sdsd Flashcards

(51 cards)

1
Q

What is the (trans) design to protect your (jsksks) cargo and ship (jjsj) risk of security incident

A

security plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the difference between piracy and armed robbery at sea.
- piracy is a robbery at ship while armed robbery at sea occur in port
- armed robbery at sea occured within territorial water while piracy occured in international water
- armed robbery at sea occured in international water while piracy occured within territorial water
- piracy and armed robbery are the same

A
  • armed robbery at sea occured within territorial water while piracy occured in international water
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was mandated by law in July 2004 after the (????) attack (??????)
- SDSD
- Solas chapter XI-2
- ISPS regulation
- SOA?

A

Solas chapter XI-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which maritime security level is appropriate when ship and port authority (mutuals) of supervise cargo in loading and unloading operation.
- marsec lvl 1
- marsec lvl 2
- marsec lvl 3
- marsec lvl 4

A

marsec lvl 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify this marsec level (grant) access to ship is limited only to authorize personel
- marsec lvl 1
- marsec lvl 2
- marsec lvl 3
- marsec lvl 4

A

marsec lvl 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

At least how many times security drills should be conducted on board
- once in every 3 months
- once a month
- once a year
- once every 3 years

A

once in every 3 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first step to develop in ship security assessment
- ship security meeting
- ship security survey
- ship security plan

  • ship security drill
A

ship security survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The following are identified in (???) ship security survey, EXCEPT:
- possible threats (on the key) shipboard operation
- existing security measures, procedures and operation
- security threat, nationality, capacity and personality
- security (weakness) (hindering frastracture) policies and procedures

A

security threat, nationality, capacity and personality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following should be considered when the captain (when) security of the ship is (bridge)
- ship contengency plan implementation
- ship security alert system activation
- ship preparation for evacuation
- implement higher marsec level

A
  • ship security alert system activation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During your watch, you have notice a vessel (afar) being attacked by pirates, what should be your action
- change course
- increase speed
- report to master
- alert authority

A

alert authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the document that address tye security requirement that to be shared between a port facility and a ship
- checklist of security
- declaration of security
- assessment of security
- ship or port security check

A

declaration of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

taking advantage of modern technologies of pirates are able to determine the best (target) and plan of attack by ______
- (contracting) searches at sea
- getting (classified) information
- monitoring communication between ships and ports
- utilizing vessel fine internet

A

monitoring communication between ships and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the following is considered in (unfine) potential security threat, except:
- out of normal activity
- normal clothing
- ????
- conversation of the ship and taking pictures

A

normal clothing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the importance of being observant to recognize potential security threat

  • to prevent any harm
  • to promote safety from accident
  • to be able to prevent (bridges) of security
  • to be able to arrest potential security threats
A
  • to be able to prevent (bridges) of security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

it is a dedication of (conceiling) a weapon of person (false/force) to bend his knees or fail to bend his knees
- palming
- (jacketshog)
- (unaturalgeyt?/$$)
- (unsboxtribe)

A
  • (unaturalgeyt?/$$)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

when a person is palming, what is the most probable way for being (conceil)
- (edge waypor)
- granades
- fire arms
- (time ed)

A

edge waypor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

why do we utilize leaders in a crowd and controlling and (emerging) crowd
- due to people exhibiting panic behavior
- due to people in crowd with open exhibit (????) behaviour
- due to ignorance
- due to (pro) active behavoir

A

due to people in crowd with open exhibit (????) behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what kind of equipment is not appropriate for bomb search
- flashlight
- radio
- metal detector
- (lacyd)

A

radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is over an expensive and effective means of detecting (????) substances
- K9
- x-ray
- search stick
- metal detector

A

metal detector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which of the following is considered restricted area
- engine room
- deck
- accommodation ladder
- ramp

A

engine room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

how can a restricted area be immediately identified

  • clearly marked restricted area warning signs and placards
  • announcement over public address system
  • by locking the space or compartment
  • (you’ll) say to crew members
A

clearly marked restricted area warning signs and placards

22
Q

as part of shipboard security and identification system is used to utilize
- determine vessel security level
- identify (this) vessel personel or authotize to have access
- assign restricted areas
- control entry and exit of items on board

A

identify (this) vessel personel or authotize to have access

23
Q

monitoring ship security (inclus) the use of following, except
- lighting
- cordon
- surveilance
- watchkeeper

24
Q

security measures are implemented during delivery of ships(stores) for following reason, except
- to prevent possibility of receiving of (tampered) products
- to ensure (intended) to your ship’s course packaging
- to avoid accepting items (????) order
- to allow acquisition of cobtraband

A

to allow acquisition of cobtraband

25
what is a effective way to check the identify of the passenger board on the vessel - familiarity - by uniform - identification card - confirmation under personel
identification card
26
What is the role of a Recognized Security Organization (RSO) in maritime security? (1 Point) * O a. Conducting routine ship inspections O b. Providing security training for port personnel O c. Implementing the National Security Programme for Sea Transport • d. Performing security-regulated activities with appro- priate qualifications and expertise
d. Performing security-regulated activities with appro- priate qualifications and expertise
27
What is the primary responsibility of governments regarding international maritime security policies and guidelines? (1 Point) * O a. Enforcing security protocols on individual vessels. © b. overseeing compliance with security measures within their jurisdiction. c. Managing the day-to-day operations of maritime companies. d. Providing insurance coverage for maritime activi-ties.
b. overseeing compliance with security measures within their jurisdiction.
28
Which of the following security measures is associated with all three MARSEC Levels? (1 Point) * a. Limting access to a single, controlled access point. • b. Suspending cargo operations and stores. • c. Increasing the search frequency and detall of per- sons due to board or disembark. • d. Escorting all visitors onboard.
a. Limting access to a single, controlled access point.
29
7. Which of the following actions is recommended both on board a ship and in a port facility environment in response to an attack or attempted attack by pirates or armed robbers? (1 Point) * a. Engage in direct confrontation with the attackers to protect crew and cargo. b. Activate the Ship Security Alert System (SSAS), increase speed, and initiate evasive maneuvers while notifying the port authorities or coastal state. c. Attempt to negotiate with the attackers to avoid violence and minimize potential damage
b. Activate the Ship Security Alert System (SSAS), increase speed, and initiate evasive maneuvers while notifying the port authorities or coastal state.
30
Master of a ship when determining whether to activate security protocols and report an attack or attempted attack by pirates or armed robbers? (1 Point) * a. The avalability of nearby naval bases for immedi- ate assistance. © b. The severity of the threat to the safely of the ship and its crew. O c. The cargo being transported and its value. d. The weather conditions in the ship's vicinity.
© b. The severity of the threat to the safely of the ship and its crew.
31
Why is it important for companies to conduct regular training, drills, and exercises related to the prevention and suppression of piracy and armed robbery against ships? (1 Point) * a. To fulfil legal obligations mandated by international maritime regulations. b. To maintain compliance with company policies and procedures. c. To ensure readiness and preparedness of crew members and security personnel.
c. To ensure readiness and preparedness of crew members and security personnel
32
What is the primary purpose of conducting inspections and surveys as part of ship security activities specified in a ship security plan? (1 Point) * • a. To identity and evaluale polential threats to the ship's security. b. To ensure compliance with international maritime regulations. • c. To provide documentation for legal purposes and regulatory audits. d. To assess the condition of the ship's hull and ma- chinery.
a. To identity and evaluale polential threats to the ship's security.
33
Why is it important for a Ship Security Plan to include procedures for responding to security threats? (1 Point) * 0 • a. To comply with international maritime regulations and conventions. b. To provide a framework for crew members to follow in the event of a security breach , c. To outline legal liabilities in case of security inci-dents.
b. To provide a framework for crew members to follow in the event of a security breach
34
How does conducting regular security drills contribute to the effectiveness of contingency plans for scenarios involving robbery, drugs, and smuggling? (1 Point) * , a. It ensures compliance with international maritime regulations. b. It transfers responsiblity for security incidents to the crew members. c. lt eliminates the need for communication with wa- terfront facility response procedures • d. It provides crew members with the necessary sklls. to respond effectively to security threats.
d. It provides crew members with the necessary sklls. to respond effectively to security threats.
35
What is the significance of having an agreement between a ship and a port facility regarding the Declaration of Security? (1 Point) * a. It simplifies the process by not requiring a Declaration of Security for each port visit b. It shifts the responsibility for security measures to the port facility. c. It allows the ship to bypass security inspections during port visits.
a. It simplifies the process by not requiring a Declaration of Security for each port visit
36
What is a common method used by pirates and armed robbers to undertake attacks against ships, based on the provided information? (1 Point) * a. Attacking ships during daylight hours to minimize visibility. • b. Using submarines to approach ships undetected. O c. Boarding ships from astern using grappling hooks and ropes. d. Engaging in long-range missile attacks from moth- er ships.
O c. Boarding ships from astern using grappling hooks and ropes.
37
What action should be taken if an individual attempt to gain access to vessels or facilities without proper authorization? (1 Point) * O a. Allow access and monitor their activities closely. • b. Alert security personnel or authorities immediately. c. Engage in conversation to gather more informa-tion. d. Ignore the attempt and continue regular opera-tions.
b. Alert security personnel or authorities immediately.
38
How would you describe the general characteristics and behavioral patterns of persons who are likely to threaten security in a maritime environment? (1 Point) * a. They are typically calm, cooperative, and open to communication. b. They often show signs of nervousness, avoidance of eye contact, and unusual interest in restricted areas or procedures. c. They usually work closely with security personnel and have a strong understanding of safety protocols. d. They tend to exhibit confident and friendly behavior without showing any signs of distress.
b. They often show signs of nervousness, avoidance of eye contact, and unusual interest in restricted areas or procedures.
39
What is the primary objective when implementing controls for recognizing and detecting weapons and dangerous substances on board vessels? (1 Point) * a. To identify and apprehend potential perpetrators. b. To ensure that all cargo is thoroughly inspected. C • c. To prevent such materials from entering ports and ships. O d. To increase revenue through fines for non-compli- ance.
c. To prevent such materials from entering ports and ships.
40
How can crews and personnel reduce vulnerability to security threats on board ships? (1 Point) * O a. By relying solely on advanced delection technolo- ду. • b. By avoiding high-risk areas during voyages. c. By disregarding intelligence reports to avoid panic among crew members. d. By implementing security procedures and reporting suspicious materials to authorities
d. By implementing security procedures and reporting suspicious materials to authorities
41
During a crisis situation at sea, what is the primary responsibility of a seafarer with designated security duties? (1 Point) * a. Ensuring the safety of passengers and crew mem- •bers. b. Implementing emergency plans in accordance with the ship security plan. • c. Providing first aid to injured individuals. • d. Contacting maritime authorities for assistance.
b. Implementing emergency plans in accordance with the ship security plan.
42
Why might security-related information such as the location of the ship be considered sensitive? (1 Point) * a. Because it can assist in identifying polential tar- gets for security threats. • b. Because it helps in planning crew schedules. O c. Because it's required for insurance purposes. d. Because it helps with navigation.
a. Because it can assist in identifying potential targets for security threats.
43
Why is it important to positively identify crewmembers, passengers, vendors, visitors, and other personnel prior to each embarkation? (1 Point) * O a. To maintain a friendly atmosphere onboard. 1 b. To collect demographic data for markeling purpos- es. O c. To prevent unauthorized access and enhance se- curity measures. • d. To speed up the embarkation process.
c. To prevent unauthorized access and enhance se- curity measures.
44
How would you explain the technique used for conducting non-intrusive searches of personal effects, baggage, cargo, and ship's stores? (1 Point) * a. Using electronic devices like X-ray machines to scan items without physically opening them. b. Physically inspecting each item manually by hand to ensure safety and security. c. Questioning individuals about the contents of their bags and cargo to verify security. d. Allowing crew members to inspect the items themselves and report anv suspicious content
a. Using electronic devices like X-ray machines to scan items without physically opening them.
45
You are tasked with conducting a physical search of personal baggage and a non-intrusive inspection of cargo during a routine security check. What is the correct procedure to follow to ensure compliance with security protocols? (1 Point) * a. Begin with a physical inspection of the baggage by manually opening and examining each item, followed by scanning the cargo with non-intrusive technology like X-ray machines. b. Perform only visual inspections of both the baggage and cargo, as long as there are no signs of tampering or damage. c. Ask the owner of the baggage to open it for inspection while performing a manual check of the cargo without using any scanning equipment. d. Physically search both the baggage and cargo ) without the use of any non-intrusive technologies, as physical searches are sufficient.
a. Begin with a physical inspection of the baggage by manually opening and examining each item, followed by scanning the cargo with non-intrusive technology like X-ray machines.
46
What additional security measures are implemented during Maritime Security (MARSEC) Level 2 to enhance monitoring and access controls on existing restricted areas? (1 Point) * a. Locking or securing access points, and using automatic intrusion detection devices. b. Increasing the frequency and intensity of monitor- ing. ( c. Providing continuous monitoring of each area us- ing surveillance equipment. d. Restricting access to areas adjacent to access O points, and dedicating additional personnel to guard or patrol each area.
d. Restricting access to areas adjacent to access O points, and dedicating additional personnel to guard or patrol each area.
47
Why is it important to control access to restricted areas onboard a ship? (1 Point) * O a. To encourage free movement of passengers and b. To ensure the safely and security of the vessel and its occupants. c. To provide convenient access to all areas for maintenance purposes. d. To increase revenue by selling access to exclusive areas.
b. To ensure the safely and security of the vessel and its occupants.
48
What methods are commonly used for effective monitoring of deck areas and areas surrounding the ship? (1 Point) * a. lighting, watchkeeping and patrols, and sur- veillance equipment. O b. Public announcements and onboard lectures. • c. Social gatherings and crew parties. d. Musical performances and entertainment events.
a. lighting, watchkeeping and patrols, and sur- veillance equipment.
49
How can cargo inspection be conducted onboard a ship? (1 Point) * O a. Through verbal confirmation from the supplier. O b. By relying solely on documentation. c. Through visual and physical examination, or using scanning/detection equipment, mechanical devices, or dogs. d. By random selection of packages for inspection.
c. Through visual and physical examination, or using scanning/detection equipment, mechanical devices, or dogs.
50
What is the purpose of security equipment and systems onboard a vessel? (1 Point) * a. To deter and defend against potential threats such as pirate attacks and armed robbery • b. To regulate temperature levels in crew cabins. c. To enhance passenger comfort during voyages. d. To provide entertainment options for crew mem- bers.
a. To deter and defend against potential threats such as pirate attacks and armed robbery
51