Disaster Psychology
Phases of a Disaster
Terrorism
Cybersecurity
Misc
100

What is the Impact phase?

When the event happens.

100

What is terrorism?

“The unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”

100

Name three ways you can keep your password safe.

Change your password frequently
Use a complex password
Use a different password for different apps/businesses
Don't email it to yourself or anyone else

100

What is the first step in a size-up? What is the last step?

Gather the facts

Evaluate Progress

200

What is Vicarious Trauma?

When a rescuer takes on the stress and emotions of the victim.

200

What is the Heroic phase?

When everyone works together to help in the immediate aftermath of a disaster, survival, rescuing others, and promoting safety are priorities.

200

What typically are the goals of a terrorist group?

Instill fear in people
Spread misinformation
Undermine trust in government
Influence government policy

200

What should you do if you see a random popup on your computer that asks you to call a phone number or enter credit card information?

Disconnect your computer from the internet

 Run a malware or antivirus checker

200

When law enforcement arrives on the scene of an active shooting event to clear a room, what should you do?

Put phone in pocket
Raise empty hands
Remain quiet
Follow instructions

300

How do responders debrief after an incident?

Talk to other responders on scene about what happened.

Talk to a disaster/incident therapist or other provider.

300

What is the Honeymoon phase?

In the weeks and months following a disaster, formal governmental and volunteer assistance may be readily available. Survivors may experience a short-lived sense of optimism that the help they will receive will make them “whole” again.

300

During an active shooter event, what are your three main options for action?

Run, Hide, Fight

300

What is the name of the tactic that involves a hacker sending an email that asks you to click a link to complete an action?

Phishing

300

If you choose to hide during an active shooter event, what should you do?

Lock the doors

Turn off lights
Cover windows
Barricade entry points
Hide behind large object
Silence phone

400

What is a traumatic crisis?

When a person’s ability to cope is overwhelmed.

400

What is the Disillusionment phase?

Disappointment in a slower-than-expected pace of recovery can trigger this phase. Disillusionment typically occurs in the second half of the year immediately following a disaster and, again, after the disaster’s first anniversary.

400

When calling 911 during a terrorist event, what information should you give them?

Your name and location
Brief description of situation
Number of terrorist(s)
Location of terrorist(s)
Physical descriptions

400

How do you stay safe on a public WiFi?

Go to secure sites only
Use phone apps instead of websites
Do not enter usernames or passwords
Do not send confidential information

400

What is the difference between a Shelter-In-Place and a Lockdown?

During SIP, there are contaminants that you want to keep out of the room so you seal doors, windows, and vents.

During a lockdown, there is a physical threat outside that you want to keep out of the room so you lock doors, cover windows, and turn off lights.

500

What is the motto for Psychological First Aid?

Listen. Protect. Connect

500

What is the Reconstruction phase?

The reconstruction of physical property and recovery of emotional well-being may continue for years following a disaster. At this point, survivors have realized they will need to solve the problems of rebuilding their own homes, businesses, and lives largely by themselves and have gradually assumed the responsibility for doing so.

500

What are the three zones that are established during a CBRNE event?

Hot Zone
Warm Zone
Cold Zone

500

What is the difference between a soft target and a hard target?

Soft targets are easy to access, have less security, and involve groups of people.

Hard targets have greater security, require authentication, and involve systems or infrastructure.

500

What is the name of the tactic when a hacker intercepts information being sent from your computer over a public network?

Packet-sniffing
or Man-in-the-middle

600

What are the 5 "F's" in Disaster Psychology?

1. Freeze: “Stop, look, and listen,” or be on guard and watchful.

2. Flight: Flee/Run away.

3. Fight: Attempt to combat the threat.

4. Fright: Tonic immobility when in contact with a predator or playing dead.

5. Faint: Fear-induced fainting.

600

What is the phase between the recovery from the last disaster and before the impact of another?

Pre-Impact/Planning

600

What does CBRNE stand for?

Chemical
Biological
Radiological
Nuclear
Explosives

600

What are the 8 signs of terrorism?

Surveillance
Elicitation
Tests of security
Funding
Acquiring supplies
Impersonation
Rehearsals
Deployment

600

What so you call a phising attempt that comes through SMS (or message on a phone)?

Smishing