Skip to content
FEMA Test Answers
Search for...
Home
Answers
Contact
FEMA Test Answers
Navigation Menu
Navigation Menu
Home
Answers
Contact
Search for...
FEMA IS-525: Guardian Accord (GA) Workshop Answers
What are the three diversity levels of terrorism threat in the United States?
A. Source, Methods, and Targets
Intent, Method, and Motive
Intent, Capability, and History
Source, Capability, and Target
When is the classification of a terrorist attack classified as “unknown”?
A. The complexity in a terror attack.
When attacks usually require long-term recovery.
There are fewer opportunities for detection before an attack occurs.
When there are casualties but the condition of the victims’ bodies is so severe that the cause of death cannot be determined.
When developing your continuity plan, it should also include point of contacts for your nearest:
A. Fusion centers
Joint terrorism task forces
Protective security advisors
Infra-Gard
All of the Above
In fighting terrorism both Local and State law enforcement play a very important role, however, their interface with Federal law enforcement is essential.
A. TRUE
FALSE
________________has significant trait and issues surrounding a terrorist attack based on terrorist knowledge of continuity plans, interception of communications, authenticity/integrity of communications, records, information, and insider connections.
A. Interaction with law enforcement
Operational and communication security
Unknown timeline
Malicious intent
Continuity planning should account for the following facility issues:
A. Security protocols on what types of information should NOT be communicated
Operational security considerations pertaining to the visibility and public knowledge of an alternate facility location
Security measures for staff who may be on travel during a terrorist incident
Security measures for senior personnel who may be traveling
In addition to the trend of terrorist attacks executed on smaller scales and with more frequency, we are also seeing more complexity in terrorist attacks. Thus, the implications of these complex attacks to continuity planning must be considered.
A. TRUE
FALSE
Continuity planning should account for the following leadership issues:
A. Interoperable communications
Operational security considerations pertaining to the visibility and public knowledge of an alternate facility location
Interaction with and response to the directions of first responders, law enforcement, and investigative personnel
Operational security considerations of the continuity plan’s confidentiality and dissemination
________________ is the key effort to bring the private sector into the network against the fight on terrorism.
A. Infra-Gard
Protective security advisors
Joint terrorism task forces
Fusion centers
Although continuity planning encourages testing, training, and exercises, it is difficult to simulate this type of attack when planning for a possible Planning and Critical Infrastructure Attack.
A. TRUE
FALSE
Eight signs of a terrorist attack that the counterterrorism has identified are Surveillance, Elicitation, Tests of security, Funding, Acquiring supplies, Impersonation, Rehearsal, and Deployment.
A. TRUE
FALSE
What methods of terrorism can have implications for continuity planning?
A. Agro-terrorism
Corruption
Espionage or infiltration
Both A and C
All of the Above
What are the two collaborative anti-terrorist organizations that operate under local offices of the Federal Bureau of Investigation?
A. Joint terrorism task forces and Protective security
Fusion centers and Infra-Gard
Protective security advisors and Fusion centers
Infra-Gard and Joint terrorism task forces
When planning for a possible attack on densely populated areas, you must consider implications for:
A. Human Capital
Sucession
Communications
All of the Above
________________ facilitates information sharing within the law enforcement community to combat multijurisdictional criminal activities and conspiracies.
A. Federal Protective Service Portal
DHS Daily Infrastructure Report
Law Enforcement Online
Regional Information Sharing Systems Network
________________ are operational organizations focused on the terrorist threat.
A. Infra-Gard
Protective security advisors
Joint terrorism task forces
Fusion centers
________________has significant trait and issues surrounding a terrorist attack based on increased communication to and from law enforcement.
A. Interaction with law enforcement
Operational and communication security
Unknown timeline
Malicious intent
________________ are another type of joint effort in the fight against terrorism, but they are intelligence consortiums.
A. Infra-Gard
Protective security advisors
Joint terrorism task forces
Fusion centers
When planning for a possible attack on critical infrastructure, you must consider implications for:
A. Human Capital
Reconstitution
Congressional buildings
All of the Above
Both A and B
Department of State, National Counterterrorism Center, and Branches of the Department of Defense all belong to the U.S. intelligence community?
A. TRUE
FALSE
Previous
Next