Ch11 Always Vigilant Hardening the Target Complete Test Bank - Homeland Security 3e Complete Test Bank by Gus Martin. DOCX document preview.

Ch11 Always Vigilant Hardening the Target Complete Test Bank

Chapter 11: Always Vigilant: Hardening the Target

Test Bank

Multiple Choice

1. The term target ______ describes efforts by the government to make potential terrorist targets more difficult to attack.

A. narrowing

B. hardening

C. honing

D. analyzing

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

2. What is the difference between cyberwar and hacktivism?

A. Hacktivism is only aimed at private entities, while cyberwars are aimed and public and private entities.

B. Cyberwars are usually carried out by non-state actors, while cyberwars are carried out by state actors.

C. Hacktivism is usually carried out by non-state actors, while cyberwars are carried out by state actors.

D. Hacktivism doesn’t require a computer network, while a cyberwar does require a network.

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Analysis

Answer Location: Understanding Threats to Cybersecurity

Difficulty Level: Hard

3. What types of systems did Russian hackers target in 2016?

A. national and local elections

B. large banking institutions

C. major credit card companies

D. colleges and universities

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Knowledge

Answer Location: Malicious Use of Cyber Technology: Examples

Difficulty Level: Easy

4. What was the Joint Task Force–Global Network Operations established to protect?

A. all U.S. naval bases

B. private computer networks

C. banking software

D. the military’s Global Information Grid

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Comprehension

Answer Location: Hardening Cyberspace: Cyberwar and Information Security

Difficulty Level: Medium

5. In June 2011, President Barack Obama signed executive orders approving guidelines that ______.

A. banned developing computer-assisted actions against adversaries

B. approved developing computer-assisted actions against adversaries

C. converted the storage of all government data back to hard copies

D. Dismantled the joint task force dedicated to cybersecurity

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Comprehension

Answer Location: Cyberwar as an Antiterrorist Option

Difficulty Level: Medium

6. How is biometric technology used when conducting surveillance and security?

A. It uses body measurements and characteristics to identify subjects.

B. It uses bodily fluids to see if there is a match in the CODIS database.

C. It scans credit card information to see if there is a match on terrorist watchlists.

D. It runs a background check on passports to see if there is a match on terrorist watchlists.

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Comprehension

Answer Location: Modern Surveillance Technologies

Difficulty Level: Medium

7. What is the name of the satellite surveillance network managed by the National Security Agency?

A. Acoustic Kitty

B. Echelon

C. Mongoose

D. Chaos

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Knowledge

Answer Location: Case in Point: The Echelon Satellite Surveillance Network

Difficulty Level: Easy

8. The term ______ describes assets, systems, and networks that are so vital to the United States that their destruction would have a debilitating effect on national security, health, and safety.

A. national bandwidth

B. united security structures

C. critical infrastructure

D. vital securities

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Knowledge

Answer Location: Defining Critical Infrastructure

Difficulty Level: Easy

9. The addition of crash barriers at entrances to parking garages beneath important buildings is an example of ______.

A. surveillance reduction

B. target hardening

C. network security

D. central portals

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Knowledge

Answer Location: Target Hardening: The Concept

Difficulty Level: Easy

10. Why was the National Infrastructure Protection Plan enacted?

A. to officially exclude the private sector from any and all government responsibility

B. to shift governmental focus away from target hardening to offensive tactics

C. to create a software program to monitor terrorist “chatter”

D. to outline the public–private relationship between the government and the private sector

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Comprehension

Answer Location: Target Hardening: The Public–Private Context

Difficulty Level: Medium

11. To whom does the BIPS provide information?

A. architects and building owners about how to keep buildings safe after a disaster

B. cybercrime experts about how to combat viruses that attack national security targets

C. the FDA about how to keep our food and drugs safe during high alerts

D. the airports about how to monitor flights and prevent extremists from boarding

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Comprehension

Answer Location: Federal Guidance: The DHS Building and Infrastructure Protection Series

Difficulty Level: Medium

12. Perimeter controls, architectural barriers, and electronic access controls are all examples of______

A. innovations of securing critical infrastructure

B. cybercrime and computer hacking

C. attempts to facilitate information sharing

D. ineffective surveillance methods

Learning Objective: 11-3: Evaluate options for target hardening.

Cognitive Domain: Knowledge

Answer Location: Options for Critical Infrastructure Security and Target Hardening

Difficulty Level: Easy

13. Which division of the DHS provides leadership in securing transportation along with the Department of Transportation and the Coast Guard?

A. U.S. Customs and Border Protection

B. Federal Emergency Management Agency

C. Transportation Security Administration

D. U.S. Secret Service

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Knowledge

Answer Location: Transportation Security

Difficulty Level: Easy

14. Which government agency administers civil aviation and issues regulations to control air traffic and promote safety?

A. U.S. Air Force

B. NASA

C. Department of Transportation

D. U.S. Federal Aviation Administration

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Comprehension

Answer Location: Aviation

Difficulty Level: Medium

15. What did National Security Presidential Directive-47/Homeland Security Presidential Directive-16 do?

A. eliminated the Department of Homeland Security

B. promoted safety regulation on railroads

C. established safety measures at U.S. ports and waterways

D. produced a strategic plan for aviation safety

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Comprehension

Answer Location: Aviation

Difficulty Level: Hard

16. What is a significant security consideration for motor vehicles traveling on public roadways?

A. transportation choke points

B. unregistered vehicles

C. unlicensed drivers

D. high speed lanes

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Comprehension

Answer Location: Motor Transportation Networks

Difficulty Level: Medium

17. Why is security for the railroad system a complex consideration?

A. There are relatively few railway owners, and they are hesitant to communicate with each other.

B. There are hundreds of railway owners, and collaboration among them is difficult.

C. The majority of transportation involves people who must be searched.

D. Most of the raw materials transported along the railways are flammable.

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Comprehension

Answer Location: Railways

Difficulty Level: Medium

18. FEMA’s Building Science Branch offers expert guidance on ______.

A. the construction of buildings

B. surveillance methods

C. access control

D. terrorist detection

Learning Objective: 11-4: Analyze options for infrastructure security.

Cognitive Domain: Knowledge

Answer Location: The Transportation Security Administration

Difficulty Level: Easy

19. Which clandestine law enforcement agency was reassigned to TSA from Immigration and Customs Enforcement?

A. United States Coast Guard

B. Immigration and Naturalization Service

C. Federal Air Marshal Service

D. U.S. Navy

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Knowledge

Answer Location: The Transportation Security Administration

Difficulty Level: Easy

20. What other duties does the TSA perform, other than screening passengers?

A. air traffic control and safety checks for planes

B. detecting explosives and screening luggage

C. granting and denying passports

D. creating and updating the “Do Not Fly” list

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Knowledge

Answer Location: The Transportation Security Administration

Difficulty Level: Easy

True/False

1. Government and industry assign fundamental responsibilities to computer systems and networks.

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Knowledge

Answer Location: Cybersecurity

Difficulty Level: Easy

2. The private defense industry and the Department of Defense are not potential targets for cyberattacks.

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Knowledge

Answer Location: Cyberattacks: Potential Targets

Difficulty Level: Easy

3. Instructions on bomb assembly, poisoning, weapons construction, and mixing lethal chemicals are all available on the Internet.

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Knowledge

Answer Location: Cyberterror: Feasibility and Likelihood

Difficulty Level: Easy

4. Between 1998 and 2013, there have been three different presidential directives aimed at strengthening our critical infrastructure.

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Comprehension

Answer Location: Defining Critical Infrastructure

Difficulty Level: Medium

5. The DHS is primarily focused on public infrastructure and takes no action to protect private infrastructure.

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Comprehension

Answer Location: Target Hardening: The Public-Private Context

Difficulty Level: Medium

6. The United States collaborates with international law enforcement consortia that are designed to share information on transnational investigations and other crime-related inquiries.

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Knowledge

Answer Location: Global Perspective: International Law Enforcement Consortia

Difficulty Level: Easy

7. The vast majority of airport screening and security are in the control of dozens of private contractors.

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Knowledge

Answer Location: The Transportation Security Administration

Difficulty Level: Easy

8. Each year approximately 45 million commuters ride subways and trains managed by urban transit agencies.

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Knowledge

Answer Location: Railways

Difficulty Level: Easy

9. The BIPS 06/FEMA report recommends dispersing buildings, instead of building all in one cluster, to reduce the effects of explosions.

Learning Objective: 11-4: Analyze options for infrastructure security.

Cognitive Domain: Comprehension

Answer Location: Case in Point: BIPS 06/FEMA 426

Difficulty Level: Medium

10. NSA doesn’t cooperate with its counterparts in other nations.

Learning Objective: 11-3: Evaluate options for target hardening.

Cognitive Domain: Comprehension

Answer Location: Case in Point: The Echelon Satellite Surveillance Network

Difficulty Level: Medium

Essay

1. Describe the threat from cyberterrorism. How can nations defend themselves?

Learning Objective: 11-1: Explain the concept of cybersecurity and the vulnerabilities of the information system.

Cognitive Domain: Application

Answer Location: Understanding Threats to Cybersecurity

Difficulty Level: Hard

2. Describe biometric technology and explain how intelligence and law enforcement agencies use this information.

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Comprehension

Answer Location: Modern Surveillance Technologies

Difficulty Level: Medium

3. Explain how advances in digital information technology, like storing personal information in databases instead of on paper, increase vulnerability to terrorism. What counterterrorist methods can address this?

Learning Objective: 11-2: Describe the importance of securing information infrastructure.

Cognitive Domain: Application

Answer Location: Cyberwar as an Antiterrorist Option

Difficulty Level: Medium

4. Give an example of how engineering and urban design can harden potential critical infrastructure targets.

Learning Objective: 11-4: Analyze options for infrastructure security.

Cognitive Domain: Comprehension

Answer Location: Options for Critical Infrastructure Security and Target Hardening

Difficulty Level: Medium

5. What are transportation choke points, and what risks they pose to exposing passengers to attack?

Learning Objective: 11-5: Apply target-hardening concepts to the elements of transportation security.

Cognitive Domain: Comprehension

Answer Location: Motor Transportation Networks

Difficulty Level: Medium

Document Information

Document Type:
DOCX
Chapter Number:
11
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 11 Always Vigilant Hardening the Target
Author:
Gus Martin

Connected Book

Homeland Security 3e Complete Test Bank

By Gus Martin

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party