Search
Rescue
Terrorism
Cybersecurity
Misc
100

When deployed, what are the responsibilities of the search team?

Search rooms, triage victims, and call-in counts

100

When deployed, what are the responsibilities of the rescue team?

Stabilize and extract victims, bring survivors to medical areas

100

Define Terrorism

“The unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”

100

Name three ways you can keep your password safe.

Change your password frequently
Use a complex password
Use a different password for different apps/businesses
Don't email it to yourself or anyone else

100

What is the first step in a size-up? What is the last step?

Gather the facts

Evaluate Progress

200

Before beginning a search, how do get the "walking wounded" out of the building?

Stand at the entrance and yell,"If you can hear me, come to the sound of my voice."

200

Where are you most likely to find children during a search?

In closets, cabinets, bathtubs, or under the bed.

200

What typically are the goals of a terrorist group?

Instill fear in people
Spread misinformation
Undermine trust in government
Influence government policy

200

What should you do if you see a random popup on your computer that asks you to call a phone number or enter credit card information?

Disconnect your computer from the internet

Run a malware or antivirus checker

200

When law enforcement arrives on the scene of an active shooting event to clear a room, what should you do?

Put phone in pocket
Raise empty hands
Remain quiet
Follow instructions

300

What are the three life-threatening conditions? What color would you tag these victims?

Obstructed airway

Severe bleeding

Shock

Color: Red

300

You find a survivor who cannot walk out of the building by their power, and you are working with only two other CERT volunteers. What would be the best way to carry the survivor to safety?

Two person carry or chair carry

300

During an active shooter event, what are your three main options for action?

Run, Hide, Fight

300

What is the name of the tactic that involves a hacker sending an email that asks you to click a link to complete an action?

Phishing

300

If you choose to hide during an active shooter event, what should you do?

Lock the doors

Turn off lights
Cover windows
Barricade entry points
Hide behind large object
Silence phone

400

Before you enter a building to search it, you make a slash next to the front door. What information do you write in down?

Your agency or group ID

Date and time search started

400

If a survivor is trapped underneath a heavy object, you can raise the object using what method?

Leveraging and cribbing method

400

When calling 911 during a terrorist event, what information should you give them?

Your name
Your location
The situation
Number of terrorist(s)
Location of terrorist(s)
Physical descriptions

400

How do you stay safe on a public WiFi?

Go to secure sites only
Use phone apps instead of websites
Do not enter usernames or passwords
Do not send confidential information

400

What is the difference between a Shelter-In-Place and a Lockdown?

During SIP, there are contaminants that you want to keep out of the room so you seal doors, windows, and vents.

During a lockdown, there is a physical threat outside that you want to keep out of the room so you lock doors, cover windows, and turn off lights.

500

After a search, you draw another marking slash to complete the X. What additional info do you add?

Time search ended, areas searched, victims found

500

How far should you lift before you crib?

1-2 inches.

500

What are the three zones that are established during a CBRNE event?

Hot Zone
Warm Zone
Cold Zone

500

What is the difference between a soft target and a hard target?

Soft targets are easy to access, have less security, and involve groups of people.

Hard targets have greater security, require authentication, and involve systems or infrastructure.

500

What is the name of the tactic when a hacker intercepts information being sent from your computer over a public network?

Packet-sniffing
or Man-in-the-middle

600

What is the name for the exterior search method that involves volunteers standing on each side of the building and listening for sounds?

Triangulation

600

How would you extract a victim with a possible spine injury?

Stabilize their neck and spine using hard-backed boards or objects and secure them to the boards.

600

What does CBRNE stand for?

Chemical
Biological
Radiological
Nuclear
Explosives

600

What are the 8 signs of terrorism?

Surveillance
Elicitation
Tests of security
Funding
Acquiring supplies
Impersonation
Rehearsals
Deployment

600

What so you call a phising attempt that comes through SMS (or message on a phone)?

Smishing

M
e
n
u