Homeland Security

Q1. Which of the following was designated a Combat Support Agency?
a. Defense Intelligence Agency
b. Drug Enforcement Administration
c. National Security Agency
d. None of the above

Q2. Which of the following is information produced by quantitative and qualitative analysis of physical attributes of targets and events in order to characterize and identify them?
a. OSINT
b. MASINT
c. COMINT
d. FISINT

Q3. The National Security Agency began as which of the following in 1949?
a. The Federal Security Administration
b. The National Security Administration
c. The Armed Forces Security Agency
d. The Interagency Intelligence Bureau

Q4. The 9/11 Commission recommended that a National Intelligence Director be created, and that which of the following be replaced by this official?
a. Special Assistant to the President for National Intelligence
b. Director of Central Intelligence
c. Director of National Intelligence
d. Defense Intelligence Coordinator

Q5. Which of the following agency’s primary function has been to oversee the research and development, procurement, deployment, and operation of imaging, signals intelligence, and ocean surveillance satellites.
a. The Central Intelligence Agency
b. The National Reconnaissance Office
c. The National Security Agency
d. The National Geospatial Intelligence Agency

Q6. The DNI controls the intelligence budget in terms of dollar amounts and distributions among different intelligence agencies.
a. True
b. False

Q7. Which of the following NSA offices oversees the function of the military cryptologic system?
a. Information Assurance Directorate
b. Central Security Service
c. Signals Intelligence Directorate
d. Threat Operations Center

Q8. Which of the following is one of the six core mission offices of the DNI?
a. Office of the National Counterintelligence Executive
b. National Counterproliferation Center
c. The Information Sharing Environment
d. All of the above

Q9. Soon after the release of the 9/11 Commission report, Congress passed which of the following in response:
a. Intelligence Reform and Terrorism Prevention Act of 2004
b. Interrupting Terrorism Planning and Funding Act
c. Post-9/11 Intelligence Reorganization Act of 2003
d. The Security Act of Importance

Q10. Which of the following spurred the greatest increase in US Government intelligence activities?
a. World War I
b. The Civil War
c. The Cold War
d. The Korean War

Q11. The United States Border Patrol was dissolved in 2003 when the Department of Homeland Security was created, as stipulated in the Homeland Security Act of 2002.
a. True
b. False

Q12. The CBP Office of Technology Innovation and Acquisition is the present-day manifestation of which of the following programs?
a. The Secure Border Initiative (SBI)
b. TechAcq
c. The Technical Division
d. The unsecure border program

Q13. Border patrol was first maintained by which of the following entities?
a. US Immigration Service
b. The Mounted Inspectors
c. The Texas Rangers
d. US Customs and Border Protection

Q14. ICE helps to prevent money _________.
a. laundering
b. spending
c. printing
d. saving

Q15. In 1917, illegal immigration rates rose considerably due to which of the following?
a. A ban on foreign workers
b. The national railroads project
c. A higher head tax
d. A lower foot tax

Q16. CBP officials are deployed overseas at major international seaports through which of the following?
a. The Port Security Initiative (PSI)
b. The Seaway Cooperation Act (SCA)
c. The Container Security Initiative (CSI)
d. The Marine Safety Act (MSA)

Q17. Which of the following USCIS programs conducts tracking of foreign visitors to the United States?
a. OBIM
b. HSDN
c. RAIO
d. JTTF

Q18. The Border Enforcement Security Task Force (BEST) mission includes only work along the US-Mexico border.
a. True
b. False

Q19. The original US border patrol function was concerned more with __________ enforcement than illegal immigration.
a. citizens
b. customs
c. Chinese border
d. US economy

Q20. In its initial organization, DHS consolidated the various agencies responsible for the safety, security, and control of the borders under which of the following?
a. Directorate of Border and Transportation Security (BTS)
b. Immigration and Customs Enforcement (ICE)
c. Immigration and Naturalization Service (INS)
d. Director of Bays and Harbors

Q21. Which of the following programs coordinates public and private sector partners for exercise, training, and information sharing, and to address transportation security issues focused on protecting travelers, commerce, and infrastructure?
a. I-STEP
b. US-VISIT
c. OSO
d. A-Stands

Q22. Which of the following tasked DHS with the responsibility of assuring maritime security and protecting the nation’s ports?
a. Homeland Security Act of 2002
b. HSPD-5
c. SAFE Port Act of 2006
d. TIPK

Q23. Which of the following serves as the primary law enforcement entity within TSA?
a. Armed Pilots and Flight Attendants
b. The Federal Air Marshals
c. The Federal Protective Service
d. Armed Security Officer Program

Q24. Which of the following is considered a Class I Railroad?
a. Railroads that operate over large areas, in multiple states, and concentrate on the long-haul, high-density, intercity traffic lines with annual revenues over $250 million.
b. Railroads that operate on at least 350 miles of active lines and have annual revenues between $20 and $250 million.
c. Railroads that operate on less than 350 miles of line and generate less than $20 million in annual revenues.
d. Railroads that do not run at all

Q25. Containers that have special devices that enable inspectors to tell if tampering has occurred are called _____________
a. “Smart Boxes.”
b. “Dumb Boxes.”
c. “Genius Boxes.”
d. “Prophecy Boxes.”

Q26. The current freight rail system is wholly owned and operated by the Federal Government due to post-9/11 legislation.
a. True
b. False

Q27. Electrical transmission lines are considered a component of the US Transportation Infrastructure.
a. True
b. False

Q28. Which of the following is the often-neglected link in transportation security?
a. Bus Transportation
b. Public Transportation
c. Subway Transportation
d. None of the above

Q29. Which of the following programs helps to increase flight safety by authorizing certain cockpit-based crew to be armed?
a. Federal Flight Deck Officers Program
b. Law Enforcement Officers Flying Armed Program
c. The Federal Air Marshals Program
d. Crew Member Self Defense Training Program

Q30. Which of the following is not considered part of the motor carrier industry?
a. The U.S. Motor coach Industry
b. The Pupil Transportation (School Bus) Industry
c. The Motor Carrier Freight Industry
d. The Coach Purse Factory

Q31. Which of the following is defined as “the global network of information technology infrastructure, inclusive of the internet, the telecom network, systems of servers and computers, electronic control mechanisms, and the embedded processes in microchips and other semiconductors”?
a. Cyberland
b. Infonet
c. Cyberspace
d. The Cyber Infrastructure

Q32. Which of the following is defined as the “creation, access, modification, and destruction of information”?
a. Storage
b. Processing
c. Read-writing
d. Logging

Q33. Under the Cybersecurity Framework, there are that enable stakeholders in the public and private sectors to assess how they are managing their cyber risk and to better understand how those actions measure up to what is considered effective.
a. three “levels”
b. four “tiers”
c. five “tiles”
d. six “tires”

Q34. Which of the following hacking methods specifically targets databases?
a. DNS Poisoning
b. Clickjacking
c. Social engineering
d. SQL Injection

Q35. __________ is a catchall name for any program that seeks to compromise, disrupt, or steal from a device or system.
a. Malware
b. Badware
c. Nicewar
d. Foulware

Q36. Which of the following involves making one’s email appear like one that would be trusted by the target of a phishing scheme?
a. Spoofing
b. Clickjacking
c. DNS Poisoning
d. Hacking

Q37. The DHS Directorate for National Protection and Programs leads the nation’s efforts to manage cyberterrorism threats.
a. True
b. False

Q38. Cyberterrorism can result in injuries and/or deaths.
a. True
b. False

Q39. Which of the following is a series of national-level exercise focused on cybersecurity?
a. Cyber Storm
b. Protect 2050
c. Federal Hackathon
d. Consolidated Cybersecurity Partnership Exercise Program (CCPEP)

Q40. Which of the following is a “self-organized, self-run, and self-governed private sector council consisting of own?ers and operators and their representatives, which interact on a wide range of sector-specific strategies, policies, activities, and issues”?
a. Sector-Coordinating Council
b. Federal Senior Leadership Council
c. Government Coordinating Council
d. Information Sharing Organization

Order from us and get better grades. We are the service you have been looking for.