Competency Assesment – Action Counters Terrorism Test Details This is a 40 multiple-choice questions/answers competency test. All question must be completed. Mark one answer per question. 0 points – given if answer is wrong, and 5 points if answer is correct. The form must be submitted within 45 minutes after you start the test. Pass rate is 140 points (70%). Your name and surname will have to be entered after you press the finish button. 1 / 40 1. What type is an acid attack? a. Biological b. Nuclear c. Chemical d. Radiological 2 / 40 2. Which protocols should you follow if you come across a suspected IED (Improvised Explosive Devise)? a. HOT and 4Cs Protocol b. Remove Remove Remove c. Biological Removal d. Warm Protocol 3 / 40 3. Which sector provides the most attractive target for terrorists? a. Military base b. Motorway network c. Agricultural suppliers d. Public and private crowded places 4 / 40 4. What is the first thing security operative should do after receiving a bomb threat over the telephone? a. Inform the management and wait for further instructions b. Assume that the call is a joke and ignore it c. Record the time of the call and report to police immediately d. Search the premisses to try and locate any device 5 / 40 5. When is a hostile most vulnerable? a. In the planning stage of an attack b. During the attack 6 / 40 6. Explain the H.O.T protocol meaning? a. Hidden, obstructed, typical b. Hidden, obviously suspicious, typical c. Hindered, obviously suspicious, typical d. Hidden, obsolete, typical 7 / 40 7. When do you use Run Hide Tell protocol? a. In the event of fire emergency b. In the event of shoplifting c. In the rare events of fire arms or weapons attack d. In the event of lone working hours 8 / 40 8. When hiding during a firearms attack, what one of the actions that you should take? a. Leave your entrance unlocked b. Switch your mobile phone to silent and turn off vibrate c. Shout for help d. Stay near the door 9 / 40 9. What might be the best way to challenge a suspected unauthorised person? a. ‘’ Get away from here’’ b. ‘’ I need you to stop right here’’ c. ‘’ What do you think you are doing?’’ d. ‘’Can I help you?’’ 10 / 40 10. Which of the following would be a reason to evacuate a premisses? a. A threat passed by police b. A drunk customer shouting ‘’bomb’’ c. A customer asking questions about security arrangements d. Multiple sightings of the same person 11 / 40 11. Which of the following represent the UK government threat levels in order of severity? a. Low, Moderate, Substantial, High b. Low, Substantial, Severe, High, Critical c. Low, Moderate, Substantial, Severe, Critical d. Low, Substantial, Severe, Critical 12 / 40 12. You received a phone call: ‘’There is a bomb well hidden in your building. It will go off whenever I choose it to’’ What should you do? a. Exit the building and home immediately b. Ignore the threat c. If no one has done so, call 999 immediately and inform police of the threat d. Look for your manager 13 / 40 13. What does SCaN stand for in security? a. See, control and notify b. See, cordon and note c. See, check and notify d. See, clarify and note 14 / 40 14. When should you use the Run, Hide and Tell principle? a. When carrying out a security risk assessment b. When encountering a suspicious item c. During the fire arms or weapons attack d. When observing suspicious activity 15 / 40 15. Which protocols should you follow in the event of an acid attack? a. Remove Remove Remove b. HOT Protocol c. Why protocol d. Deny, Detect, Deter 16 / 40 16. It is helpful to remember the ACT acronym. What does it stand for? a. Always Challenge Terrorists b. Action Counters Terrorism c. Attackers Can’t Talk d. Anyone Can Terrorise 17 / 40 17. What is not relevant to Remove Remove Remove protocol? a. Remove outer clothing b. Remove the substance from the skin c. Remove affected individuals from the immediate area d. Remove radio and put it on channel ‘1’ 18 / 40 18. What you can NOT do when dealing with members of public, while they are on private premises? a. Request that images are not taken on private property if your organisation has a policy against this b. Remove property from people if it is part of an entry procedure c. View, copy or delete any personal information or images from a camera or smart technology d. Speak to people and ask them their purpose of being there 19 / 40 19. What does a ‘’ critical’’ terror threat level indicate? a. An attack is a strong possibility b. An attack is highly unlikely c. An attack is possible, but not likely d. An attack is highly likely and expected imminently 20 / 40 20. How long should you wait to report suspicious behaviour? a. 48 hours b. 36 hours c. Report it immediately d. 24 hours 21 / 40 21. Which of the following questions could you NOT use to engage people in a friendly, purposeful conversation? a. Why are you taking pictures? b. Is there anything I could help you with? c. Are you here to see anyone in particular as I can contact them if that would help you? d. I have just been asked by the CCTV control room to have a chat with you 22 / 40 22. Which of the following immediate actions NOT to be applied when using 4Cs protocol? a. Call your security company head office b. Communicate to police and be prepared to explain why you consider item suspicious c. Clear the immediate area d. Control access to the area e. Confirm whether or not the item exhibits recognisably suspicious characteristics 23 / 40 23. The IUDA(Information, Understand, Decide, Act) loop can help you make… a. Decision during the terrorist incident b. Description of the attackers during terrorist incident c. Phone call to the police d. Contact with a control room 24 / 40 24. Which of the following might indicate a suspicious behaviour by a customer? a. Staying in the same place all day on the site b. A customer trying to make lots of friends c. Parking their vehicle in the parking slot and then leaving the site d. Asking questions about security arrangements 25 / 40 25. The attacker is on the premisses. You can see one person injured on the ground. What do you do next? a. Direct people from the site and from the attacker and call emergency services b. Try to have a conversation with the attacker and distract their attention c. Radio your supervisor for instructions d. Try to give a first aid to the injured person 26 / 40 26. What should you do if you answer the phone call and receive a bomb threat? a. Leave the phone and look for your supervisor b. Hang up immediately c. Stay calm and listen d. Put the caller on hold 27 / 40 27. What does ‘’suspicious behaviour’’ or ‘’hostile reconnaissance’’ refer to? a. The placing of a suspicious package b. The use of security CCTV footage c. A fire arms or weapons attack d. Suspicious behaviour during the attack planning stage 28 / 40 28. What is the definition of an ‘’offensive’’ weapon? a. Any object made or adapted to cause harm b. A broken bottle c. A blade caried for religious reasons d. A chef’s knife 29 / 40 29. Which of the following is the least effective deterrent for terrorist activity? a. A large sign informing the public that security staff are present b. The visible presence of vigilant security staff c. Having all customer bags searched before entry d. Searching inside and outside the venue at regular intervals 30 / 40 30. If you identify suspicious activity, you should… a. Call the police and ask them to assess the suspicious activity b. Inform your control room and use the power of hello to engage with a suspect c. Ignore the activity and patrol a different area d. Take a photo of the suspicious individual and post it on the social media 31 / 40 31. You received a phone call with a bomb threat and identified mobile number. What should you do? a. Return to your work and keep an eye out for the same number calling again b. Immediately call the police c. Call the number back and gain more details d. Ask around your organisation to see if anyone recognises the number 32 / 40 32. You go to investigate and see someone with a knife who appears to be chasing members of the public. What do you do next? a. Run away b. Record what’s happening with your mobile phone c. Approach and try to disarm the attacker d. Try to understand what’s happening 33 / 40 33. With regards to terrorism – what might be an indicator of suspicious activity? a. A person walking past the building every day at the same time b. A person trying to avoid being seen on CCTV c. An unknown car in the office car park d. A person asking questions about opening and closing times of the venue 34 / 40 34. When using the strategy of DENY, DETECT and DETER. Which of these can help your organisation DETECT suspicious behaviour? a. Using well-sited CCTV equipment b. All of these are effective ways of detecting suspicious behaviour c. Encouraging your staff to stay visible d. Employing a proactive site patrols team 35 / 40 35. When making call to the police you should NOT: a. Know why you are making a call b. Use complicated language and long sentences c. Describe only what you know for sure without any assumptions d. Always ask for police, they will initiate the fire and ambulance services if required 36 / 40 36. You are on duty outside your site and you see people running towards you. What do you do next? a. Ask people what’s happening and contact your colleagues for further information b. Go inside c. Call the police d. Go on your break 37 / 40 37. Complete the following sentence. An IED is a bomb that will typically contain… a. Homemade explosives b. Radiological explosives c. Readymade explosives d. Custom made explosives 38 / 40 38. You received a phone call: ‘’There is a bomb in your store. You’d better get out’’ What should you NOT do? a. Hang up on them b. Respond, ‘’ Ok I am listening’’ c. Begin taking notes or recording the call d. Without letting the caller know- raise the alarm with your colleagues 39 / 40 39. Which is the highest level of UK government threat level? a. High b. Substantial c. Critical d. Severe 40 / 40 40. In the event of a possible bomb threat what the first action a security operative should make? a. Remain calm b. Contact the police c. Raise the alarm and evacuate d. Search for the bomb