Complete Test Bank Chapter 13 Homeland Security Challenges - Homeland Security 1e | Test Bank Givens by Austen D. Givens. DOCX document preview.

Complete Test Bank Chapter 13 Homeland Security Challenges

Chapter 1: Test Bank

Multiple Choice

  1. In the nearly twenty years since DHS’s creation, these four major categories of threats that have dominated policy discussions about homeland security:
    1. Terrorism, natural disasters, cybersecurity, and border and migration management
    2. Terrorism, cybersecurity, white collar crime, and legal framework
    3. Natural Disasters, cybersecurity, legal framework, and identify theft
    4. Cybersecurity, human trafficking, pandemics, and natural disasters
  2. What legislation provides civil liability protections to firms that opt to share cybersecurity information with other businesses or government agencies for homeland security purposes?
    1. USA PATRIOT Act of 2001
    2. Homeland Security Act of 2002
    3. Cybersecurity and Information Act of 2015
    4. USA FREEDOM Act of 2015
  3. What system is used by the Department of Defense to evaluate the potential threat posed by individuals with security clearances on an ongoing basis?
    1. Qubits 2.0
    2. Workload Task
    3. DOD Version 3
    4. Trusted Workforce 2.0
  4. This term refers to a phenomenon in which a precipitating event spurs the creation of new security measures or the enhancement of existing security measures.
    1. Security measures
    2. Prevention
    3. Pendulum effect
    4. Common good
  5. The outcome of __________________ means that future presidents may decide to use their legal authorities to slow or stop the flow of people and goods into the United States in the event of real or perceived threats to homeland security.
    1. Nixon v. Fitzgerald
    2. Berg v. Obama
    3. Trump v. Hawaii
    4. Trump v. New York
  6. Which of the following incidents is NOT an example of lone wolf-style terrorism?
    1. 2015 San Bernardino mass shooting
    2. 2016 Pulse nightclub shooting
    3. 2019 El Paso murders
    4. 2019 Naval Air Station Pensacola shooting

True/False

  1. The global flow of people and things also requires that organizations within the homeland security enterprise share information
    1. True
    2. False
  2. Presidents have no discretion in shaping the actions of homeland security stakeholder agencies.
    1. True
    2. False
  3. More than 100 Congressional committees oversee the homeland security enterprise.
    1. True
    2. False
  4. Homeland security budgets provide a window of insight into how elected officials view the current threat landscape and allocate limited resources to address those threats.
    1. True
    2. False
  5. Lone wolf-style terrorists frequently draw inspiration from larger extremist organizations or charismatic leaders.
    1. True
    2. False
  6. The Snowden, Pho, and Hasson cases all point toward the challenges the federal government faces in guarding against insider threats.
    1. True
    2. False
  7. The global movement of people and things only applies to homeland security within the transportation sector.
    1. True
    2. False

Short Answer

  1. Explain Edward Snowden’s rationale for stealing and leaking classified information.
    1. Snowden’s stated justification for leaking these documents was that he was deeply concerned about what he viewed to be a growing surveillance state. Some of the documents that Snowden disclosed indicated that there was significant cooperation between the NSA and Silicon Valley technology firms like Facebook and Google to surveil some Internet users. Other documents that Snowden leaked described a massive information collection scheme whereby the NSA obtained metadata about nearly every phone call made in the United States.
  2. Describe how the Continuous Evaluation program is used.
    1. It is used to identify potential or emerging risks posed by individuals with security clearances. The program sifts through classified and unclassified databases to identify potentially problematic foreign travel, credit score fluctuations, or links to extremist activity that could be indicators of a security risk.
  3. What are some potential issues that may arise with the use of automated analysis?
    1. Student answers may vary slightly – An automated analysis of someone’s utility bills and tax returns may provide enough information to indicate whether that person has a substance abuse problem. Records of frequent foreign travel, combined with computer network activity logs, could lead an intelligence or law enforcement analyst to conclude—incorrectly—that an individual is associating with extremists abroad. A lovestruck 25-year-old, engaged to her Filipina girlfriend, may end up on the wrong end of an algorithm that suggests she is involved in human trafficking, profoundly disrupting her personal and professional life.
  4. Explain what is meant by the term ‘pendulum effect.’
    1. Phenomenon in which a precipitating event, such as a terrorist attack, triggers new or enhanced security measures, which then are relaxed over time as fewer events take place.
  5. List some of the current challenges emerging in the homeland security profession.
    1. These challenges include climate change, pandemics, politics and governance, lone wolf-style terrorism, insider threats, and cybersecurity issues
  6. Explain how a U.S. President can affect the homeland security enterprise.
    1. Presidents have broad discretion to shape the actions of homeland security stakeholder agencies. For example, Presidents nominate cabinet secretaries and their deputies who, subject to Senate confirmation, lead organizations like the Federal Bureau of Investigation, Department of Defense, Central Intelligence Agency, and Department of Homeland Security in carrying out the day-to-day work of homeland security. Presidents are also able to establish policy priorities for homeland security through Executive Orders as well as public proclamations. A Presidential speech about the importance of stopping human trafficking, for instance, and an Executive Order to that same end, can shape the concerns that occupy government leaders’ time, attention, and energy.

Short Essay

  1. Discuss your prediction of the future emerging challenges in the homeland security enterprise.
  2. Describe the type(s) of research needed for a better understanding of homeland security.

Document Information

Document Type:
DOCX
Chapter Number:
13
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 13 Homeland Security Challenges
Author:
Austen D. Givens

Connected Book

Homeland Security 1e | Test Bank Givens

By Austen D. Givens

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party