Ch.10 Porous Nodes Specific Vulnerabilities Test Bank Docx - Homeland Security 3e Complete Test Bank by Gus Martin. DOCX document preview.

Ch.10 Porous Nodes Specific Vulnerabilities Test Bank Docx

Chapter 10: Porous Nodes: Specific Vulnerabilities

Test Bank

Multiple Choice

1. ______ are centers of specific homeland security vulnerability.

A. Epicenters

B. Nodes

C. Homebases

D. Axles

Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.

Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

2. Critical infrastructure consists of which of the following?

A. military hardware

B. law enforcement policies and programs

C. tools used for counterterrorist operations

D. aviation security

Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.

Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

3. In addition to bombs and plastic explosives, what other types of weapons pose the most significant threat to aircraft, airline terminals, and other aviation targets?

A. RPGs and PGMs

B. boxcutters and knives

C. rifles and handguns

D. poisons and dangerous liquids

Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.

Cognitive Domain: Comprehension

Answer Location: Symbolic Value: Airline Attacks and Maximum Propaganda Effect

Difficulty Level: Hard

4. Which terrorist group engaged in a series of hijackings that is seen as the start of modern aviation terrorism?

A. Hamas

B. ISIL

C. Irish Republican Army

D. Popular Front for the Liberation of Palestine

Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.

Cognitive Domain: Knowledge

Answer Location: Case in Point: The PFLP and the Dawn of Modern Aviation Terrorism

Difficulty Level: Easy

5. Which of the following is a challenge to improving aviation security?

A. resistance of passengers to take part in security checks

B. lack of flight attendants on planes

C. limited capabilities of and space for detection equipment

D. lack of media coverage when security breaches occur

Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.

Cognitive Domain: Comprehension

Answer Location: Lessons From the New Terrorism Environment

Difficulty Level: Medium

6. The Aviation and Transportation Security Act of 2001 created the TSA, replaced contractors with professional TSA screeners, and required ______.

A. screening of all bags through an explosive detection system

B. a ban on flying for anyone who was not born in the United States

C. cavity searches on anyone over the age of 18

D. passengers to remove their shoes before screening

Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.

Cognitive Domain: Comprehension

Answer Location: Implementing Aviation Security Priorities

Difficulty Level: Medium

7. What is the name for the thwarted attempt by Islamists to detonate liquid explosives aboard transatlantic flights in late 2006?

A. Operation ISIS

B. the Chemical Plot

C. Black September

D. the Hezbollah Plan

Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.

Cognitive Domain: Knowledge

Answer Location: Case in Point: The Chemical Plot

Difficulty Level: Easy

8. What agencies are tasked with securing our border, other than the TSA, Coast Guard, and Border Protection?

A. Immigration and Customs Enforcement

B. Department of the Interior

C. Federal Bureau of Investigation

D. Central Intelligence Agency

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain:

Answer Location: Border Security

Difficulty Level: Medium

9. How does research suggest that bona fide terrorists have entered the United States in the past?

A. with the assistance of transnational organized criminals

B. through human smuggling networks

C. using legal documents, such as temporary student and visitor visas, and violating the terms of their entry documents

D. through covert crossings of the Southern U.S. border

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Comprehension

Answer Location: Unauthorized Immigration and Homeland Security

Difficulty Level: Medium

10. Why does the Tri-Border Area present a threat to the United States?

A. Thousands of extremists live there and can pose as travelers from nearby countries friendly with the United States.

B. It consists of Brazil, Paraguay, and Argentina, countries that are considered enemies of the United States.

C. It consists of Iraq, Iran, and Saudi Arabia, countries that have a history of terrorism.

D. Surveillance shows that there is a nuclear arsenal hidden in this area.

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Application

Answer Location: Case in Point: The Tri-Border Area of South America

Difficulty Level: Medium

11. What is the biggest threat that Mexican Drug cartels present to homeland security?

A. Too many Americans spend money on illegal drugs like cocaine.

B. Gang activity may spill over into southern states in the United States.

C. Traffickers could transport drugs into the United States.

D. The well-funded drug trade has been linked to ideologically motivated extremists.

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Comprehension

Answer Location: Case in Point: The Mexican Drug War

Difficulty Level: Medium

12. What agency absorbed the duties of INS and Border Patrol in 2003?

A. Department of the Interior

B. Department of Homeland Security

C. Department of Defense

D. Justice Department

Learning Objective: 10.3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Comprehension

Answer Location: Historical Context: The Evolution of the U.S. Border Patrol

Difficulty Level: Medium

13. What three DHS agencies are responsible for securing our borders?

A. USCIS, ICE, CBP

B. FBI, CIA, FEMA

C. DOD, DOT, HHS

D. FDA, EPA, IRS

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Knowledge

Answer Location: Hardening the Border: Three Agencies

Difficulty Level: Easy

14. Which agency would approve or deny an immigrant’s request for citizenship?

A. ICE

B. CBP

C. USCIS

D. FBI

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Knowledge

Answer Location: Citizenship and Immigration Services

Difficulty Level: Medium

15. Immigration and Customs Enforcement has two main duties: investigating immigration crime and ______.

A. identifying and apprehending removable aliens

B. processing visas

C. examining cargo

D. inspecting agriculture

Learning Objective: 10-4: Discuss policy options for border control.

Cognitive Domain: Comprehension

Answer Location: Immigration and Customs Enforcement

Difficulty Level: Medium

16. What is considered the largest U.S. law enforcement agency, tasked with securing our nation’s borders?

A. Central Intelligence Agency

B. Customs and Border Protection

C. Federal Bureau of Investigation

D. United States Coast Guard

Learning Objective: 10-4: Discuss policy options for border control.

Cognitive Domain: Knowledge

Answer Location: Customs and Border Protection (CBP)

Difficulty Level: Easy

17. The ______ works with DHS agencies to secure the nation’s ports.

A. Department of Transportation

B. Transportation Security Administration

C. Department of the Interior

D. Federal Protective Service

Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.

Cognitive Domain: Knowledge

Answer Location: Port Security

Difficulty Level: Medium

18. What is the most obvious scenario for terrorism involving maritime infrastructure?

A. the planting of explosives on a cruise ship filled with passengers

B. the incorporation of liquid explosives into the fuel of ships

C. the conversion of cargo containers into weapons of mass destruction

D. the destruction of multiple commercial ships to reduce U.S. profitability

Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.

Cognitive Domain: Application

Answer Location: Understanding the Terrorist Threat to Ports and Maritime Targets

Difficulty Level: Medium

19. Of the 200 million cargo containers that travel internationally each year, approximately how many are inspected to verify the contents?

A. fewer than 2%

B. 10%

C. 50%

D. 75%

Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.

Cognitive Domain: Knowledge

Answer Location: Case in Point: Maritime Cargo Containers

Difficulty Level: Medium

20. What is the name of the program intended to help increase security for maritime containerized cargo shipped to the United States from around the world?

A. Cargo Analysis Program

B. Container Security Initiative

C. Computerized Cargo Venture

D. Shipping Security Directive

Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.

Cognitive Domain: Knowledge

Answer Location: Port Security Initiatives and Priorities

Difficulty Level: Easy

True/False

1. Terrorist attacks against aviation targets do not get significant media attention.

Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.

Cognitive Domain: Knowledge

Answer Location: Symbolic Value: Airline Attacks and Maximum Propaganda Effect

Difficulty Level: Easy

2. After 9/11, non-travelers in U.S. airport terminals were restricted unless they had special authorization.

Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.

Cognitive Domain: Knowledge

Answer Location: Implementing Aviation Security Priorities
Difficulty Level: Easy

3. Border security is a responsibility that primarily rests on individual state governments.

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Comprehension

Answer Location: Border Security

Difficulty Level: Medium

4. Mexican criminal enterprises tend to cooperate with each other.

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Knowledge

Answer Location: Case in Point: The Mexican Drug War
Difficulty Level: Easy

5. The continental border of the United States extends almost 2,000 miles with Mexico and over 5,000 miles with Canada.

Learning Objective: 10-4: Discuss policy options for border control.

Cognitive Domain: Knowledge

Answer Location: Border Control: Securing National Entry Points

Difficulty Level: Easy

6. Traditionally, terrorists have targeted ships and cargo much more frequently than airplanes and airports.

Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.

Cognitive Domain: Comprehension

Answer Location: Understanding the Terrorist Threat to Ports and Maritime Targets

Difficulty Level: Medium

7. The Department of Transportation currently has no responsibility for maritime security.

Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.

Cognitive Domain: Comprehension

Answer Location: Port Security Initiatives and Priorities
Difficulty Level: Medium

8. The DHS and DoT are currently working on fulfilling five different initiatives to improve security at U.S. ports.

Learning Objective: 10-4: Discuss policy options for border control.

Cognitive Domain: Knowledge

Answer Location: Port Security Initiatives and Priorities
Difficulty Level: Easy

9. Most experts agree that inspection of every shipment entering the maritime jurisdiction of the United States is possible if the correct technology is implemented.

Learning Objective: 10-4: Discuss policy options for border control.

Cognitive Domain: Knowledge

Answer Location: Port Security Initiatives and Priorities
Difficulty Level: Easy

10. The 3-1-1 rule states that no more than three ounces of liquid placed in one clear quart-sized plastic bag is allowed per one carry-on bag.

Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.

Cognitive Domain: Comprehension

Answer Location: Case in Point: The Chemical Plot
Difficulty Level: Medium

Essay

1. In what ways is Latin America’s Tri-Border region a nexus for terrorism and criminal activity?

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders..

Cognitive Domain: Comprehension

Answer Location: Case in Point: The Tri-Border Area of South America
Difficulty Level: Medium

2. Discuss reasons for why violent extremists in the modern era have specifically selected airline targets for terrorist attacks.

Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges..

Cognitive Domain: Comprehension

Answer Location: Symbolic Value: Airline Attacks and Maximum Propaganda Effect
Difficulty Level: Medium

3. Critically assess the threat posed by crime and insecurity on the southern border of the United States.

Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.

Cognitive Domain: Analysis

Answer Location: Plausible Scenarios: Crime and Insecurity on the Southern Border

Difficulty Level: Hard

4. What options exist for securing U.S. borders? Discuss which option or options you think are most effective.

Learning Objective: 10-4: Discuss policy options for border control.

Cognitive Domain: Application

Answer Location: Border Control: Securing National Entry Points

Difficulty Level: Hard

5. Critically discuss plausible threats to port security. Why have terrorists tended to not attack ports?

Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.

Cognitive Domain: Comprehension

Answer Location: Terrorist Strategic Priorities and Maritime Targeting

Difficulty Level: Medium

Document Information

Document Type:
DOCX
Chapter Number:
10
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 10 Porous Nodes Specific Vulnerabilities
Author:
Gus Martin

Connected Book

Homeland Security 3e Complete Test Bank

By Gus Martin

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party