Skip to content

FEMA IS-525: Guardian Accord (GA) Workshop Answers

  1. What are the three diversity levels of terrorism threat in the United States? A. Source, Methods, and Targets
  2. Intent, Method, and Motive
  3. Intent, Capability, and History
  4. Source, Capability, and Target
  5. When is the classification of a terrorist attack classified as “unknown”? A. The complexity in a terror attack.
  6. When attacks usually require long-term recovery.
  7. There are fewer opportunities for detection before an attack occurs.
  8. When there are casualties but the condition of the victims’ bodies is so severe that the cause of death cannot be determined.
  9. When developing your continuity plan, it should also include point of contacts for your nearest: A. Fusion centers
  10. Joint terrorism task forces
  11. Protective security advisors
  12. Infra-Gard
  13. All of the Above
  14. In fighting terrorism both Local and State law enforcement play a very important role, however, their interface with Federal law enforcement is essential. A. TRUE
  15. FALSE
  16. ________________has significant trait and issues surrounding a terrorist attack based on terrorist knowledge of continuity plans, interception of communications, authenticity/integrity of communications, records, information, and insider connections. A. Interaction with law enforcement
  17. Operational and communication security
  18. Unknown timeline
  19. Malicious intent
  20. Continuity planning should account for the following facility issues: A. Security protocols on what types of information should NOT be communicated
  21. Operational security considerations pertaining to the visibility and public knowledge of an alternate facility location
  22. Security measures for staff who may be on travel during a terrorist incident
  23. Security measures for senior personnel who may be traveling
  24. In addition to the trend of terrorist attacks executed on smaller scales and with more frequency, we are also seeing more complexity in terrorist attacks. Thus, the implications of these complex attacks to continuity planning must be considered. A. TRUE
  25. FALSE
  26. Continuity planning should account for the following leadership issues: A. Interoperable communications
  27. Operational security considerations pertaining to the visibility and public knowledge of an alternate facility location
  28. Interaction with and response to the directions of first responders, law enforcement, and investigative personnel
  29. Operational security considerations of the continuity plan’s confidentiality and dissemination
  30. ________________ is the key effort to bring the private sector into the network against the fight on terrorism. A. Infra-Gard
  31. Protective security advisors
  32. Joint terrorism task forces
  33. Fusion centers
  34. Although continuity planning encourages testing, training, and exercises, it is difficult to simulate this type of attack when planning for a possible Planning and Critical Infrastructure Attack. A. TRUE
  35. FALSE
  36. Eight signs of a terrorist attack that the counterterrorism has identified are Surveillance, Elicitation, Tests of security, Funding, Acquiring supplies, Impersonation, Rehearsal, and Deployment. A. TRUE
  37. FALSE
  38. What methods of terrorism can have implications for continuity planning? A. Agro-terrorism
  39. Corruption
  40. Espionage or infiltration
  41. Both A and C
  42. All of the Above
  43. What are the two collaborative anti-terrorist organizations that operate under local offices of the Federal Bureau of Investigation? A. Joint terrorism task forces and Protective security
  44. Fusion centers and Infra-Gard
  45. Protective security advisors and Fusion centers
  46. Infra-Gard and Joint terrorism task forces
  47. When planning for a possible attack on densely populated areas, you must consider implications for: A. Human Capital
  48. Sucession
  49. Communications
  50. All of the Above
  51. ________________ facilitates information sharing within the law enforcement community to combat multijurisdictional criminal activities and conspiracies. A. Federal Protective Service Portal
  52. DHS Daily Infrastructure Report
  53. Law Enforcement Online
  54. Regional Information Sharing Systems Network
  55. ________________ are operational organizations focused on the terrorist threat. A. Infra-Gard
  56. Protective security advisors
  57. Joint terrorism task forces
  58. Fusion centers
  59. ________________has significant trait and issues surrounding a terrorist attack based on increased communication to and from law enforcement. A. Interaction with law enforcement
  60. Operational and communication security
  61. Unknown timeline
  62. Malicious intent
  63. ________________ are another type of joint effort in the fight against terrorism, but they are intelligence consortiums. A. Infra-Gard
  64. Protective security advisors
  65. Joint terrorism task forces
  66. Fusion centers
  67. When planning for a possible attack on critical infrastructure, you must consider implications for: A. Human Capital
  68. Reconstitution
  69. Congressional buildings
  70. All of the Above
  71. Both A and B
  72. Department of State, National Counterterrorism Center, and Branches of the Department of Defense all belong to the U.S. intelligence community? A. TRUE
  73. FALSE
  74.