Exam 4: Toward a Smarter Defense: Big Data and Risk Assessments in Homeland Security
Exam 1: Understanding the Homeland Security Enterprise: Coordination and Partnerships22 Questions
Exam 2: Going Global: International Ties in Homeland Security19 Questions
Exam 3: Laws, Legal Processes, and Enforcement Mechanisms: Criminal Justice Dimensions of Homeland Security19 Questions
Exam 4: Toward a Smarter Defense: Big Data and Risk Assessments in Homeland Security19 Questions
Exam 5: Privacy, Liberty, and Security: Finding a Balance20 Questions
Exam 6: Advancing Economic and Societal Resilience: Critical Infrastructure Protection21 Questions
Exam 7: The Flying Edge: Aviation Security Evolves20 Questions
Exam 8: Defending a Virtual World: Cybersecurity and Homeland Security20 Questions
Exam 9: Lines and Flows: on National Sovereignty and Border Security19 Questions
Exam 10: UP From the Ashes: Emergency Management and Disaster Recovery21 Questions
Exam 11: Does Moore Mean More: the Promises and Pitfalls of Homeland Security Technologies19 Questions
Exam 12: Like the Plague: Public Health in Homeland Security22 Questions
Exam 13: The Future of Homeland Security: Challenges and Opportunities21 Questions
Select questions type
Which system developed in 1994 allowed Border Patrol agents to identify illegal border crossers using biometric information.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
B
The industrial and economic boom that occurred during the mid-twentieth century saw the emergence of business intelligence, data centers, and the more direct ancestors of today's computers.
Free
(True/False)
4.7/5
(38)
Correct Answer:
True
_________ assessment is a process to identify potential threats or hazards and analyze what could happen if a threat or hazard occurs.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
B
Risk segmentation involves the separation of low-risk cargo or people from high risk, or unknown, cargo or people.
(True/False)
4.8/5
(30)
A watchlist is compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information.
(True/False)
4.8/5
(39)
Which of the following terms describes a compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information?
(Multiple Choice)
4.7/5
(42)
The fifteenth century saw the development of data storage on magnetic tape and the invention of early computers
(True/False)
4.7/5
(38)
Big data is revolutionizing medicine and the ability to diagnose and treat patients.
(True/False)
4.8/5
(42)
Describe a historical period in which humans used and managed knowledge before the use of computers.
(Essay)
4.9/5
(39)
Explain how homeland security programs now rely on the use of "big data".
(Essay)
4.9/5
(32)
The use of IDENT and the CDS exemplify how big data and risk assessment can be used to inform homeland security decision-making.
(True/False)
4.8/5
(43)
Approximately, how many air passengers per day does the TSA screen?
(Multiple Choice)
4.9/5
(36)
The 3 V's of big data refer to volume, velocity, and ______________.
(Multiple Choice)
4.7/5
(35)
Which of the following terms describes any information that permits the identity of an individual to be directly or indirectly inferred, including any other information that is linked or linkable to that individual?
(Multiple Choice)
4.9/5
(32)
Which agencies are provided with information available in the Terrorist Screening Database (TSDB)?
(Essay)
4.9/5
(44)
What permits government employees and contractors to review classified information?
(Multiple Choice)
4.8/5
(29)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)