FEMA IS-525: Guardian Accord (GA) Workshop Answers What are the three diversity levels of terrorism threat in the United States? A. Source, Methods, and TargetsIntent, Method, and MotiveIntent, Capability, and HistorySource, Capability, and Target When is the classification of a terrorist attack classified as “unknown”? A. The complexity in a terror attack.When attacks usually require long-term recovery.There are fewer opportunities for detection before an attack occurs.When there are casualties but the condition of the victims’ bodies is so severe that the cause of death cannot be determined. When developing your continuity plan, it should also include point of contacts for your nearest: A. Fusion centersJoint terrorism task forcesProtective security advisorsInfra-GardAll of the Above In fighting terrorism both Local and State law enforcement play a very important role, however, their interface with Federal law enforcement is essential. A. TRUEFALSE ________________has significant trait and issues surrounding a terrorist attack based on terrorist knowledge of continuity plans, interception of communications, authenticity/integrity of communications, records, information, and insider connections. A. Interaction with law enforcementOperational and communication securityUnknown timelineMalicious intent Continuity planning should account for the following facility issues: A. Security protocols on what types of information should NOT be communicatedOperational security considerations pertaining to the visibility and public knowledge of an alternate facility locationSecurity measures for staff who may be on travel during a terrorist incidentSecurity measures for senior personnel who may be traveling In addition to the trend of terrorist attacks executed on smaller scales and with more frequency, we are also seeing more complexity in terrorist attacks. Thus, the implications of these complex attacks to continuity planning must be considered. A. TRUEFALSE Continuity planning should account for the following leadership issues: A. Interoperable communicationsOperational security considerations pertaining to the visibility and public knowledge of an alternate facility locationInteraction with and response to the directions of first responders, law enforcement, and investigative personnelOperational security considerations of the continuity plan’s confidentiality and dissemination ________________ is the key effort to bring the private sector into the network against the fight on terrorism. A. Infra-GardProtective security advisorsJoint terrorism task forcesFusion centers Although continuity planning encourages testing, training, and exercises, it is difficult to simulate this type of attack when planning for a possible Planning and Critical Infrastructure Attack. A. TRUEFALSE Eight signs of a terrorist attack that the counterterrorism has identified are Surveillance, Elicitation, Tests of security, Funding, Acquiring supplies, Impersonation, Rehearsal, and Deployment. A. TRUEFALSE What methods of terrorism can have implications for continuity planning? A. Agro-terrorismCorruptionEspionage or infiltrationBoth A and CAll of the Above What are the two collaborative anti-terrorist organizations that operate under local offices of the Federal Bureau of Investigation? A. Joint terrorism task forces and Protective securityFusion centers and Infra-GardProtective security advisors and Fusion centersInfra-Gard and Joint terrorism task forces When planning for a possible attack on densely populated areas, you must consider implications for: A. Human CapitalSucessionCommunicationsAll of the Above ________________ facilitates information sharing within the law enforcement community to combat multijurisdictional criminal activities and conspiracies. A. Federal Protective Service PortalDHS Daily Infrastructure ReportLaw Enforcement OnlineRegional Information Sharing Systems Network ________________ are operational organizations focused on the terrorist threat. A. Infra-GardProtective security advisorsJoint terrorism task forcesFusion centers ________________has significant trait and issues surrounding a terrorist attack based on increased communication to and from law enforcement. A. Interaction with law enforcementOperational and communication securityUnknown timelineMalicious intent ________________ are another type of joint effort in the fight against terrorism, but they are intelligence consortiums. A. Infra-GardProtective security advisorsJoint terrorism task forcesFusion centers When planning for a possible attack on critical infrastructure, you must consider implications for: A. Human CapitalReconstitutionCongressional buildingsAll of the AboveBoth A and B Department of State, National Counterterrorism Center, and Branches of the Department of Defense all belong to the U.S. intelligence community? A. TRUEFALSE Previous Next