DSC 3034 Final Exam Year 2022 (100 out of 100 points)

$25.00

Category: Tag:

Description

DSC 3034 Final Exam – Question and Answers

  1. These are explosive weapons that are placed at the scene of an ongoing emergency response which are intended to specifically target and cause casualties among emergency responders.
  2. A terrorist attack is a crime; therefore, if a terrorist were to deploy a WMD, the area would become a crime scene. Although the first priority of emergency responders would be to save lives and minimize property damage, an effort must be made to preserve the scene and its evidence as much as possible by proper handling of the scene and accompanying evidence in order that the…
  3. Pre-emergency plans should be developed for likely accidental, natural, or intentional hazard scenarios, such as storms, hurricanes, floods, tornadoes, earthquakes, fires, and…
  4. It is recommended that the formal assessment process start with a screening process to prioritize the various critical components that constitute the critical asset; that is, things like utilities, critical equipment, manufacturing buildings, storage tanks, maintenance areas, warehouses, computer systems, and large groups of people. Each critical asset would be evaluated to determine the consequences of a successful attack against all of the following criteria EXCEPT:
  5. When it comes to protecting our critical infrastructure, key resources, and key assets, the mantra is if it is predictable, it’s…
  6. To stop a terrorist attack on a critical asset is very difficult; any critical asset can be breached or destroyed. However, the more secure the critical asset is and the better the critical asset is designed to withstand an attack, the greater the odds are that the critical asset will not be attacked or, if attacked, will suffer less damage. Hardening is simply the process of …
  7. Homeland security is a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and…
  8. A Security Vulnerability Analysis (SVA) is the process used to identify, quantify, and prioritize the vulnerabilities that exist in a…
  9. Active shooter events are unpredictable and evolve very quickly. Active shooters usually will continue to move throughout the critical asset until stopped by law enforcement, suicide, or other intervention. Typically, the deployment of law enforcement is required to stop the shooting and…
  10. There are two categories of exercises. The type of exercise that best meets a jurisdiction’s requirements is identified through an analysis of the stated exercise purpose, proposed objectives, experience, operations, historical precedence, and recommended level of performance. The first type of exercise is the discussion-based exercise. The second is …
  11. Jurisdictions need to implement rings of protection for our critical assets, whether they are people, infrastructure, equipment, finances, products, or intellectual capability. The basic formula for vulnerability to attack includes all of the following EXCEPT…
  12. The Chemical Facility Anti-Terrorism Standards (CFATS), 6 CFR Part 27, is a program that identifies and regulates high-risk chemical facilities to ensure they have security measures in place to reduce the risks associated with the use of regulated chemicals by establishing a risk-based approach to screening and….
  13. Information collection by law enforcement and critical asset personnel is a key element in preventing a terrorist attack. The collection of information is the first step in disrupting terrorists planning and…
  14. The first step when developing an emergency response plan is to conduct a risk assessment to identify potential.
  15. As mentioned previously, 85% of the critical infrastructure in the United States is owned by the private sector. The private sector cannot defer all of the responsibility to protect these critical assets to the public sector; it must take responsibility for its own protection. The private sector must become more self-reliant to prepare for and prevent terrorist attacks, as well as accidental and….
  16. The old adage expresses a basic truth: the easiest battle to win is the one that is never fought. We can apply this principle to our efforts to secure our critical assets from attack by an adversary. The best way to respond to a terrorist attack is to prevent it from…
  17. When developing security countermeasures that deals with people, we should not develop countermeasures that profile individuals; rather, we should profile __________ that put critical assets at risk and develop and implement the appropriate countermeasures. Potential adversaries come in all shapes and sizes, both genders, and all races and ethnicities. The implementation of security countermeasures should not infringe on people’s rights guaranteed in the US Constitution.
  18. What is the National Network of Fusion Centers responsible for…
  19. Physical systems are those security countermeasures that tend to harden a critical asset from…
  20. A risk assessment is nothing more than a careful examination to ascertain how high the probability is of an attack occurring and causing harm to critical infrastructure, key resources, or key assets, so that an assessment can be made as to whether enough security precautions have been taken to prevent…