 is an initiative to modernize federal personnel vetting. The reforms focus on: All of the above Which of the following must be reported: All of the above Controlled […]
Derivative Classification
All of the following are effects of derivative classification EXCEPT: Making the initial determination that information requires protection against unauthorized disclosure in the interest of national security. The source document states: (S) The exercise will begin on 4 May and end on 25 May (U) Elements of this unit will participate in the exercise (U) […]
Integrated Defense
Threats to air bases are grouped into ________ Three levels FPCON is the acronym for ________. Force protection condition How many force protection levels are there 5 What must an observer be able to do when estimating a range of 100 meters? Visualize a distance of 100 meters on the ground When performing perimeter security […]
Law Of War
In addition to applying to the conduct of hostilities, the Law of War also applies to duties during peacetime and occupation. True How does Human Rights Law differ from the Law of War? Human Rights Law deals with individual rights against abuses by their government, while the Law of War regulates the conduct of hostilities. […]
SERE 100.2 Level A Post Test
Ensure you record data about your communication devices, i.e. cellular phone, survival radio, and personal locator beacon on your ___________________ prior to deploying or mission execution. EPA Which of the following are consumable sources of water? – Rainfall– Water from plants– Melted snow Which of the following actions are appropriate for treating a wound? All […]
SERE 100.2 Level A Pretest
What are some methods to purify water? (Select all that apply) -Chemically treating water with chlorine or iodine-Purifying with a commercial micro filter-Boiling vigorously for at least one minute What pre-deployment document requires you to provide, four personal authentication statements, full front and right side photographs, and fingerprints? -DD Form 1833 Isolated Personnel Report (ISOPREP) […]
OPSEC Annual Awareness 2024
OPSEC is a five-step process to identify, control and protect critical information and analyze friendly actions and indicators that would allow adversaries or potential adversaries to identify and exploit vulnerabilities True Critical Information is ________? unclassified and controlled unclassified information (CUI) Which one would be considered critical information? – Deployment dates and locations– Military operations– […]
SIPRNET Security Annual Refresher Training
The security of classified military information is not only a command responsibility of which of the following personnel? All of the Above Who maintains the security clearance access roster for the command? The Command Security Manager Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance? Storing and or using cellular telephones […]
Cyber Awareness Challenge 2024
How can you protect your home computer? Turn on the password feature Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? Forward it Which of the following is an appropriate use of government e-mail? Using […]