0 of 57 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 57 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
What does a LOW threat level indicate?
Which threat level means an attack is possible but not likely?
If the threat level is SUBSTANTIAL, what does this mean?
What does a SEVERE threat level indicate?
Which threat level means an attack is highly likely in the near future?
Arrange the following threat levels in order of increasing likelihood of attack:
You are monitoring CCTV when you notice an individual acting suspiciously near a crowded area carrying a large backpack. Suddenly, the person runs towards the crowd. What type of terror attack does this scenario most likely represent?
While on patrol, you observe a vehicle speeding toward a group of pedestrians in a busy marketplace. What is the most likely attack method being attempted?
During a security sweep, you find a suspicious package left unattended near a building entrance. What kind of threat could this potentially represent?
You receive an alert that a trusted employee has been accessing sensitive systems without permission and sending information externally. Which threat does this scenario describe?
Intelligence reports indicate a planned attack using hazardous chemicals targeting a public event. What type of attack should security operatives prepare for?
A group of terrorists attempts to cause mass casualties using firearms and knives in a shopping mall. What type of attack does this describe?
During your shift, the venue’s security system suddenly goes offline, and you notice that access to CCTV feeds and door controls is lost. IT staff inform you that the network is under a coordinated cyber attack. What is the most appropriate classification of this threat?
What is the most appropriate response a security operative should take upon receiving information about a possible bomb threat?
During a suspected terror incident in a shopping centre, what is the most appropriate immediate response for a security operative?
What is one of the key responsibilities of a security operative during a terrorist incident?
What is a major risk associated with evacuation during a terror incident?
In a lockdown (invacuation) situation, what is a potential downside to consider?
You witness a suspicious individual drop a backpack and walk away quickly. What should you do?
What should you report to police during a terror incident?
Which organisation provides advice and guidance for counter-terrorism in public spaces?
What does “SCaN” stand for in counter-terrorism awareness?
If a security operative becomes aware that a known group of terrorists is actively attacking the premises, what should they do first?
Which of the following best describes the HOT principles used for identifying suspicious items?
What is the correct order of the Four Cs when responding to a suspicious item?
If a large vehicle is suspected of containing an explosive device, what is the minimum safety distance that should be maintained?
When dealing with a suspicious package, why should radios and mobile phones not be used within 15 metres?
You discover a backpack hidden behind a bin in a public area. It appears out of place and no one claims it. What is your immediate next action following the Four Cs procedure?
How could you visually explain a 100-metre safety distance to members of the public in a relatable way?
Which of the following is an example of hostile reconnaissance?
Which behaviour might indicate suspicious activity in relation to terrorism?
What action can best deter hostile reconnaissance?
Which of the following could be considered a suspicious item or action?
You notice someone taking photos of CCTV cameras and access points around the perimeter of a building. What should you do?
A person is loitering outside your site entrance, occasionally speaking on the phone and watching the flow of staff. After 30 minutes, they leave but return later. What is the most appropriate action?
Which of the following could be a potential sign of terrorist-related behaviour?
Which of the following is a key reason why visible security presence helps deter hostile reconnaissance?
What should a security operative do if they observe suspicious behaviour that does not require an emergency response?
Which of the following is an effective way to disrupt potential hostile reconnaissance?
A security guard notices a person loitering near the emergency exit, repeatedly checking their phone and avoiding eye contact with staff. What should the guard do first?
Which of these numbers should you use to report non-emergency suspicious behaviour on transport premises?
Which number should a security operative contact after discovering damage to a perimeter fence following suspicious activity in the area?
Why is it important for a security operative to ensure that security measures are visible to the public?
Which of the following is a recognised method of spiking?
Under current UK legislation, which law makes it illegal to administer a substance to someone without their consent to stupefy or overpower them?
Which of the following could indicate that a drink has been spiked?
Which of the following behaviours could indicate someone is trying to spike another person’s drink?
What is one-way venues can reduce opportunities for drink spiking?
Which of the following is a visible indicator that someone may have been spiked?
What action should door supervisors take if they suspect a person has been spiked?
Which of the following is a preventative measure venue can take against spiking?
When managing a spiking incident, which of the following is important to secure as evidence?
What is the most appropriate action for a security operative to take when responding to a suspected spiking incident at a venue?
Which of the following tools is most appropriate for inspecting underneath a vehicle during a security check?
A security operative suspects that an item has been hidden under a vehicle. What should they use to inspect the underside safely?
What is the main purpose of a search mirror in a security context?
During a vehicle check, what should the operative do before starting the inspection?