Competency Assesment – Action Counters Terrorism Test Details This is a 40 multiple-choice questions/answers competency test. All question must be completed. Mark one answer per question. 0 points โ given if answer is wrong, and 5 points if answer is correct. The form must be submitted within 45 minutes after you start the test. Pass rate is 140 points (70%). Your name and surname will have to be entered after you press the finish button. 1 / 40 1. Which of the following represent the UK government threat levels in order of severity? a. Low, Substantial, Severe, Critical b. Low, Moderate, Substantial, Severe, Critical c. Low, Substantial, Severe, High, Critical d. Low, Moderate, Substantial, High 2 / 40 2. How long should you wait to report suspicious behaviour? a. 24 hours b. 48 hours c. 36 hours d. Report it immediately 3 / 40 3. What is not relevant to Remove Remove Remove protocol? a. Remove radio and put it on channel โ1โ b. Remove the substance from the skin c. Remove outer clothing d. Remove affected individuals from the immediate area 4 / 40 4. Complete the following sentence. An IED is a bomb that will typically containโฆ a. Homemade explosives b. Radiological explosives c. Custom made explosives d. Readymade explosives 5 / 40 5. You received a phone call: โโThere is a bomb well hidden in your building. It will go off whenever I choose it toโโ What should you do? a. Ignore the threat b. Look for your manager c. Exit the building and home immediately d. If no one has done so, call 999 immediately and inform police of the threat 6 / 40 6. The attacker is on the premisses. You can see one person injured on the ground. What do you do next? a. Direct people from the site and from the attacker and call emergency services b. Try to give a first aid to the injured person c. Radio your supervisor for instructions d. Try to have a conversation with the attacker and distract their attention 7 / 40 7. In the event of a possible bomb threat what the first action a security operative should make? a. Raise the alarm and evacuate b. Remain calm c. Contact the police d. Search for the bomb 8 / 40 8. The IUDA(Information, Understand, Decide, Act) loop can help you makeโฆ a. Description of the attackers during terrorist incident b. Decision during the terrorist incident c. Contact with a control room d. Phone call to the police 9 / 40 9. Which of the following questions could you NOT use to engage people in a friendly, purposeful conversation? a. Are you here to see anyone in particular as I can contact them if that would help you? b. I have just been asked by the CCTV control room to have a chat with you c. Is there anything I could help you with? d. Why are you taking pictures? 10 / 40 10. When using the strategy of DENY, DETECT and DETER. Which of these can help your organisation DETECT suspicious behaviour? a. Encouraging your staff to stay visible b. Using well-sited CCTV equipment c. Employing a proactive site patrols team d. All of these are effective ways of detecting suspicious behaviour 11 / 40 11. Which of the following is the least effective deterrent for terrorist activity? a. Having all customer bags searched before entry b. The visible presence of vigilant security staff c. Searching inside and outside the venue at regular intervals d. A large sign informing the public that security staff are present 12 / 40 12. What you can NOT do when dealing with members of public, while they are on private premises? a. Speak to people and ask them their purpose of being there b. Request that images are not taken on private property if your organisation has a policy against this c. View, copy or delete any personal information or images from a camera or smart technology d. Remove property from people if it is part of an entry procedure 13 / 40 13. Which is the highest level of UK government threat level? a. Severe b. Substantial c. Critical d. High 14 / 40 14. You are on duty outside your site and you see people running towards you. What do you do next? a. Ask people whatโs happening and contact your colleagues for further information b. Call the police c. Go on your break d. Go inside 15 / 40 15. Which of the following immediate actions NOT to be applied when using 4Cs protocol? a. Confirm whether or not the item exhibits recognisably suspicious characteristics b. Call your security company head office c. Control access to the area d. Communicate to police and be prepared to explain why you consider item suspicious e. Clear the immediate area 16 / 40 16. You received a phone call: โโThere is a bomb in your store. Youโd better get outโโ What should you NOT do? a. Without letting the caller know- raise the alarm with your colleagues b. Begin taking notes or recording the call c. Hang up on them d. Respond, โโ Ok I am listeningโโ 17 / 40 17. With regards to terrorism – what might be an indicator of suspicious activity? a. An unknown car in the office car park b. A person trying to avoid being seen on CCTV c. A person asking questions about opening and closing times of the venue d. A person walking past the building every day at the same time 18 / 40 18. Which of the following would be a reason to evacuate a premisses? a. Multiple sightings of the same person b. A drunk customer shouting โโbombโโ c. A threat passed by police d. A customer asking questions about security arrangements 19 / 40 19. Which protocols should you follow if you come across a suspected IED (Improvised Explosive Devise)? a. Warm Protocol b. HOT and 4Cs Protocol c. Biological Removal d. Remove Remove Remove 20 / 40 20. What should you do if you answer the phone call and receive a bomb threat? a. Leave the phone and look for your supervisor b. Put the caller on hold c. Stay calm and listen d. Hang up immediately 21 / 40 21. Explain the H.O.T protocol meaning? a. Hidden, obstructed, typical b. Hidden, obviously suspicious, typical c. Hindered, obviously suspicious, typical d. Hidden, obsolete, typical 22 / 40 22. When is a hostile most vulnerable? a. In the planning stage of an attack b. During the attack 23 / 40 23. What does SCaN stand for in security? a. See, clarify and note b. See, control and notify c. See, check and notify d. See, cordon and note 24 / 40 24. Which sector provides the most attractive target for terrorists? a. Public and private crowded places b. Agricultural suppliers c. Military base d. Motorway network 25 / 40 25. What does a โโ criticalโโ terror threat level indicate? a. An attack is highly likely and expected imminently b. An attack is a strong possibility c. An attack is possible, but not likely d. An attack is highly unlikely 26 / 40 26. What is the first thing security operative should do after receiving a bomb threat over the telephone? a. Record the time of the call and report to police immediately b. Inform the management and wait for further instructions c. Search the premisses to try and locate any device d. Assume that the call is a joke and ignore it 27 / 40 27. You received a phone call with a bomb threat and identified mobile number. What should you do? a. Return to your work and keep an eye out for the same number calling again b. Ask around your organisation to see if anyone recognises the number c. Call the number back and gain more details d. Immediately call the police 28 / 40 28. When hiding during a firearms attack, what one of the actions that you should take? a. Leave your entrance unlocked b. Stay near the door c. Shout for help d. Switch your mobile phone to silent and turn off vibrate 29 / 40 29. What type is an acid attack? a. Chemical b. Radiological c. Biological d. Nuclear 30 / 40 30. When do you use Run Hide Tell protocol? a. In the rare events of fire arms or weapons attack b. In the event of fire emergency c. In the event of shoplifting d. In the event of lone working hours 31 / 40 31. What might be the best way to challenge a suspected unauthorised person? a. โโ I need you to stop right hereโโ b. โโCan I help you?โโ c. โโ What do you think you are doing?โโ d. โโ Get away from hereโโ 32 / 40 32. Which protocols should you follow in the event of an acid attack? a. Remove Remove Remove b. HOT Protocol c. Why protocol d. Deny, Detect, Deter 33 / 40 33. You go to investigate and see someone with a knife who appears to be chasing members of the public. What do you do next? a. Try to understand whatโs happening b. Run away c. Record whatโs happening with your mobile phone d. Approach and try to disarm the attacker 34 / 40 34. When should you use the Run, Hide and Tell principle? a. When carrying out a security risk assessment b. During the fire arms or weapons attack c. When encountering a suspicious item d. When observing suspicious activity 35 / 40 35. What is the definition of an โโoffensiveโโ weapon? a. A chefโs knife b. A blade caried for religious reasons c. A broken bottle d. Any object made or adapted to cause harm 36 / 40 36. When making call to the police you should NOT: a. Know why you are making a call b. Describe only what you know for sure without any assumptions c. Use complicated language and long sentences d. Always ask for police, they will initiate the fire and ambulance services if required 37 / 40 37. If you identify suspicious activity, you shouldโฆ a. Take a photo of the suspicious individual and post it on the social media b. Inform your control room and use the power of hello to engage with a suspect c. Call the police and ask them to assess the suspicious activity d. Ignore the activity and patrol a different area 38 / 40 38. What does โโsuspicious behaviourโโ or โโhostile reconnaissanceโโ refer to? a. The placing of a suspicious package b. The use of security CCTV footage c. Suspicious behaviour during the attack planning stage d. A fire arms or weapons attack 39 / 40 39. Which of the following might indicate a suspicious behaviour by a customer? a. Parking their vehicle in the parking slot and then leaving the site b. A customer trying to make lots of friends c. Staying in the same place all day on the site d. Asking questions about security arrangements 40 / 40 40. It is helpful to remember the ACT acronym. What does it stand for? a. Action Counters Terrorism b. Attackers Canโt Talk c. Anyone Can Terrorise d. Always Challenge Terrorists