What is the Psychological First Aid Motto?
Listen. Protect. Connect.
Which reaction includes not being able to process information?
Fright
Which phase of a disaster includes the date or range of the actual event?
Impact
This attack involves tricking individuals into revealing personal information, such as passwords and credit card numbers, through deceptive emails or websites.
Phishing
Which drill has us practice "Drop, Cover, Hold"?
Earthquake
What does CBRNE stand for?
Chemical
Biological
Radiological
Nuclear
Explosives
What is the term for a collection of tools that can help you improve your well-being and manage your emotions?
Self-help toolbox
What are the five "F"s?
Freeze
Flight
Fight
Fright
Faint
Which phase of a disaster includes preparing, training, and gathering resources?
Pre-disaster
This occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other.
Man-in-the-Middle
What three options do you have in an active shooter threat?
Run, Hide, Fight
What are the three incident zones?
Hot Zone, Warm Zone, Cold Zone
What is the name of the breathing technique we practiced in class?
5-finger breathing
Name 5 psychological symptoms of trauma.
Which phase of a disaster includes a slower-than-expected pace of recovery?
Disillusionment
This includes any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, and trojan horses.
Malware
What is the name of the foundation that defined the procedures for an active school shooting situation?
I Love U Guys
What three places does the book list as a "hard" target?
Government buildings
Military installations
Infrastructure/Power grids/Dams
What is vicarious trauma?
When the rescuer takes on the trauma as if they experienced it.
Name 5 physiological symptoms of trauma.
Which phases occurs in the immediate aftermath of the event?
Heroic
This attack aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
DDoS (Direct Denial of Service)
Which drill has us practice sealing the doors and windows with plastic?
Shelter-in-Place
What is a trigger event?
A reminder of the disaster that causes a person to re-experience emotional trauma
What are the five stages of grief?
Denial
Anger
Bargaining
Depression
Acceptance
Traumatic stress may affect which three aspects of your life?
Cognitive, Physical, Interpersonal relationships
List all six phases of a disaster.
Pre-disaster
Impact
Heroic
Honeymoon
Disillusionment
Reconstruction
List all eight types of cyberattacks.
Malware
Phishing
Password attacks
DDoS
Man-in-the-middle
Drive-by download
Malvertising
Rogue softare
Name the five drills in the Standard Response Protocol.
Hold
Secure
Lockdown
Evacuate
Shelter
List the eight signs of terrorism.
Surveillance
Elicitation
Tests of security
Funding
Acquiring supplies
Impersonation/Suspicious people
Rehearsals/Dry runs
Deployment