Generally, a person has a need to know SSI, when they are:
Performing duties related to transportation security activities, training to do so, or supervising someone performing those duties.
When paper records contain SSI it should be marked with the protective marking and distribution limitation statement in which of the following locations?
Each page, title page, and the outside of any front or back cover (including binders or folders).
When a record considered SSI is in a non-paper form, such as an audio or video file, how should it be marked?
In such a way as to ensure that the viewer or listener is reasonably likely to see or hear them when obtaining access to the record.
When a covered person no longer requires SSI (such as printed materials) to carry out a transportation security function, the SSI should be destroyed in such a way as to preclude reconstruction or recognition of the information. What is the exception to this?
When the record is required to be kept under state or local law.
Which of the following flights would not have to comply with DASSP when flying into and out of DCA?
An all-cargo aircraft flight.
Fingerprint-based criminal history records checks (CHRCs) are required for which of the following individuals:
Flightcrew members.
If you receive any threat information that could affect civil aviation, who must you notify?
TSOC
It is important that employees or contractors who obtain details of an act of piracy due to their duties do not speak about information regarding the event or tactics used to resolve them, except for:
Persons with operational need to know, only.
In order to operate in and out of DCA, you must obtain flight authorization. This includes
An FAA slot reservation, a OSO-AWB request, and the flight authorization through AAP.
For flight authorization requests is a social security number required for each crewmember, passenger, and ASO?
For flight authorization requests is a social security number required for each crewmember, passenger, and ASO?
You may be able to change your scheduled DASSP screening time but this is dependent on slot availability and:
Staffing availability at the TSA Field Office.
During a rapid-turnaround at DCA, do passengers have to be re-screened?
Only if they leave the sterile area.
If a passenger is 18 years of age or older, but does not have a government-issued photo ID, may they still board the aircraft?
Yes. If they can provide two other forms of ID, one of which is issued by a government authority.
Of the following, who is authorized to carry a firearm on board an aircraft operating into or out of DCA?
TSA authorized Federal Air Marshals (FAMs) and Aircraft Security Officers (ASOs).
During a rapid turnaround at DCA, would the aircraft need to be researched prior to departure?
Only if any person or property is introduced that has not been inspected or screened through the DASSP FBO
Common Strategy divides threats into four levels. The highest threat level is threat level 4 which is defined as:
Attempted or actual breach of the flight deck.
True or False? In the event of an actual or suspected release of chemical or biological substance on board all crewmembers should don oxygen masks.
True. Consider also deploying passenger oxygen masks.
Threat assessment is:
Determining the seriousness of an occurrence.
Who is responsible for conducting a pre-flight briefing to include safety and security topics?
The ISC.
Why is it important to use plain language when communicating during a passenger disturbance?
The use of acronyms, jargon, code words, and signals have been shown to cause confusion which can seriously hinder you in an emergency.
When using code 7500 to signify a hijacking situation and you are unable to send the code via transponder, you should:
Try to send the code out by more than one method.
When giving commands to passengers and attackers it is important that the command is:
Simple, direct, and forcefully delivered in a command voice.
What protective devices may be assigned to crewmembers?
None, only firearms issued to FFDOs.
Which two psychological tactics can be used by a hijacker to create Stockholm Syndrome?
Intimidation alternating with reassurance.