Exam 13: The Future of Homeland Security: Challenges and Opportunities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What legislation provides civil liability protections to firms that opt to share cybersecurity information with other businesses or government agencies for homeland security purposes?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

What are some potential issues that may arise with the use of automated analysis?

Free
(Essay)
4.8/5
(40)
Correct Answer:
Verified

Student answers may vary slightly - An automated analysis of someone's utility bills and tax returns may provide enough information to indicate whether that person has a substance abuse problem. Records of frequent foreign travel, combined with computer network activity logs, could lead an intelligence or law enforcement analyst to conclude-incorrectly-that an individual is associating with extremists abroad. A lovestruck 25-year-old, engaged to her Filipina girlfriend, may end up on the wrong end of an algorithm that suggests she is involved in human trafficking, profoundly disrupting her personal and professional life.

Homeland security budgets provide a window of insight into how elected officials view the current threat landscape and allocate limited resources to address those threats.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

More than 100 Congressional committees oversee the homeland security enterprise.

(True/False)
4.7/5
(31)

What system is used by the Department of Defense to evaluate the potential threat posed by individuals with security clearances on an ongoing basis?

(Multiple Choice)
4.7/5
(38)

List some of the current challenges emerging in the homeland security profession.

(Essay)
4.9/5
(32)

Explain how a U.S. President can affect the homeland security enterprise.

(Essay)
4.9/5
(41)

This term refers to a phenomenon in which a precipitating event spurs the creation of new security measures or the enhancement of existing security measures.

(Multiple Choice)
4.8/5
(39)

Presidents have no discretion in shaping the actions of homeland security stakeholder agencies.

(True/False)
4.8/5
(37)

Lone wolf-style terrorists frequently draw inspiration from larger extremist organizations or charismatic leaders.

(True/False)
4.8/5
(35)

The global flow of people and things also requires that organizations within the homeland security enterprise share information

(True/False)
4.9/5
(36)

Explain what is meant by the term 'pendulum effect.'

(Essay)
4.9/5
(40)

Discuss your prediction of the future emerging challenges in the homeland security enterprise.

(Essay)
4.8/5
(47)

The outcome of __________________ means that future presidents may decide to use their legal authorities to slow or stop the flow of people and goods into the United States in the event of real or perceived threats to homeland security.

(Multiple Choice)
4.8/5
(29)

Describe how the Continuous Evaluation program is used.

(Essay)
4.7/5
(32)

The global movement of people and things only applies to homeland security within the transportation sector.

(True/False)
4.9/5
(31)

Describe the type(s) of research needed for a better understanding of homeland security.

(Essay)
4.8/5
(32)

In the nearly twenty years since DHS's creation, these four major categories of threats that have dominated policy discussions about homeland security:

(Multiple Choice)
4.7/5
(32)

Which of the following incidents is NOT an example of lone wolf-style terrorism?

(Multiple Choice)
4.8/5
(38)

Explain Edward Snowden's rationale for stealing and leaking classified information.

(Essay)
4.8/5
(33)
Showing 1 - 20 of 21
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)