Critical infrastructure security and resilience plans

Assignment Help Other Subject
Reference no: EM132315089

Final Exam for: Implementing Critical Infrastructure Security and Resilience

1. Which of the following threats should we prioritize the highest when managing risk?

A. Threats with the greatest consequences should they occur
B. Threats with the lowest probability of occurring
C. Threats that are confined to residential neighborhoods
D. Threats that are limited to publicly-owned infrastructure

2. Which of the following is a benefit of critical infrastructure partnerships for owners and operators?

A. Partners automatically receive access to sensitive and classified threat information.
B. Partners are eligible for subsidies under the National Infrastructure Protection Act.
C. Partners receive timely and useful information about threats to critical infrastructure.
D. Information provided by partners can satisfy regulatory reporting requirements

3. The following are examples of protective measures, EXCEPT FOR:

A. Automating inventory functions.
B. Installing security systems.
C. Hardening facilities.
D. Building system redundancies

4. Complete the Statement: Critical infrastructure security and resilience plans should explicitly address the following topics, EXCEPT FOR.

A. Partnership building and information sharing.
B. Corrective actions.
C. Roles and responsibilities.
D. Risk management.

5. Complete the Statement: Continuous improvement activities provide the following benefits, EXCEPT FOR:

A. They help to identify gaps in policies, plans, and procedures.
B. They better prepare personnel to protect against potential threats.
C. They enable participants to apply policies, plans, and procedures in a safe environment.
D. They help to identify best practices from other industries

6. Complete the Statement: The most effective protective programs have the following characteristics, EXCEPT FOR:

A. Coordinated.
B. Risk-informed.
C. Delegated .
D. Cost-effective.

7. What are the two factors used to evaluate reported information?

A. The relevance of the information to terrorism or to other threats
B. The reliability of the information and whether it is actionable
C. The reliability of the source and the validity of the information
D. The currency of the information and the evaluation of the source

8. What step is needed after information is collected?

A. Validate information
B. Establish information analysis centers
C. Form public-private partnerships
D. Determine information resources

9. What is government's role when engaging owners and operators to form partnerships?

A. Encouraging and providing incentives to owners and operators to take action to make critical infrastructure secure and resilient
B. Creating partnerships that rely on civic engagement for critical infrastructure protection
C. Developing relationships with government regulatory partners that include mechanisms for sharing mandatory data
D. Working with owners and operators to enforce compliance with widely-held protective measures and practices

10. Complete the Statement: Critical infrastructure threat assessments should evaluate the following threats, EXCEPT FOR:

A. Qualified workforce shortages.
B. Drought.
C. Cyber/database failures.
D. Domestic terrorist attacks.

11. Complete the Statement: Exercises conducted with major stakeholders strengthen security and resilience capabilities by helping to:

A. Provide outreach and training resources to major stakeholders.
B. Improve communications and promote consistency.
C. Identify best practices through benchmarking.
D. Exploit vulnerabilities and weaknesses in protective measures.

12. Complete the Statement: The responsibility for developing business continuity and emergency management plans to address the direct effects of incidents lies with:

A. The Federal Emergency Management Agency.
B. The DHS Office of Infrastructure Protection.
C. Sector Specific Agencies.
D. Critical infrastructure owners and operators.

13. Complete the Statement: Implementation plans provide the following benefits, EXCEPT FOR

A. They provide a schedule for the completion of actions.
B. They identify specific actions that must be taken.
C. They identify expected outcomes from corrective actions.
D. They identify areas for improvement.

14. Which of the following provides a set of tools for owners and operators to assess critical infrastructure asset vulnerabilities?

A. The National Terrorism Advisory System
B. The Homeland Security Exercise and Evaluation Program
C. The Critical Infrastructure Resource Center
D. The Automated Critical Asset Management System

15. Complete the Statement: Critical infrastructure partners focus their information collection efforts and lay the foundation for a common operating picture by:

A. Identifying information needs up front
B. Participating in industry partnerships
C. Registering in warning and alert programs
D. Implementing the Critical Information Protection program

16. Complete the Statement: One of the key benefits of Protected Critical Infrastructure Information (PCII) is that it:

A. Makes classified threat information available to owners and operators.
B. Permits discovery under Federal, State, and local disclosure laws.
C. Includes threat awareness materials tailored to a particular sector's needs.
D. Cannot be used for regulatory purposes.

17. Owner/operator concerns about sharing sensitive or proprietary information can be moderated by the following, EXCEPT FOR:

A. Developing and establishing agreements in advance about the use of shared information.
B. Identifying classified information networks to protect proprietary information.
C. Building confidence and trust over time.
D. Leveraging existing public-private partnerships.

18. Complete the Statement: Risk management identifies how threats will be deterred

A. Vulnerabilities eliminated, and consequences exploited.
B. Vulnerabilities mitigated, and consequences minimized.
C. Vulnerabilities eliminated, and consequences minimized.
D. Vulnerabilities mitigated, and consequences exploited.

19. What document provides the unifying structure for the integration of critical infrastructure security efforts and resilience strategies into a single national program?

A. The Sector-Specific Protection Plan
B. The Critical Infrastructure Response Plan
C. The National Infrastructure Protection Plan
D. The Homeland Security Response Plan

20. The following statements are applicable to establishing partnership goals, EXCEPT FOR

A. Goals should help partners to identify specific risk-reduction strategies that will most significantly enhance security and resilience.
B. Goals should help partners maintain a common vision of desired security and resilience criteria.
C. Goals should reflect the broad security and resilience goals of the full range of partners.
D. Goals should duplicate those met under existing emergency operations programs.

Reference no: EM132315089

Questions Cloud

Concept of crime prevention through environmental design : Define and discuss the concept of Crime Prevention Through Environmental Design (CPTD) as it pertains to the theory of Newman's "Creating Defensible Space"
Transportation systems and critical infrastructure : Is it possible for the U.S. Government to employ dual-use, all-hazards systems to protect U.S. transportation systems and critical infrastructure?
Contrast role of military in two latin american countries : Compare and contrast the role of the military in two Latin American countries. Include historical background and analysis of current roles.
List all the freedoms guaranteed by the first amendment : List all the freedoms guaranteed by the First Amendment. If you could only have one, which one would you choose and why?
Critical infrastructure security and resilience plans : Complete the Statement: Critical infrastructure security and resilience plans should explicitly address the following topics, EXCEPT FOR.
Create one-page invitation for family math game event : For this benchmark, you will plan a Family Math Game Event. Create a one-page invitation for a Family Math Game Event based on your practicum site.
Case study about student senior project : Written Case Study About Student's Senior Project. What was the need? What was the problem that you needed to overcome? What are the hopes and proposed results?
Discuss the facility case management program : Describe and discuss the facility's Case Management program. Identify areas for improvement in the facility's Case Management program,
Discuss their negative impact with example : Elaborate on 2 or more logical fallacies that are specifically a challenge to you. Discuss their negative impact with example:

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss the six most common pitfalls that research uncovered

Edu. 381- Discuss the six most common pitfalls that research uncovered that novice educators make when planning lessons. Read Valerie's case from the classroom found in section 8.6 in your textbook.

  How you would progress from simply having useful knowledge

Describe how you would progress from simply having useful knowledge to make decission about the information you have found during your database.

  Discuss the treatment processes in your area

Discuss the treatment processes in your area. How would pesticide use or improper disposal of solid and hazardous waste affect this process?

  Write an analysis paper on the usa today case study

Based on USA Today's experiences with print and online news, evaluate the long-term potential of printed news and the newspaper publishing industry.

  Research Paper Topic - American Revolution

Research Paper - Topic is American Revolution - The paper should support a thesis statement with information gained from research or investigation

  How can you measure the potential success of the program

How can you measure the potential success of the program before it is implemented? Who are your stakeholders in the project and how can they be useful to you.

  Discuss current trends and issues in the area

MGT702 - discuss current trends and issues in the area. Four key results areas (recommendations) should be developed in the report

  What are the types of child neglect

What are the types of child neglect - What are some indicators of child neglect in these and other cases - What could be some consequences of sexual abuse on the individual because of this event?

  A personal experience to describe relationship between

write a 350- to 700-word essay comparing the similarities and differences between virtue theory utilitarianism and

  Describe the result along with the relevant statistics

Describe the result along with the relevant statistics (r values and p values). Briefly state the result in words, then back it up with your stats. Say what the effect was. Describe the analysis in terms of relevant variables. What test did we run..

  Idea of saint in process of conversion and totalization

How does the idea of the hero in Greek and Roman culture become integrated into the idea of the saint in the process of conversion and totalization?

  Discuss the big five personality test

Discuss the strengths and limitations of dispositional and evolutionary or biological personality theories as they apply to behavior. Discuss the Big Five personality test and how it is used to study personality

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd