Contemporary Threat Management (8 Hours) 3
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
What is IC&C an acronym for?
CorrectIncorrect -
Question 2 of 20
2. Question
What does the contemporary threat management process consist of?
CorrectIncorrect -
Question 3 of 20
3. Question
What are the key elements in the concept of intended violence?
CorrectIncorrect -
Question 4 of 20
4. Question
What are the three types of intended violence?
CorrectIncorrect -
Question 5 of 20
5. Question
According to James Gilligan, all violence is an attempt to achieve what?
CorrectIncorrect -
Question 6 of 20
6. Question
What does the Intimacy Effect postulate?
CorrectIncorrect -
Question 7 of 20
7. Question
What are the six steps along the path to intended violence?
CorrectIncorrect -
Question 8 of 20
8. Question
How can the path to intended violence be used?
CorrectIncorrect -
Question 9 of 20
9. Question
What is the “What If” game?
CorrectIncorrect -
Question 10 of 20
10. Question
When does a threat management case open?
CorrectIncorrect -
Question 11 of 20
11. Question
Which is the most useful assessment tool?
CorrectIncorrect -
Question 12 of 20
12. Question
How does Cir-Con work?
CorrectIncorrect -
Question 13 of 20
13. Question
What is the purpose of a protective investigation?
CorrectIncorrect -
Question 14 of 20
14. Question
When do protective investigations end?
CorrectIncorrect -
Question 15 of 20
15. Question
Which of the following is not a viable threat management strategy?
CorrectIncorrect -
Question 16 of 20
16. Question
Which threat management strategy is a hybrid between investigating and managing?
CorrectIncorrect -
Question 17 of 20
17. Question
What is the most effective threat management strategy?
CorrectIncorrect -
Question 18 of 20
18. Question
What is the greatest disadvantage of using civil orders for managing the threat?
CorrectIncorrect -
Question 19 of 20
19. Question
What are the different types of threat management cases?
CorrectIncorrect -
Question 20 of 20
20. Question
How can the threat manager best manage the target?
CorrectIncorrect