FEMA IS-395: FEMA Risk Assessment Database Answers 1. Starting from the Master Database Main Menu, how do you import an assessment into the Master Database? A. Left click on Assessment Records and then select Import Assessor Database B. Left click on Administrative Functions and then select Import Checklist Vuln. / Obs. C. Left click on Administrative Functions and then select Import Assessor Database D. Left click on Assessment Records and then select Export to Transfer Folder 2. The first photo uploaded to the Assessment Tool is automatically set as the default image displayed each time the assessment is accessed. A. True B. False 3. On the Rapid Visual Screening Data Collection screens, what is the function of the Comments check box? A. Indicates that there are comments to support/explain a unique or extraordinary circumstance B. Indicates which comments should appear in a report C. Provides additional information as well as the FEMA directive and page number D. Indicates that a response to a question may be a vulnerability requiring immediate attention 4. Which of the following user accounts is NOT preloaded in the database? A. Administrator B. Assessor C. Editor D. Read_Only E. Reader 5. Which of the following is NOT an acceptable user password? A. 4Galile0 B. Messier8 C. [email protected] D. NGC5139 6. On the Rapid Visual Screening Data Collection screens, what is the function of the “?” button? A. Indicates that the assessor does not know the answer at the time of the assessment B. Indicates that a response to a question may be a vulnerability requiring immediate attention C. Indicates a request to support/explain a unique or extraordinary circumstance D. Provides additional information as well as an extract of the Rapid Visual Screening publication and page number 7. As a best practice, an organization should _____________________________. A. Load one copy on a computer at your organization’s headquarters operating in the Master Database mode B. Load one copy of the database on a laptop operating in the Assessment Tool mode and load one copy on a computer at your organization’s headquarters operating in the Master Database mode C. .Load one copy of the database on a laptop operating in the Assessment Tool mode 8. When you empty the database, it deletes ______________________. A. All assessments, files and folders B. All assessments from a specified date C. All assessments from a specified location D. Only the selected assessment 9. When customizing the Critical Infrastructure defaults, you can delete labels but you cannot add additional labels to the existing defaults. A. True B. False 10. On the Rapid Visual Screening Data Collection screens, a red flag generates a mandatory comment field to support the assessor’s decision. A. True B. False 11. What function is selected to erase a single assessment in the database, permanently? A. Select the Empty the Database button. B. Select the Delete an Assessment button. 12. When you need to upload photos, GIS images or miscellaneous files, how many files can you upload at one time? A. Only 1 B. 2 C. 5 D. 1 file or all files in a folder 13. In order to change the permission level of a user, you must open the Assessment Tool in Master Database Mode and ______________________________. A. Left click on Administrative Functions and then select Manage User Accounts B. Left click on Customize Report Handling Markings C. Left click on Change Password D. Left click on Admnistrative Functions and then select Change Password 14. At the end of the assessment, which function will the assessment team leader use in the Assessment Tool operating mode to combine the team’s checklist, vulnerability and recommendation entries into one record? A. Import Checklist B. Facility Executive Summary C. Switch to Master Database Operating Mode D. Export Checklist 15. Which of the following is NOT a minimum system requirement to install the database? A. Microsoft ‘ Access 2002 B. Microsoft ‘ Internet Explorer 7 or higher C. Microsoft ‘ Windows XP D. 256 MB RAM 16. When deleting an assessment record, the files and folders under that assessment are not deleted unless you select the Yes button to delete them. A. True B. False 17. The order of your user customized list within the risk matrices can be changed except for: A. The first ten of the Critical Infrastructure List B. The first 15 of the Critical Infrastructure List C. The first ten of the Threat / Hazard List D. The first ten of the Critical Function List 18. The Master Database mode of the database provides the organization the ability to search for vulnerabilities common to many assessed facilities. A. True B. False 19. Changes to the report handling markings can only be made by those logged on with administrator permission. A. True B. False 20. The Vulnerability Assessment Checklist function gives the Project Manager or an assessor the ability to view _________________ answers for individual checklist questions. A. Selected B. Up to five C. Up to ten D. All 21. Which of the following is NOT a file type that the database will recognize for the “Photos” and “GIS Portfolio” folders? A. .jpg B. .bmp C. .gif D. .tif 22. In the Other Reports Menu, the Administrator/Manager can search the Vulnerabilities and Recommendations/Remediations form, but he/she is limited to the assessment currently being viewed. A. True B. False 23. What are the proper steps to open the Assessment Tool? A. Left click on Start, Programs, Microsoft Office, and then Microsoft Office Access. B. Left click on Start, Programs, FEMA, and then FEMA Master Assessment Database. C. Left click on Start, Programs, and then the FEMA Master Assessment Database icon. D. Open a browser window and type ‘FEMA Master Assessment Database’ in the address bar. 24. One way you can get vulnerabilities and recommendations / remediations into the fields on the Vulnerabilities tab is to by clicking the “”Vuln?”” box on a site checklist Tab. A. True B. False 25. On the Rapid Visual Screening Data Collection screens, what is the function of the Red Flag check box? A. Indicates that the assessor does not know the answer at the time of the assessment B. Indicates that a response to a question may be a vulnerability requiring immediate attention C. Indicates that a comment has been made to support/explain a unique or extraordinary circumstance D. Clears the choice made for that single row