Homeland Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When emergency response institutions cannot contain an emergency event or stabilize critical services, it is referred to as which of the following:

a. A disaster. (Answer) b. A condition of risk. c. A natural event. d. A potential risk.

In recent decades, which of the following terrorist "waves" have occurred, roughly?

a. A left-wing wave from the 1960s through the early 1980s. b. An ethnonationalist wave until the late 1990s. c. A religious wave beginning at the end of the 20th century. d. All of the above. (Answer?)

The National Emergency Management Association is

a. A professional "umbrella" association of state-level emergency management directors. (Answer) b. A federal agency dedicated to creating a national homeland security enterprise. c. A national effort to impose federal oversight of the national homeland security effort. d. Both "b" and "c".

The Fukushima nuclear disaster was caused by which of the following:

a. A tsunami. (Answer) b. An earthquake. c. Electromagnetic pulse. d. "a" and "b" only.

The United States passed its first comprehensive counterterrorism legislation during the administration of President:

a. Abraham Lincoln. b. Franklin Delano Roosevelt. c. John Fitzgerald Kennedy. d. William Jefferson Clinton. (Answer)

Which of the following statements is most accurate regarding the purpose of each mission area and the National Planning Frameworks?

a. Achieve the National Preparedness Goal. (Answer) b. Correct inefficiencies in tiered government. c. Plan responses to future threats from terrorists. d. None of the above.

The National Strategy for Aviation Security

a. Acknowledges the complexity of achieving comprehensive aviation security. b. Provides guidance on achieving aviation security. c. Recommends comprehensive counterterrorist policies. d. Both "a" and "b". (Answer)

Standard procedures lead to presidential declarations

a. After Congress authorizes presidential declarations. b. After Congress releases funding for presidential declarations after an emergency occurs. c. After a series of events occur within the tiered framework of authority. (Answer) d. Both "a" and "b".

Exceptional procedures lead to presidential declarations

a. After Congress authorizes presidential declarations. b. After Congress releases funding for presidential declarations after an emergency occurs. c. Without awaiting the standard series of events occur within the tiered framework of authority. (Answer) d. Both "a" and "b".

International conventions have been established to promote counterterrorist cooperation to address which of the following perceived threats:

a. Airline hijacking. b. Attacks on embassies and diplomats. c. Transnational terrorist activity. d. All of the above (Answer)

Regulation of the media in the United States:

a. Can be undertaken during times of crisis. b. Is possible when Executive Orders are issued. c. Tends to rely on standards of self-regulation and media gatekeeping. (Answer) d. "a" and "b" only.

Terrorist threat scenarios posit that terrorists

a. Can easily obtain chemical and biological agents. b. Can easily manufacture chemical and biological agents. c. Can feasibly obtain chemical and biological agents. (Answer) d. Have already constructed many chemical and biological weapons.

For governors, the success or failure of emergency responses

a. Can have favorable or dire political consequence. (Answer) b. Are the responsibility of other officials. c. Cannot be fully measured until long after the event. d. None of the above.

Christian Identity, Creativity, and Asatru are examples of

a. Christian civil rights movements. b. Racist mystical movements. (Answer) c. Intellectual trends on the fringe right-wing. d. None of the above.

The Order and Aryan Republican Army are examples of

a. Christian civil rights movements. b. Racist terrorist groups. (Answer) c. Intellectual trends on the fringe right-wing. d. None of the above.

Which of the following agencies has some responsibility for border control and security?

a. Citizenship and Immigration Services. (Answer) b. Federal Bureau of Investigation. c. Central Intelligence Agency. d. All of the above.

Domestic disturbances during the Cold War era included the following:

a. Civil rights marches in the American South. b. Urban riots. c. Student activism on college campuses d. All of the above (answer)

Which of the following statements regarding the challenge of countering extremism is most accurate?

a. Coercive measures alone are only marginally successful. (Answer) b. Strong military retaliation is very effective. c. Repressing adherents of extremist sentiment is a highly effective option. d. Both "b" and "c".

Why was a new international counter-terrorist legal framework established during the second half of the Twentieth Century:

a. Communism threatened democracy. b. Terrorism had never been illegal prior to this time. c. No one had thought of it before. d. A legal framework was needed to respond to rogue-state sponsors of terrorism. (Answer)

Modern right-wing conspiracy theories have included which of the following?

a. Communist invasion scenarios. b. New World Order conspiracies. c. "Truther" and "birther" theories. d. All of the above. (Answer)

Common explosives include the following, except:

a. Composit-4. b. ANFO. c. Anthrax. (Answer) d. Semtex.

Policy options for domestic security include which of the following broad categories:

a. Conciliatory options. b. Enhanced intelligence. c. "b" but not "a". d. Both "a" and "b". (Answer)

The purpose of Joint Terrorism Task Forces is to

a. Conduct paramilitary operations when an incident occurs. b. Deploy "quick reaction" teams when an incident occurs. c. Broadly coordinate planning and responses to terrorist incidents. (Answer) d. Both "a" and "b".

External threats and conflict during the early American republic emanated from the following, except:

a. Conflict between Native Americans and settlers. b. British incursions. c. German expansion. (Answer) d. Military campaigns against Mexico.

Which of the following statements is most accurate about the Federal Air Marshal Service?

a. Consists of highly trained paramilitary officers. b. Is deployed to recapture fugitives from justice. c. Guards airports, terminals and cargo areas. d. Is a relatively clandestine law enforcement agency (Answer)

Presidential major disaster declarations

a. Constitutes broad authority for federal agencies to provide assistance to help state and local governments. b. Are issued after disasters occur. c. Are an important tool for releasing necessary resources. d. All of the above. (Answer)

International courts:

a. Have jurisdiction over the entire international community. b. Can have a significant impact when nations agree to recognize their authority. (Answer) c. Both "a" and "b". d. Have no bearing on security.

Which of the following centers were created after the report of the 9/11 Commission?

a. The National Center for Homeland Security. b. The Central Intelligence Center. c. The National Security Center. d. None of the above.(Answer)

A hazard that results in a condition of risk is referred to as which of the following:

a. A disaster. b. A potential risk. c. A natural event. d. An emergency event. (Answer)

The Modified Mercalli Intensity (MMI) Scale is used to measure which of the following:

a. Tornadoes. b. Hurricanes. c. Floods. d. Earthquakes. (Answer)

The modern homeland security environment unfolded very quickly with the implementation of which of the following initiatives:

a. A bombing campaign against Syria. b. Formal declaration of war against Al Qaeda. c. Deportations of Muslim immigrants. d. Passage of the USA PATRIOT Act of 2001. (Answer)

Echelon consists of which of the following initiatives?

a. A classified special operations command. b. A covert network of federal and state homeland security officials. c. Confidential escalation or de-escalation of counterterrorist initiatives. d. A satellite surveillance network. (Answer)

A condition posing potential risks is referred to as which of the following:

a. A disaster. b. A hazarD. (Answer) c. A natural event. d. An emergency event.

Which of the following statements is most accurate concerning hate crimes.

a. All hate crimes are acts of terrorism. b. Not all hate crimes are acts of terrorism, and not all acts of terrorism are hate crimes. c. All acts of terrorism are hate crimes. d. All hate crimes are acts of terrorism, and all acts of terrorism are hate crimes. (Answer)

The Symbionese Liberation Army was

a. An African American nationalist organization. b. A Puerto Rican nationalist organization. c. A Patriot movement militia. d. A left-wing terrorist group. (Answer)

Prevention and mitigation planning refer to which of the following?

a. An effort to review and analyze past practices and procedures. b. Critiquing existing practices and procedures on an ongoing basis. c. Quick reaction when an incident occurs. d. Devising procedures and policies that reduce the severity of threats to homeland security. (Answer)

During the first Red Scare in 1919, the perceived threat emanated from which of the following:

a. Anarchist and communist terrorism and subversion. (Answer) b. Fascist and Nazi terrorism and subversion. c. Both "a" and "b". d. Neither "a" nor "b".

International terrorism in the United States has historically been motivated by which of the following?

a. Anti-Castro movements. b. Jewish groups opposing the former Soviet Union's emigration policy. (Answer) c. Canadian separatist movements. d. Both "a" and "b".

Which of the following tendencies are often found on the far and fringe right-wing?

a. Antigovernment sentiment. b. Racial supremacist sentiment. c. Conspiracy theories. d. All of the above. (Answer)

Extradition treaties:

a. Are binding on the entire international community. b. Require signatory parties to bind over terrorist suspects at the request of fellow signatories. (Answer) c. Serve as international crimes codes. d. All of the above

The critical tasks included in the National Response Framework

a. Are included in each of the core capabilities, and intended to be undertaken by response authorities. (Answer) b. Require careful planning at the presidential level. c. Authorize state and local officials to use federal funds. d. Are not relevant at the state and local levels.

Joint Field Offices

a. Are permanent federal facilities that regularly coordinate response efforts. b. Are temporary federal facilities that provide a central location for coordination of response efforts. (Answer) c. Represent state and local emergency response efforts. d. Provide security for first responders.

Verified cyberattacks

a. Are very uncommon and relatively ineffective. b. Began to occur very recently and have been adequately managed. c. Are always reported for security reasons. d. Began to occur in the late 1990s, and have become more destructive over time. (Answer)

The USA FREEDOM Act was enacted for which of the following reasons:

a. As a reaction to the revelation that the National Security Agency engaged in bulk data collection of telecommunications records. (Answer) b. Because of the need to eliminate civil liberties violations by state and local agencies. c. For the protection of the freedom of speech and assembly during homeland security crises. d. None of the above

Information and Sharing Centers engage in which of the following?

a. Assistance in planning for the critical infrastructure centers identified by the NIPP. (Answer) b. Assistance in sharing intelligence information. c. Developing plans based on analysis of intelligence information. d. Both "b" and "c".

The primary mission of the Department of Energy is to

a. Assure national distribution of electricity, coal, oil, and other energy sources. b. Advance the national, economic, and energy security of the United states. (Answer) c. Create energy independence for the United States. d. All of the above.

The New Terrorism is characterized by which of the following?

a. Asymmetrical tactics. b. The threat of weapons of mass destruction. c. Indiscriminate targeting. d. All of the above. (Answer)

The November 2015 Paris incident involved which of the following?

a. Asymmetrical warfare. b. Operatives armed with assault rifles and suicide explosives. c. Few casualties. (Answer) d. Both "a" and "b".

The Charlie Hebdo incident involved which of the following?

a. Asymmetrical warfare. b. Vengeance and retribution for defaming Islam. c. Several days of political violence in a Western country. d. All of the above. (Answer)

The primary mission of the Department of Defense is to

a. Attack the nation's enemies. b. Eliminate international terrorist organizations. c. Provide the military forces needed to deter war and protect the nation's security. (Answer) d. All of the above.

Terrorists attack aviation targets for which of the following reasons?

a. Aviation targets possess significant symbolic value. b. They are hubs of commerce with significant economic values. c. It is easy for terrorists to attack and escape through airports and airliners. d. Both "a" and "b". (Answer?)

In the United States, which of the following ethical standards are recommended when reporting terrorist incidents:

a. Avoid unchallenged terrorist propaganda. b. Never try to solve a situation. c. Do not serve as a spokesman/accomplice of the terrorists. d. All of the above. (Answer)

Targets of the ALF and ELF include which of the following?

a. Banks and other symbols of "capitalist exploitation." b. Wealthy members of the "ruling class." c. Laboratories, facilities where animals are kept, vehicles, and construction. (Answer) d. Both "a" and "b"

The United States imposes which of the following sanctions against state sponsors of terrorism:

a. Bans on arms-related exports and sales. b. Prohibitions on economic assistance. c. Both "a" and "b". (Answer) d. "a" but not "b".

Conceptually, the overarching goal of the National Infrastructure Protection Plan is to accomplish which of the following?

a. Build a collaborative framework for governments at the state and local levels. b. Build a collaborative framework for the private sector at the state and local levels. c. Build a safer, more secure, and more resilient nation by preventing, deterring, neutralizing, or mitigating the effects of an attack or disaster. (Answer) d. Both "a" and "b"

As a matter of practical necessity, which of the following counterterrorist policy adaptations may be available for implementation:

a. Controlling the dissemination of information from the media. b. Surveillance of private communications. c. "Data mining." d. All of the above. (Answer)

The purpose of the National Incident Management System is to

a. Coordinate all state and local first responders. b. Initiate collaboration between the public and private sectors. c. Return homeland security authority to state and local governments. d. Serve as the template for the management of incidents on a national scale. (Answer)

Consortia of regional governing bodies that promote collaboration and collaboration are referred to as

a. Councils of government. (Answer) b. Associations of government. c. Regional governing bodies. d. Organizations of government.

The "fronts" in the modern war on terrorism include which of the following?

a. Counterterrorist financial operations. b. Covert shadow wars. c. Global surveillance of communications technologies. d. All of the above. (Answer)

There is a distinct probability that the terrorist threat environment in the near future will emanate from which of the following challenges?

a. Countries where governments are not friendly. b. Environments where ethnonational, religious, or political conflicts remain unresolved. (Answer) c. Disgruntled students. d. None of the above.

Which of the following tasks best describe the mission of the DHS Private Sector Office?

a. Create and manage private sector advisory councils. b. Interface with other relevant agencies to ass the impact of those agencies on the private sector. c. Train and coordinate the missions of private security services. d. Both "a" and "b". (Answer)

The concept of target hardening is intended to accomplish which of the following?

a. Creating better "blast walls" on buildings and other installations. b. Deter would-be terrorists from selecting hardened facilities as targets. (Answer) c. Securing the nation's borders. d. Create long-term solutions for ending terrorist environments.

"Symbolism" of targets refers to:

a. Creative interpretation of motives. b. Creative discussion of terrorist attacks. c. Redefinition of "enemy" interests by extremists and terrorists. (Answer) d. None of the above

The National Infrastructure Protection Plan (NIPP) identifies sixteen

a. Critical infrastructure sectors to form the core of NIPP planning protocols. (Answer) b. Policy planners who would convene in the event of a terrorist incident. c. National security agencies who have primary responsibility for hardening targets. d. Border states that form a "front line" for securing the nation's borders.

The concept of "porous nodes" includes which of the following?

a. Cybersecurity. b. Port security. c. Citizen security. d. All of the above. (Answer)

Threats to cybersecurity include which of the following?

a. Cyberterrorism. b. Cyberattack. c. Cybersabotage. d. All of the above. (Answer)

Which of the following challenges could greatly complicate the mitigation process at the site of a chemical or biological attack?

a. Decontamination of the site may be delayed if the attack is massive in scale. b. Medical facilities and medical supplies may be severely stressed. c. Contaminants still at the site could endanger emergency personnel. d. All of the above. (Answer)

The primary reference point for the debate on militarization of the police is

a. Deployment of police units internationally. b. Joint operations between the police and armed forces. c. An increased acquisition of surplus military hardware such as armored vehicles. (Answer) d. All of the above.

The internment camp countermeasure was adopted for which of the following purposes:

a. Deportations of suspected communists. b. High-profile investigations and prosecutions. c. Detention of Confederate sympathizers in Union states. d. Relocation of thousands of ethnic Japanese. (Answer)

Central attributes of the modern "homeland security" concept include:

a. Detentions of immigrants who fit certain profiles. b. Mobilization of domestic armed militias. c. Collaboration on conceptual foundations for comprehensive homeland security. (Answer) d. All of the above.

The Building and Infrastructure Protection Series (BIPS) is a series of published manuals that

a. Discuss building designs to mitigate damage in the event of a disaster. b. Brings together researchers, designers, and building owners to discuss protecting infrastructure. c. Serve as practice manuals for federal, state, and local agencies with domestic security duties. d. All of the above. (Answer)

Long-term domestic security initiatives must incorporate which of the following objectives?

a. Disrupt and prevent violent extremists from operationalizing terrorist conspiracies. b. Ensure capable federal leadership in developing common standards for homeland security systems at state and local levels. c. Build strong consensus among the three branches of government. d. Both "a" and "b". (Answer)

During the Cold War era:

a. Domestic disturbances in the United States led to the initiation of federal, state, and local efforts to monitor activist activity. (Answer) b. Domestic disturbances in the United States led to frequent declarations of martial law. c. Domestic disturbances in the United States led to several armed rebellions. d. All of the above.

During the Cold War era:

a. Domestic security tension increased in the United States. b. Frequent warfare occurred in the developing world between allies of the United States and Soviet Union. c. Virtually every community in the United States engaged in civil defense drills. d. All of the above. (Answer)

Which of the following statements is most accurate regarding mobilization of state National Guard units?

a. During emergencies, the executive authority of governors is similar to presidential executive authority. b. Mobilization may be initiated in accordance with state laws and the United States Code. c. Permission must be received from the U.S. Department of Defense. d. Both "a" and "b". (Answer)

Biological agents include all of the following, except:

a. Ebola. b. Anthrax. c. Smallpox. d. Phosgene. (Answer)

Counterpoints to international terrorism may come from situations similar to which of the following events?

a. Effective international counterterrorist cooperation. b. The lack of a single binding or common ideological foundation for political violence. c. Events such as the 2011 Arab Spring. d. All of the above (Answer)

Military applications of computer-initiated actions against adversaries

a. Embed cyber technology into American war fighting capabilities. b. Can serve as antiterrorist options. c. Include bombing enemy computer centers. d. Both "a" and "b". (Answer)

After the domestic attacks of September 11, 2001, which of the following problems were identified in the federal bureaucracy?

a. Entrenched and cumbersome bureaucratic cultures and procedures. b. Long-standing interagency rivalries. c. Fragmentation of counter-terrorist operations. d. All of the above. (Answer)

Which of the following statements is most accurate regarding American entry points and departure locations from a domestic security perspective?

a. Entry points and departure locations are adequately secured. b. The number of entry points and departure locations are adequately secured. c. The sheer number of entry points and departure locations is daunting from a domestic security perspective. (Answer) d. Both "a" and "b".

Current "active shooter" protocols recommend which of the following:

a. Evacuate. b. Hide out. c. Take action against the active shooter. d. All of the above. (Answer)

The 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. Identified which of the following deleterious effects of a terrorist attack?

a. Exploitation of elements of a particular infrastructure. (Answer) b. Non-use of infrastructure. c. Abandonment of infrastructure. d. Non-management of infrastructure.

Modern terrorists have ushered in a period of "globalized" terrorism, using which of the following?

a. Extensive contact with public relations firms. b. Advanced communications technologies such as the Internet and cable news outlets. (Answer) c. Establishing diplomatic relations with sympathetic governments. d. All of the above.

Which of the following statements is most accurate regarding the future of the reactionary right in the United States?

a. Extremists on the fringe and far right will continue to promulgate conspiracy theories and attract a few true believers to their causes. b. Possible threats exist from religious extremists who could reinvigorate the violent moralist movement. c. The promulgation of publications such as The Turner Diaries1 and The Myth of the Six Million continue to spread racial and anti-Semitic extremism. d. All of the above. (Answer)

Federal intelligence collection is undertaken by which of the following agencies?

a. Federal Bureau of Investigation. b. National Security Agency. c. Diplomatic Security Service. d. All of the above. (Answer?)

Which of the following statements is most accurate about homeland security policing?

a. Federal agencies use their law enforcement authority as a national police force. b. The Tenth Amendment to the U.S. Constitution grants national law enforcement authority to the federal government. c. Federal agencies do not enforce state and local laws. (Answer) d. Both "a" and "b".

After the Second World War, and prior to the modern homeland security environment:

a. Federal civil defense initiatives were coordinated by a succession of agencies. b. The Federal Emergency Management Agency was established for the overall coordination of disaster relief. c. Both of the above. (Answer) d. Neither of the above.

Which of the following statements about the Department of Homeland Security is most accurate?

a. Few directorates and other offices were created in order to enhance efficiency of operations. b. The department is one of the most independent agencies in the federal bureaucracy. c. The department is one of the largest agencies in the federal bureaucracy. (Answer) d. Both "a" and "b".

The Transportation Security Administration provides leadership

a. For creating long lines at airports. b. Securing the nation's highways. c. Securing transportation in collaboration with the (Answer) Department of Transportation and Coast Guard. d. Securing all aspects of motor vehicle transportation.

The National Response Framework contains which of the following?

a. Fourteen core capabilities (Answer) b. Sixteen response mechanisms. c. Eight regional plans. d. Fifteen planning guidelines

Counterterrorism most accurately refers to which of the following?

a. Government homeland security principles. b. Using extreme violence as a counterpoint to terrorist violence c. Proactive policies that seek to eliminate terrorist environments and groups. (Answer) d. All of the above.

FEMA's Hazard Mitigation Assistance programs are

a. Grant programs that provide funding for mitigation activities that reduce disaster losses. (Answer) b. Funding agencies that provide monetary compensation to victims of incidents. c. FEMA camps established for communities displaced by incidents. d. Both "a" and "b".

The primary mission of the Department of Agriculture is to

a. Grow food. b. Ensure a safe, sufficient and nutritious food supply. c. Feed the nation in the event of a terrorist incident. d. All of the above. (Answer)

Prior to the domestic attacks of September 11, 2001, federal services agencies

a. Had a variety of missions. (Answer) b. Carefully coordinated their operations to secure the homeland. c. Worked closely with the military and intelligence agencies to secure the homeland. d. None of the above.

Terrorist targeting against maritime and port infrastructure

a. Has recently occurred with significant frequency. b. Has long been a favored strategy of violent extremists. c. Has rarely been a priority for violent extremists. (Answer) d. Both "a" and "b".

In the United States, real-time consequences of a mass-casualty chemical or biological attack

a. Have been experienced on many occasions. b. Are occasionally experienced. c. Have never been experienced. (Answer) d. Are expected to occur at any moment.

Sector-specific agencies

a. Have been placed under the authority of the Department of Homeland Security. b. Are regional homeland security agencies. c. Protect critical infrastructure in the United States from terrorist attacks. (Answer) d. None of the above.

The Centers for Disease Control and Prevention published "First Hours: Emergency Responses" in order to

a. How to properly train first responders. b. Propose guidelines on how health officials should respond in the immediate aftermath of a chemical or biological attack. (Answer) c. Create a national approach to pre-dawn attacks. d. None of the above.

Strong public and political criticism was directed against the federal response to which of the following natural disasters:

a. Hurricane Katrina. (Answer) b. Hurricane Hugo. c. Hurricane Hannah. d. None of the above.

Which of the following is a primary component of the prevention and mitigation process?

a. Identifying potential risks. b. Assessing the probability that a terrorist incident will occur. c. Assessing the consequences to society should a terrorist incident occur. d. All of the above. (Answer)

In the United States, left-wing terrorist violence has usually originated from which of the following motivations?

a. Ideological beliefs. b. Ethno-nationalist tendencies. c. Racial intolerance. d. All of the above. (Answer)

The National Emergency Management Association regularly conducts surveys in order to

a. Impose federal oversight of the national homeland security effort. b. Monitor the configuration of emergency management services at the state level. (Answer) c. Create a national homeland security enterprise. d. All of the above.

What occurred during the "long, hot summers" of the 1960s?

a. Intensive student activism. b. Severe drought conditions in the American south. c. A series of disturbances in African American urban communities. (Answer) d. None of the above.

Federal agencies such as OSHA and FEMA regard the ICS principles as

a. Interesting proposals for possible implementation. b. Integral components of their overall missions. c. Some agencies mandate the adoption of ICS. d. Both "b" and "c". (Answer)

Complete the following statement: "Prior to the formation of the modern homeland security environment, the overarching mission of police agencies was to serve in a _____ capacity."

a. Internal security. b. Protect and serve. c. Collaborative. d. Law enforcement. (Answer)

Complete the following statement: "After to the formation of the modern homeland security environment, the overarching mission of police agencies was to serve in a _____ capacity."

a. Internal security. (Answer) b. Protect and serve. c. Collaborative. d. Law enforcement.

Which of the following courts or tribunals were established to prosecute offenses in international forums:

a. International Criminal Tribunal for the Former Yugoslavia. b. International Court of Justice. c. International Criminal Tribunal for Rwanda. d. All of the above. (Answer)

Terrorists operate on the "world's stage" because:

a. International attacks reap propaganda benefits that are impossible when attacks are limited to domestic attacks. b. The use of social networking media and the Internet promulgate their message to a global audience. c. Media attention is immediate. (Answer) d. All of the above.

The use of biometric technologies allows federal agencies to store data such as which of the following?

a. Iris scans. b. Speech verification. c. Vascular recognition. d. All of the above. (Answer)

The United States Conference of Mayors

a. Is a "think tank" for mayors. b. Provides advocacy for issues affecting major cities and other urban governments. (Answer) c. Is an annual meeting of mayors. d. Was created to assist in all-hazards interventions.

In the event of a major incident, the restoration of C4I

a. Is a very complex process. b. Necessitates coordination and collaboration across government tiers. c. Requires coordination from the federal tier of government. d. All of the above. (Answer)

The National Homeland Security Consortium

a. Is an academic "think tank" that studies homeland security issues. b. Was created as a "library" for homeland security information. c. Serves as a public forum for government personnel and private practitioners. (Answer) d. None of the above.

The Ku Klux Klan

a. Is an international racist organization. b. Was created to promote racial solidarity among Europeans and white Americans. c. Has no counterpart among international right-wing movements. (Answer?) d. Both "a" and "b".

In the United States, freedom of reporting about matters affecting security policy:

a. Is permitted because of the people's right to know. b. Is unregulated because of First Amendment principles. c. Has periodically been regulated by restricting media access to information about matters that affect security policy. (Answer) d. None of the above.

Which of the following statements best describes the purpose of the National Response Framework?

a. It implements Homeland Security Presidential Directives. b. It forms the foundation for public-private collaboration. c. It provides the structure and mechanisms for national-level policy for incident management. (Answer) d. All of the above.

Which of the following statements regarding the Incident Command System is most accurate?

a. It is a new emergency coordination concept developed in the aftermath of September 11, 2001. b. It is an evolving emergency coordination concept originating from the modern terrorist environment. c. It is a relatively well-developed emergency coordination concept originally adopted in 1970. (Answer) d. Both "a" and "b".

Which of the following best describes right-wing extremism?

a. It is a reaction against perceived threats to a group's value system, its presumption of superiority, or its sense of specialness. (Answer) b. It is future oriented, seeking to reform or destroy an existing system prior to building a new society. c. It is essentially radical in nature. d. None of the above.

Which of the following statements regarding the modern war on terrorism is most accurate?

a. It is a war against the enemies of peace, freedom, and justice. (Answer??) b. It is a war against behavior as much as against terrorist groups. c. Counterterrorist models must be flexible to respond to new terrorist environments. (NOT) d. Both "b" and "c".

The Enhanced Fujita-Pearson Scale is used to measure which of the following:

a. Tornadoes. (Answer) b. Hurricanes. c. Floods. d. Earthquakes.

Which of the following best describes left-wing extremism?

a. It is nostalgic, seeking to restore a past system or environment that has been "stolen." b. It is future oriented, seeking to reform or destroy an existing system prior to building a new society. (Answer) c. It is essentially reactionary in nature. d. None of the above.

Which of the following statements is most accurate regarding projecting the future of homeland security?

a. It is often an imprecise and speculative exercise. (Answer) b. Accurate prediction can be accomplished with the proper application of technological innovations. c. Experts are very adept at projecting accurate scenarios. d. Both "b" and "c".

Which of the following statements about ICE is most accurate?

a. It is the second-largest federal law enforcement investigative agency. (Answer?) b. Through its directorates, ICE deploys personnel internationally. c. ICE supervises the U.S. Coast Guard. d. Both "a" and "b".

Which of the following statements best summarizes the content of the National Strategy for Public Health and Preparedness?

a. It recommends medical procedures for mass casualty attacks. b. It was written as an all-hazards approach to transform the national approach to protecting the health of the nation against all disasters. (Answer) c. It proposes a national plan to stockpile medicine and food. d. All of the above.

Which of the following statements most accurately describes the purpose of the National Incident Management System?

a. It serves as a clearinghouse for homeland security information. b. It consists of the federal government's guidelines for state and local governments. c. It provides highly trained personnel for the management of incidents. d. It promotes multi-tiered collaboration between federal, state, and local governments (Answer)

Which of the following observations is most accurate concerning asymmetrical warfare?

a. It utilizes principles of conventional conflict. b. There is no true definition of this type of warfare. (Answer) c. It utilizes unexpected, unpredictable, and unconventional methods of political violence. d. Terrorists try to utilize other methods of political violence.

Which of the following statements regarding jihad is most accurate?

a. Jihad is an ideology of world domination. b. The greater jihad refers to the struggle each person has within themselves to do what is right. (Answer) c. Jihad and crusades represent identical concepts d. None of the above.

Osama bin Laden was:

a. Killed in Afghanistan by the U.S. Central Intelligence Agency. b. The mastermind behind opposition to the war in Iraq. c. Founder of Al-Qaeda. (Answer) d. All of the above.

Which of the following trends tend to characterize the American left?

a. Labor activism. (Answer) b. Racial exclusion. c. Religious intolerance. d. None of the above.

Homeland security initiatives reflect which of the following:

a. Legal parameters established under law. b. International and domestic security environments. c. Both "a" and "b". (Answer) d. "a" but not "b".

Enhanced interrogations pose which of the following challenges to the protection of civil liberties:

a. Legal protections should be enforced for suspects. b. Illicit kidnappings and detentions violate local and international laws. c. High potential for racial profiling. d. Torture, however defined, is fundamentally immoral. (Answer)

Terrorist profiling poses which of the following challenges to the protection of civil liberties:

a. Legal protections should be enforced for suspects. b. Illicit kidnappings and detentions violate local and international laws. c. High potential for racial profiling. (Answer) d. Torture, however defined, is fundamentally immoral.

Extraordinary renditions pose which of the following challenges to the protection of civil liberties:

a. Legal protections should be enforced for suspects. b. Illicit kidnappings and detentions violate local and international laws. (Answer) c. High potential for racial profiling. d. Torture, however defined, is fundamentally immoral.

Labeling the enemy poses which of the following challenges to the protection of civil liberties:

a. Legal protections should be enforced for suspects. (Answer) b. Illicit kidnappings and detentions violate local and international laws. c. High potential for racial profiling. d. Torture, however defined, is fundamentally immoral.

The New Terrorism is characterized by which of the following?

a. Loose, cell-based networks with minimal lines of command and control. b. Politically vague, religious, or mystical motivations. c. Skillful use of the Internet and manipulation of the media. d. All of the above. (Answer)

Conceptually, the underlying purpose of unified coordination is to

a. Manage on-scene operations at the incident site. b. Focus on providing on-scene response efforts and conduct support operations that may extend beyond the incident site. (Answer) c. Extend the reach of local authorities to a national environment. d. All of the above.

Critical infrastructure consists of which of the following?

a. Military hardware. b. Law enforcement policies and programs. c. Tools used for counterterrorist operations. d. None of the above. (Answer)

Tempora and PRISM were code-names for which of the following operations:

a. Military strikes by U.S. and British armed forces. b. Surveillance of Syrian and Iraqi communications. c. The acquisition of European and U.S. telephone metadata and Internet surveillance. (Answer) d. None of the above.

The National Planning Frameworks institutionalize the long-term goal of "tiered" responses, which involve

a. Mobilizing communication nodes regionally and nationally. b. Sealing off porous nodes in multiple states when an incident occurs. c. Integrated response systems at all levels of authority. (Answer) d. None of the above

In comparison to military institutions, law enforcement and intelligence institutions are arguably

a. More adept at keeping terrorists "on the run" over time. (Answer) b. Less successful in destroying terrorist groups. c. Less likely to succeed in dissuading local support for terrorist movements. d. More prominent on the world stage.

Which of the following challenges and problems best explains reasons for why government agencies incorporate ICS principles into emergency response planning?

a. Multiple reporting lines within agencies. b. Redundant or unclear lines of authority. c. Unverified information reported during incidents d. All of the above. (Answer)

In the future, homeland security

a. Must adapt to ever-changing environments. (Answer) b. Will be abolished because terrorism will be defeated. c. Will become irrelevant. d. All of the above.

The netwar theory is an important concept in the new terrorist environment because it refers to which of the following?

a. New and evolving modes of cyber warfare. b. Addressing the threat of unprecedented levels of cyber terrorism. c. A new mode of conflict in which use is made of network forms of organization and related strategies and technologies attuned to the information age. (Answer) d. Both "a" and "b".

Which of the following factors challenge the effective control of terrorist threats?

a. Opposing the New Terrorism. b. Building collaborative consensus. c. Countering extremism. d. All of the above. (Answer)

During emergencies, it is the expected duty of the governor to

a. Pass on responsibility for emergency responses to other officials. b. Grant favors to loyal communities. c. Serve as the face of the local relief effort, and coordinate emergency orders. (Answer) d. All of the above.

Symbolic targets include:

a. Passenger carriers. b. Embassies. c. Famous people. d. All of the above. (Answer)

Which of the following statements is most accurate regarding the future of international terrorism as it affects the United States?

a. Patterns of international terrorism will continue to be decreasingly ideological and increasingly "cultural." b. Stateless international terrorism will continue to be the predominant model in the global arenA. c. International terrorism will be a minor concern. d. Both "a" and "b". (Answer)

Which of the following statements is most accurate regarding the problem of reactive planning?

a. Plans are often responsive to terrorist scenarios after those scenarios have been implemented by the terrorists. (Answer) b. Planning is usually intended from the beginning to be reactive. c. Plans proactively and successfully thwart many terrorist plots. d. Both "a" and "b".

Which of the following statements regarding non-terrorist mass shootings is most accurate:

a. Populous high-income countries experience such shootings at similar incidence rates. b. The United States has a lower incidence rate than other populous high-income countries. c. Perpetrators tend to be motivated by ideology, race, or religion. d. None of the above. (Answer)

Which of the following statements best describes the concept of medical surge?

a. Preparation for major emergencies or disasters involving large numbers of patients who require specialized medical needs. (Answer) b. Placing specialized mobile surgical hospitals on high alert so that they can be quickly mobilized and flown to disaster sites. c. Convening specialized medical personnel who can be quickly mobilized and flown to disaster sites. d. All of the above

The all-hazards umbrella refers to:

a. Preparation for natural disasters. b. Preparation for all potential disasters. c. Preparation for human-created disasters. d. All of the above. (Answer)

Protecting the nation's borders is

a. Primarily the responsibility of states. b. Primarily the responsibility of the military. c. Primarily a federal responsibility. (Answer) d. Primarily the right of the people.

The Posse Comitatus Act

a. Prohibits the domestic deployment of the U.S. Army as a posse comitatus to enforce domestic policies. b. Does not apply to the U.S. Coast Guard. c. Allows the domestic deployment of the U.S. Army as a posse comitatus during crises. d. Both "a" and "b". (Answer)

The primary mission of the Department of the Treasury is to

a. Promote the conditions that enable economic growth and stability, protect the integrity of the financial system, and manage the U.S. Government's finances and resources effectively. (Answer) b. Print the nation's money supply. c. Oversee the Secret Service. d. All of the above.

Evolving cultural concepts such as diversity and multiculturalism promote which of the following values:

a. Promoting the melting-pot ideology. b. Assuring mainstream cultural values are accepted and adhered to. c. Adaptations to the United States' gradual transformation into a country in which no single demographic group will constitute a majority of the population. (Answer??) d. Both "a" and "b".

The primary mission of the Department of Health and Human Services is to

a. Protect the health of all Americans and provide essential human service. (Answer) b. Secure the supply of the nation's medicine. c. Oversee the distribution of services to humans. d. None of the above.

Critical infrastructure and key resources (CIKR) refers to which of the following?

a. Protection of urban porous nodes. b. Living with hardened targets. c. Vital networks, assets and systems whose destruction or incapacitation would have a debilitating effect domestically. (Answer) d. None of the above.

The Quadrennial Homeland Security Review Report: A Strategic Framework for Securing the Homeland (QHSR) is intended to:

a. Provide a framework for defeating terrorism. b. Develop a framework for inter-governmental collaboration. c. Empower the federal government during emergencies. d. Consolidate the definition of homeland security by presenting the concept as encompassing a broader and more comprehensive mission than previously envisioned. (Answer)

The New Left was a movement largely made up of

a. Racial and ethnonationalist radicals. b. Fascist activists and sympathizers. c. None of the above. (Answer) d. Communist and anarchist terrorists.

Which of the following groups were responsible for most terrorist incidents in the United States for the ten-year period 2001-2011?

a. Racial supremacists. b. Islamist extremists. c. Members of the Patriot movement. d. Eco-terrorists. (Answer)

Which of the following weapons pose special threats to aircraft, airline terminals and other aviation targets?

a. Radiological "dirty bombs." b. Cyberterrorism. c. Rocket-propelled grenades. (Answer) d. Edged weapons.

The configuration of emergency management and services within state governments

a. Rarely remains static and is often subject to reorganization. b. Is subject to reorganization when elections are held or budget priorities change. c. Is rarely subject to reorganization, in order to promote stability and consistency. d. Both "a" and "b". (Answer)

Max Weber invented the term bureaucracy to describe and explain which of the following?

a. Rationality and efficiency in managing governments. (Answer) b. Inefficiency in managing governments. c. How to efficiently manage domestic security. d. The democratic process.

If skillfully administered, future adaptations of collaborative initiatives will serve which of the following purposes?

a. Reduce the likelihood of disorganization and disarray in the event of a terrorist incident. b. Continuation of the presumption that some degree of common purpose is an underlying motivation for successful outcomes. c. Federal, state, and local coordination of responses. d. All of the above. (Answer??)

The mission of the Border Patrol has

a. Remained unchanged since it was established. b. Consistently been adapted to serve the conditions of the present environment. (Answer) c. Remained unwritten in order to promote flexibility. d. Changed with state governor input.

Leaderless resistance is

a. Requires the formation of phantom cells to wage clandestine resistance against the government. (Answer) b. An anarchist organizational model. c. The formation of protest movements directed against the U.S. government. d. None of the above.

Which of the following statements is most accurate regarding research on the mitigation of terrorist attacks on infrastructure?

a. Research has only begun in recent years. (Answer) b. Extensive research has been undertaken. c. Scholars have difficulty operationalizing the concept of mitigation. (answer) d. Government research is given priority.

Weapons of mass destruction include which of the following:

a. Rocket-propelled grenades. b. Sarin. (Answer) c. Precision-guided munitions. d. Semtex.

Which of the following homeland security missions are identified in the Quadrennial Homeland Security Review Report: A Strategic Framework for Securing the Homeland (QHSR):

a. Securing and Managing Our Borders. b. Enforcing and Administering Our Immigration Laws. c. Identifying and Eliminating Terrorist Cells. d. "a" and "b" but not "c". (Answer)

In 2002, the new Department of Homeland Security was tasked with which of the following areas of responsibility?

a. Securing the borders. b. Enforcing immigration laws. c. Guarding against terrorism. d. All of the above. (Answer)

"Enhanced security" includes which of the following:

a. Security barriers. b. Target hardening. c. Computer firewalls. d. All of the above. (Answer)

The international drug trade

a. Should be legalized. b. Cannot be suppressed c. Has become prominent in the financing of some extremist movements. (Answer) d. Helps the global economy

The NIPP identifies which of the following in order to accomplish its overarching goal?

a. Sixteen critical infrastructure sectors. (Answer) b. Seven important porous nodes. c. Twelve crucial priority infrastructures. d. Both "a" and "b".

Countering dissent may involve which of the following preventive countermeasures:

a. Social Reform. b. Political inclusion. c. Protection of constitutional rights. d. All of the above. (Answer)

Assuming violent coercion will continue to be a counterterrorist option, which of the following outcomes is part of the record of success for this option?

a. Specific deterrence against a specific adversary. (Answer?) b. Demonstrations of national will. c. Annihilation of civilian supporters of terrorist movements. d. Both "a" and "b".

The specified core capabilities that are contained in the National Planning Frameworks are most accurately defined as which of the following?

a. Specified funding priorities for achieving the National Preparedness Goal. b. Statements of legal jurisdiction for tiered government for achieving the National Preparedness Goal. c. The elements and action items, designed to achieve the National Preparedness Goal. (Answer) d. Both "a" and "b".

Which of the following statements is most accurate regarding the emergency management role of state bureaucracies?

a. State agencies are temporarily assigned to federal agencies. b. Governors assume total authority over state agencies. c. State bureaucracies are responsible for implementing state emergency plans. (Answer) d. None of the above.

Which of the following problems became quite clear during the year following the domestic attacks of September 11, 2001?

a. State and federal agencies were well prepared to address challenges to domestic security. b. Domestic attacks are predictable when state and federal agencies "connect the dots." c. The old organizational model did not adapt well to the new security environment. (Answer) d. No one can ever truly "connect the dots" to predict domestic attacks.

Central attributes of homeland security include which of the following:

a. State and local agencies. b. The federal bureaucracy. c. Collaboration on conceptual foundations for comprehensive security. d. All of the above. (ANSWER)

Which of the following statements is most accurate about responding to homeland security events?

a. State and local authorities provide support and assistance to federal first responders. b. First responders to incident sites are local agencies rather than federal authorities. c. State and local agencies take the lead in stabilizing the immediate emergency vicinity. d. Both "b" and "c". (Answer)

The goal of multilevel collaboration has become a prevalent concept within the homeland security enterprise, because of which of the following?

a. State authorities have established state-level equivalents of the U.S. Department of Homeland Security. b. There is general acceptance by state and local authorities of federal grant assistance for funding homeland security initiatives. c. The National Planning Frameworks attempt to incorporate sate and local tiers of authority as collaborative partners. d. All of the above. (Answer)

Which of the following statements is most accurate?

a. State-level homeland security bureaucracies try to create uniform configurations nationally. b. There are significant similarities among state-level homeland security bureaucracies. c. There is no uniform configuration of state-level homeland security bureaucracies. (Answer) d. Both "a" and "b".

Which government entity has taken the lead in coordinating medical preparedness strategies?

a. State-level homeland security officials because they understand regional medical concerns. b. Urban first-responder officials in collaboration with state officials. c. The federal homeland security bureaucracy. (Answer) d. None of the above.

Plausible terrorist threat scenarios against the homeland include:

a. Strikes by international terrorists. b. Attacks by homegrown ideological extremists. c. Both of the above. (Answer) d. "a" but not "b".

Conventional weapons include which of the following:

a. Submachine guns. (Answer) b. Mustard gas. c. Radiological weapons. d. Biological agents.

Which of the following objectives have been suggested to explain modern terrorists' use of high-yield weapons to maximize casualties?

a. Such tactics please God. b. Such tactics attract attention. c. Such tactics influence enemies. d. All of the above. (Answer)

Conciliatory domestic policy options include which of the following:

a. Surrender. b. Negotiation. c. Military options. (ANSWER) d. All of the above.

During the Civil War, President Abraham Lincoln's administration applied with of the following countermeasures to thwart perceived threats to the war effort:

a. Suspension of the writ of habeas corpus. (Answer) b. Declaration of martial law throughout the Union states. c. Highly publicized prosecutions of selected individuals. d. Creation of the Secret Service to monitor anti-war sentiment

Assata Shakur and William Morales were leaders of which organizations?

a. Symbionese Liberation Army and New World Liberation Front. b. Black Liberation Army and FALN. (Answer) c. May 19 Communist Organization and United Freedom Front. d. Weathermen and Weather Underground Organization.

Logical targets for politically motivated cyberattacks include which of the following?

a. Telecommunications companies. b. Private corporations. c. Government Agencies. d. All of the above. (Answer)

Modern surveillance technologies are used to access which of the following?

a. Telephone records and conversations. b. Computer communications such as email. c. Credit card records. d. All of the above. (Answer)

In the modern era, the international terrorist threat to the global community originated from which of the following:

a. Terrorist groups operating domestically, led by domestic radicals. b. Support for terrorist movements from rival nations during the 1960s and 1970s. (Answer) c. Nuclear-armed adversaries. d. An international conspiracy among terrorist movements.

Which of the following statements most accurately describes the use of the Internet and social networking media by extremists?

a. Terrorists rarely access the Internet because of possible surveillance by intelligence agencies. b. Tweeting, texting, and other media platforms are used to record and tout claimed successes. (Answer) c. There exists a rudimentary and unsophisticated use of these technologies by extremists. d. These technologies are irrelevant to terrorist operations.

Which of the following statements regarding ongoing patterns of violence is most accurate?

a. Terrorists still associate the United States and the West with international exploitation. (Answer) b. Weapons of mass destruction are now commonly used by terrorists. c. Terrorists hide behind their ideologies and religions. d. Both "b" and "c".

Senator Joseph McCarthy presided of a period known as "McCarthyism" that involved which of the following countermeasures:

a. The "Palmer Raids." b. Internment camps. c. Senate hearings and investigations. (Answer) d. Suspension of the writ of habeas corpus.

Foreign Terrorist Organizations are listed in which of the following publications:

a. The Annual Report on Terrorism. b. Country Reports of Terrorist Attacks. c. Foreign Terrorist Organizations. d. Country Reports on Terrorism. (Answer)

Which annual publication by the United States Department of State reports terrorist designations:

a. The Annual Report on Terrorism. b. Country Reports of Terrorist Attacks. c. Foreign Terrorist Organizations. d. Country Reports on Terrorism. (Answer)

Which of the following agencies were incorporated in the new Department of Homeland Security after the September 11, 2001, organizational crisis?

a. The Central Intelligence Agency. b. The Federal Emergency Management Agency. (Answer) c. The Federal Bureau of Investigation. d. All of the above.

During the era of the "Old Terrorism" a persistent pattern of international behavior was characterized by

a. The Cold War rivalry between the Soviet Union and the United States. b. A synthesis of nationalism and Marxism by twentieth-century revolutionaries in the developing world. c. Attempts by former colonial powers to recapture lost colonies. d. Both "a" and "b".(Answer)

Counter-terrorist statutory authority is derived, in part, from which of the following acts:

a. The Elimination of Terrorism Act. b. The Homeland Security Terrorism Reduction Act. c. The Anti-Terrorism and Effective Death Penalty Act.(Answer) d. The War Powers Act.

Department of Homeland Security agencies tasked with securing the nation's ports includes which of the following?

a. The Federal Bureau of Investigation. b. The National Security Agency. c. The U.S. Coast Guard. (Answer) d. All of the above.

Which of the following statements is most accurate regarding the use of new technologies by extremists in the era of the New Terrorism?

a. The Internet, e-mail, and social networking media are rarely used by extremists interested in the terrorist trade. b. The Internet, e-mail, and social networking media are used to send instructions about overall goals, specific tactics, new bomb-making techniques, and other facets of the terrorist trade. (Answer) c. The Internet, e-mail, and social networking media are easily "hacked" by counterterrorist agencies. d. There is little evidence that the Internet, e-mail, and social networking media are used by extremists.

Homeland Security Presidential Directive 5 was an important foundation for the creation of which of the following?

a. The National Incident Management System. (Answer) b. The Department of Homeland Security. c. The National Response Framework. d. The National Infrastructure Protection Plan.

Which of the following was founded as the first national association representing municipalities, and provides advocacy support for cities, towns, and villages?

a. The National League of Cities. (Answer) b. The National Association of Cities, Towns, and Villages. c. The National Organization of Municipalities. d. None of the above.

Which of the following is a nonprofit public interest organization that promotes collaboration among regional government organizations?

a. The Organization of Regional Councils. b. The United States Association of Regional Councils. c. The National Association of Regional Councils. (Answer) d. The Regional Association of Regional Councils.

Violence from international sources against the United States will continue to come from which of the following?

a. The Provisional Irish Republican Army. b. The Jewish Defense League. c. Omega 7. d. Religious extremists from Middle Eastern spillovers. (Answer)

The so-called "3-1-1 rule" was implemented as a direct result of

a. The Shoe Bomber. b. The Underwear Bomber. c. The UNABOM-er. d. The Chemical Plot. (Answer)

Which of the following propositions most accurately reflects Cold War terrorist networking theory from the perspective of the West?

a. The Soviet Union and allies were behind most terrorist violence. (Answer) b. Terrorists supported each other with minimal control by government sponsors. c. The West controlled more terrorist networks than the Soviet Union. d. None of the above.

Which of the following legislation was passed in the immediate aftermath of the September 11, 2001 homeland attacks:

a. The USA FREEDOM Act. b. The USA PATRIOT Act. (Answer) c. The Anti-Terrorism and Effective Death Penalty Act. d. All of the above.

Which of the following statements is most accurate regarding the American definition of terrorism?

a. The United States coordinates its definition of terrorism with allied European countries. b. The United States has adopted an official definition of terrorism. c. The United States has not adopted a single definition of terrorism as a matter of government policy. (Answer) d. Both "a" and "b".

What is the most accurate statement describing terrorism-related laws prior to the modern homeland security era:

a. The United States had no terrorism-related laws. b. Domestic laws and international conventions were enacted in response to international terrorist activity and state sponsorship of terrorism. (Answer) c. The United States exclusively relied on its allies to enforce international law. d. The United States passed a large number of terrorism-related laws.

Domestic threats and conflict during the early American republic included the following incidents:

a. The Whiskey Rebellion. b. The Haymarket Riot. c. The Homestead Strike. d. All of the above. (Answer)

Which of the following statements regarding the Federal Aviation Administration is most accurate?

a. The agency is responsible for administering civil aviation. b. The agency is responsible for issuing regulations to control air traffic and promote safety. c. The agency provides security agents for airliners and airports. d. Both "a" and "b". (Answer)

The modern era of homeland security was implemented in the United States in response to the following threat(s) to the republic:

a. The attempted assassination of President Ronald Reagan. b. The 1972 Munich Olympics terrorist attack. c. The September 11, 2001 terrorist attacks. (Answer) d. All of the above.

Preparedness planning refers to:

a. The effort to reduce loss of life and property by lessening the impact of disasters. b. Coordinated interventions. c. Coordinated intervention to effectively restore affected populations to their pre-emergency norms of living and rebuild damaged infrastructure. d. The adoption of emergency management contingencies prior to the occurrence of an emergency situation. (Answer)

Emergency response operations refer to:

a. The effort to reduce loss of life and property by lessening the impact of disasters. b. Coordinated interventions. (Answer) c. Coordinated intervention to effectively restore affected populations to their pre-emergency norms of living and rebuild damaged infrastructure. d. The adoption of emergency management contingencies prior to the occurrence of an emergency situation.

Mitigation of risk refers to:

a. The effort to reduce loss of life and property by lessening the impact of disasters. (Answer) b. Coordinated interventions. c. Coordinated intervention to effectively restore affected populations to their pre-emergency norms of living and rebuild damaged infrastructure. d. The adoption of emergency management contingencies prior to the occurrence of an emergency situation.

During the Cold War era:

a. The international community entered a prolonged period of conflict between the United States and Germany. b. The threat of nuclear war spawned an extensive network of civil defense programs in the United States. c. Direct military conflict between the United States and Soviet Union occurred frequently. (Answer) d. None of the above.

Which of the following statements is most accurate regarding the future of the radical left in the United States?

a. The modern mass fervor on the left, including civil rights and Black Power movements, will spawn continued social violence. b. Radical Marxism is, and will remain, a significant cause of political violence in the U.S. c. Radical environmentalists, anarchists, and other single-issue extremists are likely to engage in sporadic violent incidents. (Answer) d. All of the above

Preparedness planning at the local level is extremely important because

a. The private sector is the sector of society most affected when a terrorist incident occurs. b. Most terrorist attacks are directed against private property and businesses. c. Most casualties are suffered among civilians. d. All of the above. (Answer)

Regarding domestic law, an important challenge for lawmakers is:

a. The problem of balancing the need for counterterrorist legislation against the protection of basic rights. (Answer) b. How to most effectively crack down on potential terrorist supporters. c. Giving as much power as possible to federal and state law enforcement agencies. d. All of the above.

Prior to the adoption of the National Response Framework, the Federal Response Plan provided which of the following?

a. The procedural framework for funding and food for disaster sites. b. The procedural framework for federal response coordination should an incident occur. (Answer) c. The procedural framework for developing analytical reports after an incident occurs. d. The procedural framework for presidential directives.

Collaborative planning is especially required between the public and private sectors, because

a. The public and private sectors view each other very favorably. b. There is a strong history of friendship between both sectors. c. Violent extremists deem entire societies and populations as legitimate targets. (Answer) d. Democracy is predicated on such collaboration.

Which of the following statements is most accurate about the three main components of the federal counterterrorist bureaucracy?

a. The three components consist of the judiciary, executive, and intelligence agencies. b. The three components consist of law enforcement and intelligence agencies, and military branches. (Answer) c. The three components consist of law enforcement agencies, military branches, and the judiciary. d. The three components consist of military branches, the executive, and the legislature.

The contagion effect refers to which of the following?

a. The use of biological weapons against porous nodes. b. The spread of disease as the result of terrorist use of toxins. c. The theoretical influence of media exposure on the future behavior of like-minded extremists. (Answer) d. Both "a" and "b".

Provisions of the USA PATRIOT Act include which of the following:

a. The use of nationwide search warrants. b. Deportation of immigrants who raise money for terrorist organizations. c. The use of roving wiretaps by investigators. d. All of the above. (Answer)

Possible policy options to combat the New Terrorism include which of the following?

a. The use of nuclear weapons. b. Declarations of war against terrorist groups. c. Eliminating ten extremists for each person they kill. d. Conciliatory options, if feasible. (Answer)

Antiterrorism most accurately refers to which of the following?

a. The use of the military to attack terrorist groups. b. The use of police units to disrupt domestic terrorist networks. c. Enhanced security, target hardening, and other defensive measures to prevent or deter terrorist attacks. (Answer) d. All of the above.

Why has electronic surveillance become a controversial practice in the United States:

a. There exists widespread consensus that increased surveillance is absolutely necessary to thwart terrorist conspiracies. b. Critics argue that government use can move well beyond legitimate counterterrorist applications. (Answer) c. Electronic surveillance technologies are inaccurate. d. Proponents believe not enough has been done to observe extremists.

The Tri-Border Area of central South America poses a plausible security challenge to the region and possibly the United States because of which of the following?

a. There is weak government control. b. There is an organized, vibrant criminal economy. c. Political extremism emanating from the Middle East exists. d. All of the above. (Answer)

Which of the following statements is most accurate regarding sleeper agents in the United States?

a. They are a clear and present danger to the stability and existence of the United States. b. Their existence has proven to be real possibility. (Answer) c. There is no viable threat from sleeper agents. d. The concept of sleeper agents is a popular myth.

Which of the following statements about the Alien and Sedition Acts are most accurate:

a. They are an effective homeland security legislative initiative. b. The legislation was enacted to combat international terrorism. c. They were directed against enemy immigrants and critics of government, and were repealed after strong criticism. (Answer) d. The legislation was an anti-communist initiative.

Which of the following statements regarding emergency support functions is most accurate?

a. They are standby emergency support agencies awaiting deployment. b. They assist standard support functions. c. They represent federal coordinating structures used to achieve the core capabilities. (Answer) d. They are synonymous with the core capabilities.

Which of the following statements is most accurate regarding presidential declarations?

a. They authorize national intervention when disasters and emergencies occur. (Answer) b. They release emergency food to state and local relief agencies. c. They are issued after consultation with Congress. d. All of the above.

Which of the following statements is most accurate about "choke points" on motor transportation networks.

a. They consist of border crossings, bridges, and terminals. (Answer) b. They are overlooked by TSA officers. c. There is no clear indication that they exist. d. Both "a" and "b".

Which of the following statements about early border patrol units is most accurate?

a. They were founded to halt the flow of drugs into the United States. b. They were founded to secure the southern border to halt incursions by South Americans. c. They were founded to halt the undocumented immigration of Chinese people across the southern border with Mexico. (Answer) d. To provide aid to the military.

Which of the following statements is most accurate concerning civil liberties and homeland security policy:

a. To achieve security, government responses must be proportional to the perceived threat and measured in how they are implemented. (Answer) b. Civil liberties must "take a back seat" to homeland security policy. c. The U.S. Constitution requires the federal government to publicize the impact of homeland security policy on civil liberties. d. None of the above.

The Weather Underground Organization was formed

a. To counteract the violence of left-wing terrorist organizations. b. When members of the Weatherman group went "underground" to engage in revolutionary violence. (Answer) c. As an umbrella political party for the radical left. d. None of the above.

FEMA published five National Planning Frameworks and dedicated them

a. To the American people. b. To promoting efficient preparedness within the context of five mission areas. (Answer) c. To promoting efficient preparedness within the context of tiered responses. d. All of the above.

"Superstorm" Sandy is an example of a(n):

a. Tornado. b. Hurricane. (Answer) c. FlooD. d. Earthquakes

Which of the following best describes the top two priorities of the domestic security community after the domestic attacks of September 11, 2001?

a. Transformation of the intelligence community. b. Creation of a new homeland security institutional culture. c. Both "a" and "b". (Answer) d. Neither "a" nor "b".

The "Old Terrorism" is characterized by which of the following?

a. Use of conventional weapons. b. Use of ideological or nationalist justifications for revolutionary violence. c. Relatively "surgical" selection of targets. d. All of the above. (Answer)

Prior to the domestic attacks of September 11, 2001, federal agencies with law enforcement authority investigated security threats

a. Using covert operations. b. In collaboration with the military and intelligence agencies. c. Efficiently and aggressively. d. In the same manner as they investigated crimes, by working cases and making arrests. (Answer)

Which of the following statements is most accurate regarding the clash of civilizations?

a. Vestiges of the East-West ideological competition have given way to patterns of seemingly interminable communal conflicts and religious extremism. b. It is a debatable scenario, and has been since it was first theorizeD. c. It is a myth and is unlikely to occur. d. Both "a" and "b". (Answer)

Which of the following statements most accurately describes international law:

a. Violations of international law will subject violators to the full authority of established laws. b. Nations must comply with international law or they will be subject to strict sanctions. c. There is no international enforcement mechanism similar to domestic courts and law enforcement agencies. (Answer) d. All of the above.

Which of the following principles frames the ideology of al-Qaeda?

a. Violence in a defensive war on behalf of Islam is the only course of action. b. The struggle is a clash of civilizations. c. Holy war is a religious duty and necessary for the salvation of one's soul. d. All of the above. (Answer)

Border security is important, because plausible threat scenarios suggest

a. Violent extremists could take advantage of illicit networks to gain entry into the country. (Answer) b. Undocumented individuals are, fundamentally, always a threat to national security. c. Invasions could come from unsecured borders. d. Both "a" and "c".

Carnivore:

a. Was a covert military operation against suspected domestic extremists. b. Was a code-name for Edward Snowden. c. Was used by the Central Intelligence Agency to track suspected American extremists when they traveled abroad. d. Was one of the first successfully tested Internet surveillance technologies. (Answer)

Edward Snowden:

a. Was a former contractor for the National Security Agency who leaked details of covert surveillance operations to the media. (Answer) b. Was responsible for countering the first Red Scare. c. Wrote about significant weaknesses in the "war on terrorism" for the Washington Post. d. Was arrested for leaking classified information.

Prior to the end of the Cold War, left-wing terrorism

a. Was rare and random. b. Occurred frequently in Western democracies. (Answer) c. Occurred frequently in the Soviet Union. d. Was primarily religious in nature.

The conflict between Palestinian nationalists and Israel

a. Was resolved with the end of the Cold War. b. Was resolved during several phases of negotiations. c. Has continued since the founding of the state of Israel. (Answer) d. Both "a" and "b".

International conventions have been established to promote counterterrorist cooperation to address which of the following perceived threats:

a. Weak international legal institutions. (Answer) b. Attacks on politicians. c. Domestic terrorist activity. d. The spread of extremist ideologies.

Grid infrastructure malfunctions can be intentionally caused by which of the following:

a. Wildland fires. b. Electromagnetic pulse. (Answer) c. Floods. d. Tornadoes.

The membership of the Weatherman group mostly consisted of

a. Young, African American, educated members from urban areas. b. Seasoned, older former Communists and anarchists. c. Young, white, educated members of the middle class. (Answer) d. Largely uneducated street toughs.

Which of the following statements is most accurate about the National Association of Counties?

b. It creates national policy at the county level. c. There is no such organization. d. It represents county governments to promote extensive services and county government interests. (Answer)


Set pelajaran terkait

Commercial and Investment Properties Exam Prep

View Set

Developmental Concepts - OB Module 1

View Set

مراجعة جدول الضرب

View Set

Gross I - Thoracic Region - Joints and Ligaments

View Set