Exam 14: Homeland Security and Terrorism: Understanding the Threat and Countermeasures
Exam 1: The History and Professionalization of Private Security49 Questions
Exam 2: The Business of the Private Security Industry46 Questions
Exam 3: Private Security Concepts, Tools, and Systems Integration or Convergence49 Questions
Exam 4: Private Security Law50 Questions
Exam 5: Premise Security50 Questions
Exam 6: Retail Security and Loss Prevention49 Questions
Exam 7: Personal Security50 Questions
Exam 8: Employment-Related Security65 Questions
Exam 9: Information and Computer Security65 Questions
Exam 10: Investigative Security49 Questions
Exam 11: Surveillance and Undercover Operations50 Questions
Exam 12: Public and Private Partnerships for Security50 Questions
Exam 13: Homeland Security46 Questions
Exam 14: Homeland Security and Terrorism: Understanding the Threat and Countermeasures50 Questions
Select questions type
Many private firms also are involved in information sharing through:
Free
(Multiple Choice)
5.0/5
(32)
Correct Answer:
A
Even the ____________ relies on private security companies to perform crucial jobs formerly entrusted to the military in the Middle East.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
C
Since 2002, federal rules have required the Transportation Security Agency to conduct security inspections of all air passengers and air travel.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
These were established in 1998 and assist private entities in sharing information with the private as well as public sectors.
(Multiple Choice)
4.8/5
(37)
A criticality assessment is a systematic effort to identify and evaluate important or critical assets within a jurisdiction.
(True/False)
4.8/5
(30)
Describe the formation of the Department of Homeland Security and the basic objective of this department.
(Essay)
4.9/5
(31)
The Office of Inspector General serves as an independent and subjective inspection, audit, and investigative body.
(True/False)
4.8/5
(31)
After the 9/11 attacks, the FBI took extreme criticism about the way they handled information that may have prevented the attacks.The FBI was reorganized and focused on three priorities.Discuss these new protocols.
(Essay)
4.9/5
(41)
The private security industry, in addition to providing vital protection services for corporations, is also used by:
(Multiple Choice)
4.9/5
(37)
This law protects potential developers of technology that could significantly reduce risk of, or mitigate the effect of, acts of terrorism from liability claims:
(Multiple Choice)
4.9/5
(34)
DHS, in order to detect biological, radiation, bioagents, well as radiological and nuclear threats, are seeking:
(Multiple Choice)
4.7/5
(38)
Risk calculation and countermeasure identification combines all earlier:
(Multiple Choice)
4.9/5
(28)
This term was used after 9/11 to describe defensive efforts within the borders of the United States.
(Multiple Choice)
4.7/5
(36)
Agroterrorism is a threat directed at what group or product within the United States?
(Multiple Choice)
4.8/5
(28)
Eco-terrorism is an attempt to inflict economic damage to those who profit from the destruction of the natural environment.
(True/False)
4.8/5
(23)
The FBI defines this issue as, "the unlawful use of force or violence against a person or property to intimidate or coerce a government, the civilian population, or a segment therof, in furtherance of political or social objectives".
(Multiple Choice)
4.9/5
(39)
A major threat to our nation is terrorism directed at the ________________, which demonstrates the need for private security in various venues.
(Essay)
4.7/5
(31)
What is the definition of Terrorism? What is the basic purpose of the terrorist attacks?
(Short Answer)
4.7/5
(35)
The Department of Homeland Security has traditionally been the lead federal agency in the response to an investigation of terrorism.
(True/False)
4.8/5
(35)
Terrorism is a new concept in world history which makes it difficult to devise plans to thwart it.
(True/False)
4.8/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)