Question 1 of 20
The Airline Deregulation Act was signed in 1978. It allowed airlines to do what for the first time?
A. Establish security and airline safety
B. Create regional niche markets
C. Set their own routes
D. Give the CAB responsibility for airport security
In the United States, cities, states, or public corporations own most of the larger airports. Many smaller airports are still:
A. privately owned.
B. owned by the government.
C. owned by the military.
D. owned by airline carriers.
The deregulation of the U.S. airline industry increased demand for general aviation. What are the two most serious consequences the airline industry is facing due to deregulation?
A. An increase in air exports and a decrease in passengers
B. Regional monopolies and price fixing
C. Increasing airline costs and passenger fares
D. Saturation of air space and overloading of airport capacity
__________ aviation in the U.S. was suspended for three days following the September 11, 2001 attacks.
A. Commercial and general
B. General and military
C. Commercial and military
The highest number of hijackings occurred in 1970. In 1973, the FAA began:
A. searching checked luggage and profiling passengers.
B. to consistently search passengers and their carry-on luggage.
C. using passenger manifests to target possible hijackers.
D. demanding that airlines increase their security staffing.
The Federal Aviation Regulations (FARs) required airlines to take responsibility for security in all the following areas EXCEPT:
A. preventing and deterring the carriage of weapons aboard the aircraft.
B. preventing and deterring the carriage of explosives aboard the aircraft.
C. screening all carry-on luggage and passengers.
D. preventing and deterring unauthorized access to the air operations area.
What commercial aircraft has the most stringent requirements?
A. Aircraft carrying over 60 passengers
B. Aircraft carrying 31-60 passengers
C. Aircraft carrying 15-30 passengers
D. Aircraft carrying less than 15 passengers
What portion of the airport is designed and used for landing, take off, or surface maneuvering of aircraft?
A. Control tower
B. Air operations area
C. Control functions area
D. Exclusive area
During 1998 and 1999, the Inspector General of the FAA performed 173 security tests at eight airports. The investigators gained access to restricted areas on 117 occasions. All of the following methods were used to gain access EXCEPT:
A. going through unlocked gates.
B. using fake ID cards.
C. walking through cargo areas.
D. following authorized employees.
The ACSSP is the single standard security program for all air carriers and was accepted by the airline industry in 1976. What do the initials ACSSP stand for?
A. Air Carrier Standard Security Program
B. Airline Carrier Standardized Security Program
C. Airline Conventional Standard Security Program
D. Air Cargo Standard Security Program
Dissemination of threat warnings is very important in preventing tragedies like Pan Am Flight #103 over Lockerbie, Scotland. How does the FAA insure all threat warnings are read by those with a need to know?
A. The FAA requires all pilots to have a copy of threat information on board the aircraft they fly.
B. The FAA requires carriers to provide written confirmation of receipt of threat information.
C. The FAA requires all US embassies and consulates to put threat information on bulletin boards.
D. The FAA requires airports to post threat information so passengers can read it.
What position was created under the Aviation Security Improvement Act of 1990? The same position was made accountable for measures to strengthen air transportation security.
A. The Administration of Civil Aviation Security
B. The Manager of Civil Aviation Security
C. The Director of Civil Aviation Security
D. The Assistant Administrator of Civil Aviation Security
One of the most daunting tasks of the FAA is to police their own assets, employees, and contractors. Which FAA security program is responsible for making sure contractors do not reveal sensitive FAA information?
A. Industrial security program
B. Personnel security program
C. Physical security program
D. Communications security program
What communications security program function is absolutely critical to the safe operation of air traffic control operations and flight operations?
A. Air traffic voice and data communications
B. Navigation systems
C. Coordination between security and intelligence agencies
D. Highly technical cryptographic operations
The Convention for the Suppression of Unlawful Seizure of Aircraft went into effect in October of 1971. Every country that signed the Convention promised to respond to a hijacking by choosing to:
A. extradite or release the hijacker.
B. prosecute or release the hijacker.
C. extradite or prosecute the hijacker.
D. prosecute or detain the hijacker.
The Montreal Convention of 1971 was a treaty that focused on acts of aviation sabotage. It also gave the President of the United States a new weapon against hijackers. What was it?
A. The authority to demand the extradition of a hijacker for prosecution in the U.S.
B. The authority to suspend air service to any country which the President determines is encouraging hijacking
C. The authority to freeze bank assets of a country that is encouraging hijacking
D. The authority to detain and prosecute a hijacker arrested on U.S. soil
The Tokyo Convention (1963), the Hijacking Convention (1970), and the Montreal Convention (1973), should have ensured the safety of internationally registered aircraft. What is the main reason for the failure of these treaties to keep the skies safe?
A. There are no sanctions or enforcement procedures in any of the three treaties.
B. Diplomats abused the loopholes in the treaties.
C. Some countries refused to extradite or detain hijackers.
D. Some countries could not afford to make any security changes at their airports.
Why was the Bonn Agreement ineffective in combating terrorism in the international community?
A. It only banned flights from offending countries
B. It only focused on "rogue nations"
C. It failed to address extradition
D. It was never ratified by the seven nations in attendance
The G-7 Summit of 1995 pledged to:
A. refine and expand appropriate sanctions.
B. combat terrorism in an offensive mode.
C. employ stricter immigration laws.
D. punish accomplices of terrorist acts.
At the Lyon Summit in 1996, international security ministers identified the kinds of information that must be shared in order to track down and bring justice to known terrorists. The information includes all of the following EXCEPT information:
A. on weapon exports to "rogue nations."
B. on actions and movements of known terrorists.
C. relating to explosives and arms trafficking.
D. on the discovery of forged travel documents.