Complete Test Bank Chapter.4 Big Data Risk Homeland Security - Homeland Security 1e | Test Bank Givens by Austen D. Givens. DOCX document preview.
Chapter 4: Test Bank
Multiple Choice
- The 3 V’s of big data refer to volume, velocity, and ______________.
- vitality
- veracity
- variety
- vacuum
- Approximately, how many air passengers per day does the TSA screen?
- 750,000
- 1,000,000
- 2,000,000
- 2,700,000
- _________ assessment is a process to identify potential threats or hazards and analyze what could happen if a threat or hazard occurs.
- data
- risk
- expectation
- transportation
- What permits government employees and contractors to review classified information?
- Needs assessment
- Minimum qualifications
- Security requests
- Security clearances
- Which system developed in 1994 allowed Border Patrol agents to identify illegal border crossers using biometric information.
- Automated targeting system
- Automated biometric identification system (IDENT)
- Customs-trade partnership against terrorism (C-TPAT)
- Personally identifiable information (PII)
- Which of the following terms describes a compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information?
- Automated Targeting
- Operating Picture
- Waitlist
- Watchlist
- Which of the following terms describes any information that permits the identity of an individual to be directly or indirectly inferred, including any other information that is linked or linkable to that individual?
- Data Mining
- Derogatory Information
- Personally Identifiable Information
- Watchlist
True/False
- The fifteenth century saw the development of data storage on magnetic tape and the invention of early computers
- True
- False
- Big data is revolutionizing medicine and the ability to diagnose and treat patients.
- True
- False
- Risk segmentation involves the separation of low-risk cargo or people from high risk, or unknown, cargo or people.
- True
- False
- A watchlist is compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information.
- True
- False
- The use of IDENT and the CDS exemplify how big data and risk assessment can be used to inform homeland security decision-making.
- True
- False
- The industrial and economic boom that occurred during the mid-twentieth century saw the emergence of business intelligence, data centers, and the more direct ancestors of today’s computers.
- True
- False
Short Answer
- Describe a historical period in which humans used and managed knowledge before the use of computers.
- Answers will vary but can include examples from the text. The emergence and evolution of libraries and methods to store books and manuscripts systematically represent such early efforts. Early big data played a key role in the Allied Powers gaining strategic advantage over the Axis Powers during World War II.
- Define the concept of risk management.
- Risk management is the process for identifying, analyzing, and communicating risk and accepting, avoiding, transferring, or controlling it to an acceptable level considering associated costs and benefits of any actions taken.
- Explain why information sharing was problematic in the pre-9/11 era.
- Agencies were reluctant to share information with each other, and, when they did, information sharing occurred in limited, non-systematic manner, almost always based on personnel relationships. An investigator from one agency might call a friend in another to pass along a name or phone number; in a robust instance of sharing, the agent might send over the whole case file.
- Which agencies are provided with information available in the Terrorist Screening Database (TSDB)?
- Six major federal data users receive TSDB information: TSA’s Secure Flight; CBP’s TECS system; the Department of State’s Consular Lookout and Support System (CLASS) for passport and visa screening; the Transportation Vetting System for credentialing transportation and critical infrastructure workers; the Department of Defense; and the FBI’s National Crime Information Center’s Known or Suspected Terrorist File for domestic law enforcement
- Identify some potential flaws in the Secure Flight program.
- In addition to air passenger vetting, for example, TSA is also responsible for vetting aviation workers for terrorism links. A DHS Inspector General analysis in 2015 found that TSA had failed to identify 73 individuals with links to terrorism. As a result, the 73 individuals “were cleared for access to secure airport areas despite representing a potential transportation security threat. The error occurred because the individuals were excluded from the terrorism watchlist that TSA received.
Short Essay
- Explain how homeland security programs now rely on the use of “big data”.
- Discuss how national preparedness and resilience rely on big data.
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Chapter 2 Going Global: International Ties In Homeland Security
DOCX Ch. 2
Chapter 3 Legal Processes & Homeland Security
DOCX Ch. 3
Chapter 4 Big Data Risk Homeland Security
DOCX Ch. 4 Current
Chapter 5 Privacy, Liberty, And Security: Finding A Balance
DOCX Ch. 5
Chapter 6 Resilience Infrastructure Prot
DOCX Ch. 6