What do wildland fire Modules do?
A Wildland fire module (WFM), formerly fire use module (FUM), is a 7–10 person team of firefighting personnel dedicated to planning, monitoring and starting fires. They may be deployed anywhere in the United States for resource benefits (fire use), prescribed fire and hazard fuel reduction projects.
What is a suppression module?
Fire Suppression Modules are comprised of five to ten firefighters and are used primarily for wildfire suppression, fuels reduction, and other fire management duties.
What is the difference between a control line and a Fireline?
Control line refers to all constructed or natural fire barriers. It’s also used to describe the treated fire edges used to contain the fire. A fireline is any cleared strip or portion of a control line where flammable material has been removed by scraping or digging down to mineral soil.
What are three aspects of personal accountability?
What are THREE aspects of personal accountability?…
- Ensure objectives and instructions are understood.
- Keep personal clothing & equipment in serviceable condition.
- Maintain yourself in good physical condition.
How wide should a Fireline be?
A general guideline for determining the width of a fireline is that it should be one and one half times as wide as the dominate fuel is high. The scraped portion of a fireline is generally one to three feet wide. However, in timber a fireline is generally 20 to 30 feet wide with a three to four foot scrape.
What are the three main classes of radios?
Low-band.
What is the area between the fingers of a wildland fire?
A pocket is an unburned area between a finger and the head of the fire. It is a dangerous place for fire fighters because it is surrounded by three sides of fire, leaving no options for escape.
What is a general guideline for creating a fireline?
What is a general guideline for creating a fireline? Be sure to look up and cut fuels that are near or overhanging your fireline. To make construction, line holding, and mop-up easier, what type of fuels should you build your fireline in? What part of the fire is sometimes referred to as the “heel” of the fire?
What is a Type 1 forest fire?
Type 1. All functions are filled, plus leaders, branches etc. Multi-agency and national resources. Large number of personnel and equipment are assigned to the incident. It is a large, complex incident.
What is an indicator to withdraw immediately?
What is an indicator to withdraw immediately? A sudden change in pressure.
What is the difference between wildfire and Fireline?
Both threads are thin but incredibly strong, they are fray and stretch resistant, waterproof, easy to thread through a needle, and while Wildfire is available in more colors, Fireline is available in more thicknesses. If you are in the market for a strong beading thread, give Wildfire or Fireline a try!
How do you build a fireline?
In building fireline, all fuels are removed and the surface is scraped to mineral soil on a strip between 6 inches and 3 feet wide, depending upon the fuel and slope. It needs to be wide enough to prevent smoldering, burning, or spotting by embers blowing or rolling across the line.
How did the attackers communicate with the C&C servers?
The attackers used different techniques and protocols to communicate with the C&C servers … HTTP –Command and Control – Standard Application Layer Protocol (T1071) ©2019 The MITRE Corporation. ALL RIGHTS RESERVED Approved for public release. Distribution unlimited 19-01075-15.
What are the components of a malware attack?
–Initial Access –Execution –Persistence –Privilege Escalation –Defense Evasion –Credential Access –Discovery –Lateral Movement –Collection –Command and Control –Exfiltration –Impact 3. Translate the Behavior into a Tactic ▪“When executed, the malware first establishes a SOCKS5 connectionto 192.157.198.103 using TCP port 1913. … Once
How did the attackers download the com scriptlets?
The attackers downloaded COM scriptlets using regsvr32.exe –Command and Control – Remote File Copy (T1105) –Execution – Regsvr32 (T1117) 21. binary was renamed “kb-10233.exe”, masquerading as a Windows update –Defense Evasion – Masquerading (T1036) 22. network scanning against entire ranges…looking for open ports…
What ports are used for C&C attacks?
:80 (in traffic from compromised machine to C&C server) –Command and Control – Commonly Used Port (T1043) 19 & 20. The attackers downloaded COM scriptlets using regsvr32.exe –Command and Control – Remote File Copy (T1105) –Execution – Regsvr32 (T1117) 21. binary was renamed “kb-10233.exe”, masquerading as a Windows update