Exam 7: Vulnerability Assessment and Impact Analysis
Exam 1: Introduction20 Questions
Exam 2: Mitigation Rules and Regulations20 Questions
Exam 3: Role of Governments20 Questions
Exam 4: Mitigation in the Private Sector20 Questions
Exam 5: Hazard Identification Natural Hazards20 Questions
Exam 6: Hazard Identification Man-Made Hazards20 Questions
Exam 7: Vulnerability Assessment and Impact Analysis20 Questions
Exam 8: Threat and Hazard Identification and Risk Assessment Thira15 Questions
Exam 9: Mitigation Strategies for Natural Hazards20 Questions
Exam 10: Mitigation Strategies for Man-Made Hazards20 Questions
Exam 11: Mitigation Tools15 Questions
Exam 12: Mitigation Best Practices20 Questions
Select questions type
A base map is very important in conducting vulnerability assessment.
Free
(True/False)
4.7/5
(26)
Correct Answer:
True
What would be a good source of data for man-made hazards?
Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
B
Hazard Vulnerability Assessment for man-made (technological) hazards begins by looking within a community for where these hazards exist.
Free
(True/False)
4.7/5
(36)
Correct Answer:
True
Complete the following statement by choosing the best response below: Hazard-specific information and location of community assets can be overlaid using _____ to aid in the analysis of the impact of hazards.
(Multiple Choice)
4.8/5
(38)
Complete the following sentence by selecting the combination of words below that makes it a true statement: The potential for terrorism is nearly ________; which is especially true when one imagines a terrorist group utilizing deadly man-made substances against _______ targets.
(Multiple Choice)
4.9/5
(28)
In the U.S., 'replacement value' is usually expressed in what terms?
(Multiple Choice)
4.8/5
(41)
The terms 'hazard' and 'risk' are interchangeable because they have the same meaning when it comes to hazard analysis.
(True/False)
4.8/5
(38)
Communications is not considered to be critical infrastructure because the term is too broad and applies mainly to the private sector?
(True/False)
4.8/5
(32)
Vulnerability assessment is a process to identify, evaluate and assess our susceptibility to natural and technological hazards.
(True/False)
4.8/5
(30)
What is the term used to express the cost for a business or service to be relocated to another structure because of a hazard event?
(Multiple Choice)
4.9/5
(32)
Hazard vulnerability analysis (HVA) for technological hazards is accomplished in a very different manner than one would perform an HVA for natural hazards.
(True/False)
4.8/5
(41)
The history of previous hazard events for each hazard helps estimate the likelihood or probability of future events.
(True/False)
4.7/5
(30)
Globally, approximately what percentage of all terrorist acts involve incendiary and Improvised Explosive Devices (IED)?
(Multiple Choice)
4.9/5
(39)
What software tool can be used to estimate loss from floods, earthquakes and hurricanes for any region in the United States?
(Multiple Choice)
4.9/5
(37)
A rating of '1' for the Probability of Occurrence of a hazard in a Hazard Vulnerability Matrix indicates that we should expect that hazard to occur on average at least once each year.
(True/False)
4.8/5
(32)
National Monuments and Icons is a critical infrastructure sector and considered to be a Key Asset.
(True/False)
5.0/5
(28)
Complete the following statement by choosing the most correct response below: Once hazards are identified, the next step in hazard analysis is to develop ______________.
(Multiple Choice)
4.8/5
(41)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)