Competency Assesment – Action Counters Terrorism

Test Details

  • This is a 40 multiple-choice questions/answers competency test. All question must be completed. Mark one answer per question.
  • 0 points – given if answer is wrong, and 5 points if answer is correct.
  • The form must be submitted within 45 minutes after you start the test.
  • Pass rate is 140 points (70%).
  • Your name and surname will have to be entered after you press the finish button.

1 / 40

1. What might be the best way to challenge a suspected unauthorised person?

2 / 40

2. How long should you wait to report suspicious behaviour?

3 / 40

3. Which of the following questions could you NOT use to engage people in a friendly, purposeful conversation?

4 / 40

4. What does SCaN stand for in security?

5 / 40

5. When do you use Run Hide Tell protocol?

6 / 40

6. What you can NOT do when dealing with members of public, while they are on private premises?

7 / 40

7. You received a phone call with a bomb threat and identified mobile number. What should you do?

8 / 40

8. Complete the following sentence. An IED is a bomb that will typically contain…

9 / 40

9. If you identify suspicious activity, you should…

10 / 40

10. When is a hostile most vulnerable?

11 / 40

11. What is not relevant to Remove Remove Remove protocol?

12 / 40

12. When should you use the Run, Hide and Tell principle?

13 / 40

13. What should you do if you answer the phone call and receive a bomb threat?

14 / 40

14. What does β€˜β€™suspicious behaviour’’ or β€˜β€™hostile reconnaissance’’ refer to?

15 / 40

15. Which of the following is the least effective deterrent for terrorist activity?

16 / 40

16. When hiding during a firearms attack, what one of the actions that you should take?

17 / 40

17. Which sector provides the most attractive target for terrorists?

18 / 40

18. What is the definition of an β€˜β€™offensive’’ weapon?

19 / 40

19. What does a β€˜β€™ critical’’ terror threat level indicate?

20 / 40

20. When making call to the police you should NOT:

21 / 40

21. Which of the following immediate actions NOT to be applied when using 4Cs protocol?

22 / 40

22. Explain the H.O.T protocol meaning?

23 / 40

23. Which protocols should you follow in the event of an acid attack?

24 / 40

24. In the event of a possible bomb threat what the first action a security operative should make?

25 / 40

25. You are on duty outside your site and you see people running towards you. What do you do next?

26 / 40

26. Which protocols should you follow if you come across a suspected IED (Improvised Explosive Devise)?

27 / 40

27. What is the first thing security operative should do after receiving a bomb threat over the telephone?

28 / 40

28. You go to investigate and see someone with a knife who appears to be chasing members of the public. What do you do next?

29 / 40

29. You received a phone call: β€˜β€™There is a bomb well hidden in your building. It will go off whenever I choose it to’’ What should you do?

30 / 40

30. It is helpful to remember the ACT acronym. What does it stand for?

31 / 40

31. Which of the following might indicate a suspicious behaviour by a customer?

32 / 40

32. With regards to terrorism – what might be an indicator of suspicious activity?

33 / 40

33. Which of the following represent the UK government threat levels in order of severity?

34 / 40

34. Which is the highest level of UK government threat level?

35 / 40

35. The attacker is on the premisses. You can see one person injured on the ground. What do you do next?

36 / 40

36. What type is an acid attack?

37 / 40

37. You received a phone call: β€˜β€™There is a bomb in your store. You’d better get out’’ What should you NOT do?

38 / 40

38. When using the strategy of DENY, DETECT and DETER. Which of these can help your organisation DETECT suspicious behaviour?

39 / 40

39. The IUDA(Information, Understand, Decide, Act) loop can help you make…

40 / 40

40. Which of the following would be a reason to evacuate a premisses?