TRUE or FALSE: Most terrorist organizations have access to a limited range of weapons and tools, making a successful attack against critical infrastructure unlikely. A. TRUE

FALSE

Background checks should be: A. Avoided because of privacy and disclosure laws.

Avoided because of extreme costliness.

Conducted solely on those employees exhibiting suspicious behavior.

Conducted on all employees/contract personnel for operational security.

A well-designed and constructed levee: A. Must always breach once overtopped.

Is at least 40 feet in height.

Includes separation ditches to prevent water-logging.

Should exhibit regularly-spaced sand boils.

Select the TRUE statement regarding levees: A. The Federal Energy Regulatory Commission has jurisdiction over levees nationwide.

State governments cannot regulate or inventory levees within their State boundaries.

Energy generation is a primary purpose for construction of larger levees.

The total number of miles of levees in the United States is estimated at tens of thousands.

Possible indicators of attack plans involving explosives include: A. Thefts or seizures of large amounts of high-nitrate fertilizer.

Theft or seizures of significant numbers of large-caliber sniper weapons.

Sudden increase in local power outages.

People wearing clothing that is not consistent with the local weather.

TRUE OR FALSE: Site-related vulnerabilities are conditions or situations existing at a particular site that could be exploited by a terrorist or terrorist group to cause economic, physical, or bodily harm. A. TRUE

FALSE

TRUE or FALSE: Dams Sector owners and operators should maintain active relationships with communities and other critical infrastructure facilities located upstream and downstream of the dam, particularly those that could be directly impacted by its failure or disruption. A. TRUE

FALSE

Use of a facility by the public for recreation presents the potential for which type of site-related vulnerability? A. Access and access control

Cybersecurity

Emergency planning and preparedness

Operational security

Which common component of hydroelectric dams acts as a pressurized pipeline or shaft? A. Turbine

Penstock

Generator

Transformer

The component of a dam through which normal reservoir releases are made is known as the: A. Spillway

Piezometer

Grout Curtain

Filter Drain

States regulate _______ percent of the dams listed in the National Inventory of Dams. A. Between 80 and 90.

Between 40 and 50.

Between 60 and 70.

Between 20 and 30.

Select the FALSE statement from below. A. Two key elements in preparing a good report regarding a suspicious activity are accuracy and timeliness.

Physical descriptions of suspicious persons, such as their gender and height, should be included in a report whenever possible.

Suspicious activity reports should withhold the reporter’s contact information.

An effective suspicious activity report should withhold irrelevant details when a threat is immediate.

Most non-Federal hydroelectric facilities are subject to regulation by which of the following organizations? A. U.S. Army Corps of Engineers

Federal Energy Regulatory Commission

Association of State Dam Safety Officials

U.S. Department of Homeland Security

TRUE OR FALSE: Studies of past threats reveal that surveillance is the weakest link in terrorists’ attack cycles. A. TRUE

FALSE

Which of the following scenarios indicates a vulnerability directly related to industrial control systems? A. Large number of seasonal recreational visitors using mobile phones.

Procedures or mechanisms are not in place for the proper inspection of deliveries.

Software used in communications systems and backup control centers is outdated.

Facility personnel do not have access to night-vision equipment.

Surveillance of Dams Sector facilities may represent a difficult challenge to potential aggressors because of their: A. Proximity to first-responder locations.

Frequent drills and exercises.

Remote location.

Hours of operation.

A dam constructed of excavated natural materials using hydraulic fill, homogeneous earth or rock, or zoned earth and/or rock materials is known as a/an: A. Concrete dam.

Embankment dam.

Hydroelectric dam.

Masonry dam.

Interdependencies: A. Are not a source of vulnerability.

Are limited only to facilities located in remote areas.

Are associated only with facilities located upstream from the project.

Can be physical, geographic, or information-based.

Interdependency between critical infrastructures has dramatically increased in recent years due to their continuously growing reliance on: A. Agricultural products.

Telecommunications technology.

Water treatment plants.

Natural gas power generation.

Loss of life resulting from dam failure is considered to be what type of consequence? A. Human impact

Impact on public confidence

Impact on government capability

Economic impact