Ch.10 Porous Nodes Specific Vulnerabilities Test Bank Docx - Homeland Security 3e Complete Test Bank by Gus Martin. DOCX document preview.
Chapter 10: Porous Nodes: Specific Vulnerabilities
Test Bank
Multiple Choice
1. ______ are centers of specific homeland security vulnerability.
A. Epicenters
B. Nodes
C. Homebases
D. Axles
Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.
Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
2. Critical infrastructure consists of which of the following?
A. military hardware
B. law enforcement policies and programs
C. tools used for counterterrorist operations
D. aviation security
Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.
Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
3. In addition to bombs and plastic explosives, what other types of weapons pose the most significant threat to aircraft, airline terminals, and other aviation targets?
A. RPGs and PGMs
B. boxcutters and knives
C. rifles and handguns
D. poisons and dangerous liquids
Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.
Cognitive Domain: Comprehension
Answer Location: Symbolic Value: Airline Attacks and Maximum Propaganda Effect
Difficulty Level: Hard
4. Which terrorist group engaged in a series of hijackings that is seen as the start of modern aviation terrorism?
A. Hamas
B. ISIL
C. Irish Republican Army
D. Popular Front for the Liberation of Palestine
Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.
Cognitive Domain: Knowledge
Answer Location: Case in Point: The PFLP and the Dawn of Modern Aviation Terrorism
Difficulty Level: Easy
5. Which of the following is a challenge to improving aviation security?
A. resistance of passengers to take part in security checks
B. lack of flight attendants on planes
C. limited capabilities of and space for detection equipment
D. lack of media coverage when security breaches occur
Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.
Cognitive Domain: Comprehension
Answer Location: Lessons From the New Terrorism Environment
Difficulty Level: Medium
6. The Aviation and Transportation Security Act of 2001 created the TSA, replaced contractors with professional TSA screeners, and required ______.
A. screening of all bags through an explosive detection system
B. a ban on flying for anyone who was not born in the United States
C. cavity searches on anyone over the age of 18
D. passengers to remove their shoes before screening
Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.
Cognitive Domain: Comprehension
Answer Location: Implementing Aviation Security Priorities
Difficulty Level: Medium
7. What is the name for the thwarted attempt by Islamists to detonate liquid explosives aboard transatlantic flights in late 2006?
A. Operation ISIS
B. the Chemical Plot
C. Black September
D. the Hezbollah Plan
Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.
Cognitive Domain: Knowledge
Answer Location: Case in Point: The Chemical Plot
Difficulty Level: Easy
8. What agencies are tasked with securing our border, other than the TSA, Coast Guard, and Border Protection?
A. Immigration and Customs Enforcement
B. Department of the Interior
C. Federal Bureau of Investigation
D. Central Intelligence Agency
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain:
Answer Location: Border Security
Difficulty Level: Medium
9. How does research suggest that bona fide terrorists have entered the United States in the past?
A. with the assistance of transnational organized criminals
B. through human smuggling networks
C. using legal documents, such as temporary student and visitor visas, and violating the terms of their entry documents
D. through covert crossings of the Southern U.S. border
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Comprehension
Answer Location: Unauthorized Immigration and Homeland Security
Difficulty Level: Medium
10. Why does the Tri-Border Area present a threat to the United States?
A. Thousands of extremists live there and can pose as travelers from nearby countries friendly with the United States.
B. It consists of Brazil, Paraguay, and Argentina, countries that are considered enemies of the United States.
C. It consists of Iraq, Iran, and Saudi Arabia, countries that have a history of terrorism.
D. Surveillance shows that there is a nuclear arsenal hidden in this area.
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Application
Answer Location: Case in Point: The Tri-Border Area of South America
Difficulty Level: Medium
11. What is the biggest threat that Mexican Drug cartels present to homeland security?
A. Too many Americans spend money on illegal drugs like cocaine.
B. Gang activity may spill over into southern states in the United States.
C. Traffickers could transport drugs into the United States.
D. The well-funded drug trade has been linked to ideologically motivated extremists.
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Comprehension
Answer Location: Case in Point: The Mexican Drug War
Difficulty Level: Medium
12. What agency absorbed the duties of INS and Border Patrol in 2003?
A. Department of the Interior
B. Department of Homeland Security
C. Department of Defense
D. Justice Department
Learning Objective: 10.3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Comprehension
Answer Location: Historical Context: The Evolution of the U.S. Border Patrol
Difficulty Level: Medium
13. What three DHS agencies are responsible for securing our borders?
A. USCIS, ICE, CBP
B. FBI, CIA, FEMA
C. DOD, DOT, HHS
D. FDA, EPA, IRS
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Knowledge
Answer Location: Hardening the Border: Three Agencies
Difficulty Level: Easy
14. Which agency would approve or deny an immigrant’s request for citizenship?
A. ICE
B. CBP
C. USCIS
D. FBI
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Knowledge
Answer Location: Citizenship and Immigration Services
Difficulty Level: Medium
15. Immigration and Customs Enforcement has two main duties: investigating immigration crime and ______.
A. identifying and apprehending removable aliens
B. processing visas
C. examining cargo
D. inspecting agriculture
Learning Objective: 10-4: Discuss policy options for border control.
Cognitive Domain: Comprehension
Answer Location: Immigration and Customs Enforcement
Difficulty Level: Medium
16. What is considered the largest U.S. law enforcement agency, tasked with securing our nation’s borders?
A. Central Intelligence Agency
B. Customs and Border Protection
C. Federal Bureau of Investigation
D. United States Coast Guard
Learning Objective: 10-4: Discuss policy options for border control.
Cognitive Domain: Knowledge
Answer Location: Customs and Border Protection (CBP)
Difficulty Level: Easy
17. The ______ works with DHS agencies to secure the nation’s ports.
A. Department of Transportation
B. Transportation Security Administration
C. Department of the Interior
D. Federal Protective Service
Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.
Cognitive Domain: Knowledge
Answer Location: Port Security
Difficulty Level: Medium
18. What is the most obvious scenario for terrorism involving maritime infrastructure?
A. the planting of explosives on a cruise ship filled with passengers
B. the incorporation of liquid explosives into the fuel of ships
C. the conversion of cargo containers into weapons of mass destruction
D. the destruction of multiple commercial ships to reduce U.S. profitability
Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.
Cognitive Domain: Application
Answer Location: Understanding the Terrorist Threat to Ports and Maritime Targets
Difficulty Level: Medium
19. Of the 200 million cargo containers that travel internationally each year, approximately how many are inspected to verify the contents?
A. fewer than 2%
B. 10%
C. 50%
D. 75%
Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.
Cognitive Domain: Knowledge
Answer Location: Case in Point: Maritime Cargo Containers
Difficulty Level: Medium
20. What is the name of the program intended to help increase security for maritime containerized cargo shipped to the United States from around the world?
A. Cargo Analysis Program
B. Container Security Initiative
C. Computerized Cargo Venture
D. Shipping Security Directive
Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.
Cognitive Domain: Knowledge
Answer Location: Port Security Initiatives and Priorities
Difficulty Level: Easy
True/False
1. Terrorist attacks against aviation targets do not get significant media attention.
Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.
Cognitive Domain: Knowledge
Answer Location: Symbolic Value: Airline Attacks and Maximum Propaganda Effect
Difficulty Level: Easy
2. After 9/11, non-travelers in U.S. airport terminals were restricted unless they had special authorization.
Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges.
Cognitive Domain: Knowledge
Answer Location: Implementing Aviation Security Priorities
Difficulty Level: Easy
3. Border security is a responsibility that primarily rests on individual state governments.
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Comprehension
Answer Location: Border Security
Difficulty Level: Medium
4. Mexican criminal enterprises tend to cooperate with each other.
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Knowledge
Answer Location: Case in Point: The Mexican Drug War
Difficulty Level: Easy
5. The continental border of the United States extends almost 2,000 miles with Mexico and over 5,000 miles with Canada.
Learning Objective: 10-4: Discuss policy options for border control.
Cognitive Domain: Knowledge
Answer Location: Border Control: Securing National Entry Points
Difficulty Level: Easy
6. Traditionally, terrorists have targeted ships and cargo much more frequently than airplanes and airports.
Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.
Cognitive Domain: Comprehension
Answer Location: Understanding the Terrorist Threat to Ports and Maritime Targets
Difficulty Level: Medium
7. The Department of Transportation currently has no responsibility for maritime security.
Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.
Cognitive Domain: Comprehension
Answer Location: Port Security Initiatives and Priorities
Difficulty Level: Medium
8. The DHS and DoT are currently working on fulfilling five different initiatives to improve security at U.S. ports.
Learning Objective: 10-4: Discuss policy options for border control.
Cognitive Domain: Knowledge
Answer Location: Port Security Initiatives and Priorities
Difficulty Level: Easy
9. Most experts agree that inspection of every shipment entering the maritime jurisdiction of the United States is possible if the correct technology is implemented.
Learning Objective: 10-4: Discuss policy options for border control.
Cognitive Domain: Knowledge
Answer Location: Port Security Initiatives and Priorities
Difficulty Level: Easy
10. The 3-1-1 rule states that no more than three ounces of liquid placed in one clear quart-sized plastic bag is allowed per one carry-on bag.
Learning Objective: 10-1: Evaluate policy challenges inherent in border protection, aviation security, and port security.
Cognitive Domain: Comprehension
Answer Location: Case in Point: The Chemical Plot
Difficulty Level: Medium
Essay
1. In what ways is Latin America’s Tri-Border region a nexus for terrorism and criminal activity?
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders..
Cognitive Domain: Comprehension
Answer Location: Case in Point: The Tri-Border Area of South America
Difficulty Level: Medium
2. Discuss reasons for why violent extremists in the modern era have specifically selected airline targets for terrorist attacks.
Learning Objective: 10-2: Analyze aviation security policies, procedures, and challenges..
Cognitive Domain: Comprehension
Answer Location: Symbolic Value: Airline Attacks and Maximum Propaganda Effect
Difficulty Level: Medium
3. Critically assess the threat posed by crime and insecurity on the southern border of the United States.
Learning Objective: 10-3: Explain the complexities of securing the nation’s borders.
Cognitive Domain: Analysis
Answer Location: Plausible Scenarios: Crime and Insecurity on the Southern Border
Difficulty Level: Hard
4. What options exist for securing U.S. borders? Discuss which option or options you think are most effective.
Learning Objective: 10-4: Discuss policy options for border control.
Cognitive Domain: Application
Answer Location: Border Control: Securing National Entry Points
Difficulty Level: Hard
5. Critically discuss plausible threats to port security. Why have terrorists tended to not attack ports?
Learning Objective: 10-5: Analyze the unique characteristics of port and maritime infrastructure.
Cognitive Domain: Comprehension
Answer Location: Terrorist Strategic Priorities and Maritime Targeting
Difficulty Level: Medium
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Chapter 8 Sea Change The New Terrorism and Homeland Security
DOCX Ch. 8
Chapter 9 The Threat at Home Terrorism in the United States
DOCX Ch. 9
Chapter 10 Porous Nodes Specific Vulnerabilities
DOCX Ch. 10 Current
Chapter 11 Always Vigilant Hardening the Target
DOCX Ch. 11
Chapter 12 Critical Resources Resilience and Planning
DOCX Ch. 12