Ch11 Always Vigilant Hardening the Target Complete Test Bank - Homeland Security 3e Complete Test Bank by Gus Martin. DOCX document preview.
Chapter 11: Always Vigilant: Hardening the Target
Multiple Choice
1. The term target ______ describes efforts by the government to make potential terrorist targets more difficult to attack.
A. narrowing
B. hardening
C. honing
D. analyzing
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
2. What is the difference between cyberwar and hacktivism?
A. Hacktivism is only aimed at private entities, while cyberwars are aimed and public and private entities.
B. Cyberwars are usually carried out by non-state actors, while cyberwars are carried out by state actors.
C. Hacktivism is usually carried out by non-state actors, while cyberwars are carried out by state actors.
D. Hacktivism doesn’t require a computer network, while a cyberwar does require a network.
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Analysis
Answer Location: Understanding Threats to Cybersecurity
Difficulty Level: Hard
3. What types of systems did Russian hackers target in 2016?
A. national and local elections
B. large banking institutions
C. major credit card companies
D. colleges and universities
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Knowledge
Answer Location: Malicious Use of Cyber Technology: Examples
Difficulty Level: Easy
4. What was the Joint Task Force–Global Network Operations established to protect?
A. all U.S. naval bases
B. private computer networks
C. banking software
D. the military’s Global Information Grid
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Comprehension
Answer Location: Hardening Cyberspace: Cyberwar and Information Security
Difficulty Level: Medium
5. In June 2011, President Barack Obama signed executive orders approving guidelines that ______.
A. banned developing computer-assisted actions against adversaries
B. approved developing computer-assisted actions against adversaries
C. converted the storage of all government data back to hard copies
D. Dismantled the joint task force dedicated to cybersecurity
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Comprehension
Answer Location: Cyberwar as an Antiterrorist Option
Difficulty Level: Medium
6. How is biometric technology used when conducting surveillance and security?
A. It uses body measurements and characteristics to identify subjects.
B. It uses bodily fluids to see if there is a match in the CODIS database.
C. It scans credit card information to see if there is a match on terrorist watchlists.
D. It runs a background check on passports to see if there is a match on terrorist watchlists.
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Comprehension
Answer Location: Modern Surveillance Technologies
Difficulty Level: Medium
7. What is the name of the satellite surveillance network managed by the National Security Agency?
A. Acoustic Kitty
B. Echelon
C. Mongoose
D. Chaos
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Knowledge
Answer Location: Case in Point: The Echelon Satellite Surveillance Network
Difficulty Level: Easy
8. The term ______ describes assets, systems, and networks that are so vital to the United States that their destruction would have a debilitating effect on national security, health, and safety.
A. national bandwidth
B. united security structures
C. critical infrastructure
D. vital securities
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Knowledge
Answer Location: Defining Critical Infrastructure
Difficulty Level: Easy
9. The addition of crash barriers at entrances to parking garages beneath important buildings is an example of ______.
A. surveillance reduction
B. target hardening
C. network security
D. central portals
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Knowledge
Answer Location: Target Hardening: The Concept
Difficulty Level: Easy
10. Why was the National Infrastructure Protection Plan enacted?
A. to officially exclude the private sector from any and all government responsibility
B. to shift governmental focus away from target hardening to offensive tactics
C. to create a software program to monitor terrorist “chatter”
D. to outline the public–private relationship between the government and the private sector
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Comprehension
Answer Location: Target Hardening: The Public–Private Context
Difficulty Level: Medium
11. To whom does the BIPS provide information?
A. architects and building owners about how to keep buildings safe after a disaster
B. cybercrime experts about how to combat viruses that attack national security targets
C. the FDA about how to keep our food and drugs safe during high alerts
D. the airports about how to monitor flights and prevent extremists from boarding
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Comprehension
Answer Location: Federal Guidance: The DHS Building and Infrastructure Protection Series
Difficulty Level: Medium
12. Perimeter controls, architectural barriers, and electronic access controls are all examples of______
A. innovations of securing critical infrastructure
B. cybercrime and computer hacking
C. attempts to facilitate information sharing
D. ineffective surveillance methods
Learning Objective: 11-3: Evaluate options for target hardening.
Cognitive Domain: Knowledge
Answer Location: Options for Critical Infrastructure Security and Target Hardening
Difficulty Level: Easy
13. Which division of the DHS provides leadership in securing transportation along with the Department of Transportation and the Coast Guard?
A. U.S. Customs and Border Protection
B. Federal Emergency Management Agency
C. Transportation Security Administration
D. U.S. Secret Service
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Knowledge
Answer Location: Transportation Security
Difficulty Level: Easy
14. Which government agency administers civil aviation and issues regulations to control air traffic and promote safety?
A. U.S. Air Force
B. NASA
C. Department of Transportation
D. U.S. Federal Aviation Administration
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Comprehension
Answer Location: Aviation
Difficulty Level: Medium
15. What did National Security Presidential Directive-47/Homeland Security Presidential Directive-16 do?
A. eliminated the Department of Homeland Security
B. promoted safety regulation on railroads
C. established safety measures at U.S. ports and waterways
D. produced a strategic plan for aviation safety
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Comprehension
Answer Location: Aviation
Difficulty Level: Hard
16. What is a significant security consideration for motor vehicles traveling on public roadways?
A. transportation choke points
B. unregistered vehicles
C. unlicensed drivers
D. high speed lanes
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Comprehension
Answer Location: Motor Transportation Networks
Difficulty Level: Medium
17. Why is security for the railroad system a complex consideration?
A. There are relatively few railway owners, and they are hesitant to communicate with each other.
B. There are hundreds of railway owners, and collaboration among them is difficult.
C. The majority of transportation involves people who must be searched.
D. Most of the raw materials transported along the railways are flammable.
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Comprehension
Answer Location: Railways
Difficulty Level: Medium
18. FEMA’s Building Science Branch offers expert guidance on ______.
A. the construction of buildings
B. surveillance methods
C. access control
D. terrorist detection
Learning Objective: 11-4: Analyze options for infrastructure security.
Cognitive Domain: Knowledge
Answer Location: The Transportation Security Administration
Difficulty Level: Easy
19. Which clandestine law enforcement agency was reassigned to TSA from Immigration and Customs Enforcement?
A. United States Coast Guard
B. Immigration and Naturalization Service
C. Federal Air Marshal Service
D. U.S. Navy
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Knowledge
Answer Location: The Transportation Security Administration
Difficulty Level: Easy
20. What other duties does the TSA perform, other than screening passengers?
A. air traffic control and safety checks for planes
B. detecting explosives and screening luggage
C. granting and denying passports
D. creating and updating the “Do Not Fly” list
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Knowledge
Answer Location: The Transportation Security Administration
Difficulty Level: Easy
True/False
1. Government and industry assign fundamental responsibilities to computer systems and networks.
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Knowledge
Answer Location: Cybersecurity
Difficulty Level: Easy
2. The private defense industry and the Department of Defense are not potential targets for cyberattacks.
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Knowledge
Answer Location: Cyberattacks: Potential Targets
Difficulty Level: Easy
3. Instructions on bomb assembly, poisoning, weapons construction, and mixing lethal chemicals are all available on the Internet.
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Knowledge
Answer Location: Cyberterror: Feasibility and Likelihood
Difficulty Level: Easy
4. Between 1998 and 2013, there have been three different presidential directives aimed at strengthening our critical infrastructure.
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Comprehension
Answer Location: Defining Critical Infrastructure
Difficulty Level: Medium
5. The DHS is primarily focused on public infrastructure and takes no action to protect private infrastructure.
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Comprehension
Answer Location: Target Hardening: The Public-Private Context
Difficulty Level: Medium
6. The United States collaborates with international law enforcement consortia that are designed to share information on transnational investigations and other crime-related inquiries.
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Knowledge
Answer Location: Global Perspective: International Law Enforcement Consortia
Difficulty Level: Easy
7. The vast majority of airport screening and security are in the control of dozens of private contractors.
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Knowledge
Answer Location: The Transportation Security Administration
Difficulty Level: Easy
8. Each year approximately 45 million commuters ride subways and trains managed by urban transit agencies.
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Knowledge
Answer Location: Railways
Difficulty Level: Easy
9. The BIPS 06/FEMA report recommends dispersing buildings, instead of building all in one cluster, to reduce the effects of explosions.
Learning Objective: 11-4: Analyze options for infrastructure security.
Cognitive Domain: Comprehension
Answer Location: Case in Point: BIPS 06/FEMA 426
Difficulty Level: Medium
10. NSA doesn’t cooperate with its counterparts in other nations.
Learning Objective: 11-3: Evaluate options for target hardening.
Cognitive Domain: Comprehension
Answer Location: Case in Point: The Echelon Satellite Surveillance Network
Difficulty Level: Medium
Essay
1. Describe the threat from cyberterrorism. How can nations defend themselves?
Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.
Cognitive Domain: Application
Answer Location: Understanding Threats to Cybersecurity
Difficulty Level: Hard
2. Describe biometric technology and explain how intelligence and law enforcement agencies use this information.
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Comprehension
Answer Location: Modern Surveillance Technologies
Difficulty Level: Medium
3. Explain how advances in digital information technology, like storing personal information in databases instead of on paper, increase vulnerability to terrorism. What counterterrorist methods can address this?
Learning Objective: 11-2: Describe the importance of securing information infrastructure.
Cognitive Domain: Application
Answer Location: Cyberwar as an Antiterrorist Option
Difficulty Level: Medium
4. Give an example of how engineering and urban design can harden potential critical infrastructure targets.
Learning Objective: 11-4: Analyze options for infrastructure security.
Cognitive Domain: Comprehension
Answer Location: Options for Critical Infrastructure Security and Target Hardening
Difficulty Level: Medium
5. What are transportation choke points, and what risks they pose to exposing passengers to attack?
Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.
Cognitive Domain: Comprehension
Answer Location: Motor Transportation Networks
Difficulty Level: Medium
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Chapter 9 The Threat at Home Terrorism in the United States
DOCX Ch. 9
Chapter 10 Porous Nodes Specific Vulnerabilities
DOCX Ch. 10
Chapter 11 Always Vigilant Hardening the Target
DOCX Ch. 11 Current
Chapter 12 Critical Resources Resilience and Planning
DOCX Ch. 12
Chapter 13 Critical Outcomes Response and Recovery
DOCX Ch. 13