Exam 9: Lines and Flows: on National Sovereignty and Border Security
Exam 1: Understanding the Homeland Security Enterprise: Coordination and Partnerships22 Questions
Exam 2: Going Global: International Ties in Homeland Security19 Questions
Exam 3: Laws, Legal Processes, and Enforcement Mechanisms: Criminal Justice Dimensions of Homeland Security19 Questions
Exam 4: Toward a Smarter Defense: Big Data and Risk Assessments in Homeland Security19 Questions
Exam 5: Privacy, Liberty, and Security: Finding a Balance20 Questions
Exam 6: Advancing Economic and Societal Resilience: Critical Infrastructure Protection21 Questions
Exam 7: The Flying Edge: Aviation Security Evolves20 Questions
Exam 8: Defending a Virtual World: Cybersecurity and Homeland Security20 Questions
Exam 9: Lines and Flows: on National Sovereignty and Border Security19 Questions
Exam 10: UP From the Ashes: Emergency Management and Disaster Recovery21 Questions
Exam 11: Does Moore Mean More: the Promises and Pitfalls of Homeland Security Technologies19 Questions
Exam 12: Like the Plague: Public Health in Homeland Security22 Questions
Exam 13: The Future of Homeland Security: Challenges and Opportunities21 Questions
Select questions type
Detail some of the history about current partners of the trusted traveler programs.
Free
(Essay)
4.8/5
(32)
Correct Answer:
Student answers may vary but could include the following. The United States has several trusted traveler programs. The oldest is the Secure Electronic Network for Travelers Rapid Inspection (SENTRI), dating from the mid-1990s, which allows pre-vetted passengers to cross the southwest land border in specially designated lanes. The northern border equivalent is called NEXUS, which also provides travelers expedited privileges at airports. The primary air passenger program is Global Entry, which now has over five million members and is operational at fifty-three airports
Which of the following terms describes the practice in which authorities on different sides of the border treat crossings as a flow to be managed and collaborate throughout the process?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
C
Which of the following terms applies to an increase in numbers of border crossers?
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
B
Describe some of the key elements in risk management between the ports of entry.
(Essay)
4.9/5
(43)
Borders define where one area of sovereignty ends and another begins.
(True/False)
4.7/5
(38)
The world's longest land border is shared by _______________________.
(Multiple Choice)
4.7/5
(43)
A risk management approach is essential to cope with contemporary volumes of trade and travel and effectively target inspection resources at the small percentage of goods or people who pose a threat
(True/False)
4.9/5
(36)
Which program provides a centralized location where advance information can be analyzed along with travel patterns, trade records, and watchlists about possible threats?
(Multiple Choice)
4.9/5
(35)
The Peace of Westphalia established the norm of non-interference by one nation in the affairs of other nation states.
(True/False)
4.8/5
(40)
Containerization offers positive economic benefits without any security challenges.
(True/False)
4.8/5
(36)
Describe the evolution of how borders work from development through to the future of border security.
(Essay)
4.9/5
(25)
Which of the following is NOT one of the accomplishments of the Beyond the Border initiative?
(Multiple Choice)
4.8/5
(38)
Land border crossing infrastructure tends to be outdated and limited in its capacity.
(True/False)
4.8/5
(29)
International air travel dropped significantly from the end of the Second World War to the oil crisis of the 1970s.
(True/False)
4.8/5
(41)
International flows of trade have existed since the beginning of recorded history.
(True/False)
4.9/5
(31)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)