Exam 13: The Future of Homeland Security: Challenges and Opportunities
Exam 1: Understanding the Homeland Security Enterprise: Coordination and Partnerships22 Questions
Exam 2: Going Global: International Ties in Homeland Security19 Questions
Exam 3: Laws, Legal Processes, and Enforcement Mechanisms: Criminal Justice Dimensions of Homeland Security19 Questions
Exam 4: Toward a Smarter Defense: Big Data and Risk Assessments in Homeland Security19 Questions
Exam 5: Privacy, Liberty, and Security: Finding a Balance20 Questions
Exam 6: Advancing Economic and Societal Resilience: Critical Infrastructure Protection21 Questions
Exam 7: The Flying Edge: Aviation Security Evolves20 Questions
Exam 8: Defending a Virtual World: Cybersecurity and Homeland Security20 Questions
Exam 9: Lines and Flows: on National Sovereignty and Border Security19 Questions
Exam 10: UP From the Ashes: Emergency Management and Disaster Recovery21 Questions
Exam 11: Does Moore Mean More: the Promises and Pitfalls of Homeland Security Technologies19 Questions
Exam 12: Like the Plague: Public Health in Homeland Security22 Questions
Exam 13: The Future of Homeland Security: Challenges and Opportunities21 Questions
Select questions type
What legislation provides civil liability protections to firms that opt to share cybersecurity information with other businesses or government agencies for homeland security purposes?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
C
What are some potential issues that may arise with the use of automated analysis?
Free
(Essay)
4.8/5
(40)
Correct Answer:
Student answers may vary slightly - An automated analysis of someone's utility bills and tax returns may provide enough information to indicate whether that person has a substance abuse problem. Records of frequent foreign travel, combined with computer network activity logs, could lead an intelligence or law enforcement analyst to conclude-incorrectly-that an individual is associating with extremists abroad. A lovestruck 25-year-old, engaged to her Filipina girlfriend, may end up on the wrong end of an algorithm that suggests she is involved in human trafficking, profoundly disrupting her personal and professional life.
Homeland security budgets provide a window of insight into how elected officials view the current threat landscape and allocate limited resources to address those threats.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
More than 100 Congressional committees oversee the homeland security enterprise.
(True/False)
4.7/5
(31)
What system is used by the Department of Defense to evaluate the potential threat posed by individuals with security clearances on an ongoing basis?
(Multiple Choice)
4.7/5
(38)
List some of the current challenges emerging in the homeland security profession.
(Essay)
4.9/5
(32)
Explain how a U.S. President can affect the homeland security enterprise.
(Essay)
4.9/5
(41)
This term refers to a phenomenon in which a precipitating event spurs the creation of new security measures or the enhancement of existing security measures.
(Multiple Choice)
4.8/5
(39)
Presidents have no discretion in shaping the actions of homeland security stakeholder agencies.
(True/False)
4.8/5
(37)
Lone wolf-style terrorists frequently draw inspiration from larger extremist organizations or charismatic leaders.
(True/False)
4.8/5
(35)
The global flow of people and things also requires that organizations within the homeland security enterprise share information
(True/False)
4.9/5
(36)
Discuss your prediction of the future emerging challenges in the homeland security enterprise.
(Essay)
4.8/5
(47)
The outcome of __________________ means that future presidents may decide to use their legal authorities to slow or stop the flow of people and goods into the United States in the event of real or perceived threats to homeland security.
(Multiple Choice)
4.8/5
(29)
The global movement of people and things only applies to homeland security within the transportation sector.
(True/False)
4.9/5
(31)
Describe the type(s) of research needed for a better understanding of homeland security.
(Essay)
4.8/5
(32)
In the nearly twenty years since DHS's creation, these four major categories of threats that have dominated policy discussions about homeland security:
(Multiple Choice)
4.7/5
(32)
Which of the following incidents is NOT an example of lone wolf-style terrorism?
(Multiple Choice)
4.8/5
(38)
Explain Edward Snowden's rationale for stealing and leaking classified information.
(Essay)
4.8/5
(33)
Showing 1 - 20 of 21
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)