Exam 7: Vulnerability Assessment and Impact Analysis

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A base map is very important in conducting vulnerability assessment.

Free
(True/False)
4.7/5
(26)
Correct Answer:
Verified

True

What would be a good source of data for man-made hazards?

Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
Verified

B

Hazard Vulnerability Assessment for man-made (technological) hazards begins by looking within a community for where these hazards exist.

Free
(True/False)
4.7/5
(36)
Correct Answer:
Verified

True

In the context of hazard analysis, what are "assets"?

(Multiple Choice)
4.8/5
(35)

Complete the following statement by choosing the best response below: Hazard-specific information and location of community assets can be overlaid using _____ to aid in the analysis of the impact of hazards.

(Multiple Choice)
4.8/5
(38)

Complete the following sentence by selecting the combination of words below that makes it a true statement: The potential for terrorism is nearly ________; which is especially true when one imagines a terrorist group utilizing deadly man-made substances against _______ targets.

(Multiple Choice)
4.9/5
(28)

In the U.S., 'replacement value' is usually expressed in what terms?

(Multiple Choice)
4.8/5
(41)

The terms 'hazard' and 'risk' are interchangeable because they have the same meaning when it comes to hazard analysis.

(True/False)
4.8/5
(38)

Communications is not considered to be critical infrastructure because the term is too broad and applies mainly to the private sector?

(True/False)
4.8/5
(32)

Human losses from hazard events are difficult to calculate.

(True/False)
4.9/5
(33)

Vulnerability assessment is a process to identify, evaluate and assess our susceptibility to natural and technological hazards.

(True/False)
4.8/5
(30)

What is the term used to express the cost for a business or service to be relocated to another structure because of a hazard event?

(Multiple Choice)
4.9/5
(32)

Hazard vulnerability analysis (HVA) for technological hazards is accomplished in a very different manner than one would perform an HVA for natural hazards.

(True/False)
4.8/5
(41)

The history of previous hazard events for each hazard helps estimate the likelihood or probability of future events.

(True/False)
4.7/5
(30)

Globally, approximately what percentage of all terrorist acts involve incendiary and Improvised Explosive Devices (IED)?

(Multiple Choice)
4.9/5
(39)

What software tool can be used to estimate loss from floods, earthquakes and hurricanes for any region in the United States?

(Multiple Choice)
4.9/5
(37)

A rating of '1' for the Probability of Occurrence of a hazard in a Hazard Vulnerability Matrix indicates that we should expect that hazard to occur on average at least once each year.

(True/False)
4.8/5
(32)

National Monuments and Icons is a critical infrastructure sector and considered to be a Key Asset.

(True/False)
5.0/5
(28)

Complete the following statement by choosing the most correct response below: Once hazards are identified, the next step in hazard analysis is to develop ______________.

(Multiple Choice)
4.8/5
(41)

What is 'replacement value?'

(Multiple Choice)
4.9/5
(38)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)