When deployed, what are the responsibilities of the search team?
Search rooms, triage victims, and call-in counts
When deployed, what are the responsibilities of the rescue team?
Stabilize and extract victims, bring survivors to medical areas
Define Terrorism
“The unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”
Name three ways you can keep your password safe.
Change your password frequently
Use a complex password
Use a different password for different apps/businesses
Don't email it to yourself or anyone else
What is the first step in a size-up? What is the last step?
Gather the facts
Evaluate Progress
Before beginning a search, how do get the "walking wounded" out of the building?
Stand at the entrance and yell,"If you can hear me, come to the sound of my voice."
Where are you most likely to find children during a search?
In closets, cabinets, bathtubs, or under the bed.
What typically are the goals of a terrorist group?
Instill fear in people
Spread misinformation
Undermine trust in government
Influence government policy
What should you do if you see a random popup on your computer that asks you to call a phone number or enter credit card information?
Run a malware or antivirus checker
When law enforcement arrives on the scene of an active shooting event to clear a room, what should you do?
Put phone in pocket
Raise empty hands
Remain quiet
Follow instructions
What are the three life-threatening conditions? What color would you tag these victims?
Severe bleeding
Shock
Color: Red
You find a survivor who cannot walk out of the building by their power, and you are working with only two other CERT volunteers. What would be the best way to carry the survivor to safety?
Two person carry or chair carry
During an active shooter event, what are your three main options for action?
Run, Hide, Fight
What is the name of the tactic that involves a hacker sending an email that asks you to click a link to complete an action?
Phishing
If you choose to hide during an active shooter event, what should you do?
Turn off lights
Cover windows
Barricade entry points
Hide behind large object
Silence phone
Before you enter a building to search it, you make a slash next to the front door. What information do you write in down?
Your agency or group ID
Date and time search started
If a survivor is trapped underneath a heavy object, you can raise the object using what method?
Leveraging and cribbing method
When calling 911 during a terrorist event, what information should you give them?
Your name
Your location
The situation
Number of terrorist(s)
Location of terrorist(s)
Physical descriptions
How do you stay safe on a public WiFi?
Go to secure sites only
Use phone apps instead of websites
Do not enter usernames or passwords
Do not send confidential information
What is the difference between a Shelter-In-Place and a Lockdown?
During SIP, there are contaminants that you want to keep out of the room so you seal doors, windows, and vents.
During a lockdown, there is a physical threat outside that you want to keep out of the room so you lock doors, cover windows, and turn off lights.
After a search, you draw another marking slash to complete the X. What additional info do you add?
Time search ended, areas searched, victims found
How far should you lift before you crib?
1-2 inches.
What are the three zones that are established during a CBRNE event?
Hot Zone
Warm Zone
Cold Zone
What is the difference between a soft target and a hard target?
Soft targets are easy to access, have less security, and involve groups of people.
Hard targets have greater security, require authentication, and involve systems or infrastructure.
What is the name of the tactic when a hacker intercepts information being sent from your computer over a public network?
Packet-sniffing
or Man-in-the-middle
What is the name for the exterior search method that involves volunteers standing on each side of the building and listening for sounds?
Triangulation
How would you extract a victim with a possible spine injury?
Stabilize their neck and spine using hard-backed boards or objects and secure them to the boards.
What does CBRNE stand for?
Chemical
Biological
Radiological
Nuclear
Explosives
What are the 8 signs of terrorism?
Surveillance
Elicitation
Tests of security
Funding
Acquiring supplies
Impersonation
Rehearsals
Deployment
What so you call a phising attempt that comes through SMS (or message on a phone)?
Smishing