Ld 43. Emergency Management

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Alvarez18
A
Alvarez18
Community Contributor
Quizzes Created: 1 | Total Attempts: 224
| Attempts: 224 | Questions: 83
Please wait...
Question 1 / 83
0 %
0/100
Score 0/100
1. Weapons of Mass Destruction (WMD) is any weapon that is designed or intended to cause death or serious bodily injury through the release, dissemination, or impact of toxic or poisonous chemical, or their precursors, or radiation at any level dangerous to human life. Any weapon involving a disease organism. (Title 18 US Code)

Explanation

The statement accurately defines Weapons of Mass Destruction (WMD) as any weapon designed to cause death or serious injury through the release or impact of toxic chemicals, radiation, or disease organisms. This definition aligns with Title 18 US Code, which governs criminal acts and offenses in the United States. Therefore, the answer "True" is correct.

Submit
Please wait...
About This Quiz
Ld 43. Emergency Management - Quiz

LD 43. Emergency Management quiz evaluates knowledge on terrorism, hazardous materials handling, WMD categories, and terrorist groups. It aims to enhance readiness and safety measures, crucial for professionals... see morein emergency and public safety roles. see less

2. Terrorists tend to look for targets that are high profile, have a symbolism, will cause mass casualties and have an economic impact.

Explanation

Terrorists often seek targets that are high profile and have symbolic value, as these can generate widespread attention and fear. Additionally, they aim for targets that will cause mass casualties, maximizing the impact of their actions. Economic impact is also a consideration, as attacking key industries or infrastructure can disrupt economies and create further chaos. Therefore, the statement that terrorists tend to look for targets with these characteristics is true.

Submit
3. What are the four key elements in defining terrorism?

Explanation

The four key elements in defining terrorism are the unlawful use of force or violence against persons or property, with the intention to intimidate or coerce a government or civilian population, in order to further political or social objectives.

Submit
4. List three factor terrorists use in selecting a target?

Explanation

Terrorists consider the attractiveness of a target, the potential for success, and the potential for avoiding identification and capture when selecting their targets. These factors play a crucial role in their decision-making process. The attractiveness of a target refers to its perceived value or significance to the terrorist's cause. The potential for success considers the likelihood of achieving their objectives without being thwarted. Lastly, the potential for avoiding identification and capture involves the ability to carry out the attack and escape without being apprehended by authorities. All of these factors are important considerations for terrorists when selecting a target.

Submit
5. Decontamination is the process of removing gross contaminants from a person, object or area by either destroying, making harmless, neutralizing, or removing the hazard?

Explanation

Decontamination is indeed the process of removing gross contaminants from a person, object, or area by either destroying, making harmless, neutralizing, or removing the hazard. This process is crucial in preventing the spread of harmful substances and ensuring the safety and well-being of individuals and the environment.

Submit
6. What are the four routes of exposure that chemical, biological, and radiological materials can use to enter the body?

Explanation

The correct answer is Inhalation, Injection, Ingestion and Absorption. These are the four routes of exposure that chemical, biological, and radiological materials can use to enter the body. Inhalation refers to the intake of substances through breathing, injection refers to the direct entry of substances into the bloodstream through a needle or syringe, ingestion refers to the intake of substances through the mouth, and absorption refers to the penetration of substances through the skin or mucous membranes.

Submit
7. International terrorism is usually perpetrated against the United States by Individuals and/or Groups. They are usually based and/or directed by individuals, groups or countries outside the United States. 

Explanation

International terrorism is typically carried out against the United States by individuals and/or groups who are based outside the country or directed by individuals, groups, or countries outside the United States. This suggests that acts of terrorism committed against the United States often involve foreign actors or have connections to foreign entities.

Submit
8. The TLO is the agency point-person for the focusing of terrorism-related information and the dissemination of that information both within and outside the organization. 

Explanation

The statement is true because it states that the TLO (Terrorism Liaison Officer) is responsible for gathering and sharing terrorism-related information within and outside the organization. This implies that the TLO acts as a central point of contact for handling and distributing such information, indicating a crucial role in counterterrorism efforts.

Submit
9.  Information is anything we know about any person, place or thing, from any source and intelligence is information which has gone through intelligence cycle. 

Explanation

The statement is true because it correctly defines information as any knowledge we have about a person, place, or thing from any source. It also states that intelligence is a type of information that has gone through the intelligence cycle. This implies that intelligence is a processed and analyzed form of information, which is accurate.

Submit
10.  Establishing a perimeter at a WMD is the on-scene officers were responsibility.

Explanation

The given statement is true. Establishing a perimeter at a WMD (Weapons of Mass Destruction) is indeed the responsibility of on-scene officers. When a potential WMD threat is identified, it is crucial to establish a secure perimeter around the area to prevent unauthorized access and ensure the safety of the surrounding population. On-scene officers are trained to assess the situation, coordinate with relevant agencies, and establish a perimeter to contain the threat and mitigate any potential harm.

Submit
11. NIMS was created to integrate effective practices in emergency  preparedness and response into a comprehensive national framework for INCIDENT MANAGEMENT. 

Explanation

NIMS, or the National Incident Management System, was indeed created to integrate effective practices in emergency preparedness and response into a comprehensive national framework for incident management. This system provides a standardized approach to managing incidents and allows different agencies and organizations to work together seamlessly during emergencies. By implementing NIMS, the coordination and effectiveness of emergency response efforts are enhanced, leading to better outcomes in managing incidents.

Submit
12. Common methods, motivations and tactics for terrorists include social and political motivations

Explanation

Terrorists commonly employ social and political motivations as methods, motivations, and tactics for their actions. These motivations can range from seeking societal change to political power or influence. By exploiting social and political grievances, terrorists aim to create fear and chaos, disrupt governments, and achieve their desired objectives. This makes the statement "Common methods, motivations, and tactics for terrorists include social and political motivations" true.

Submit
13. Methods to improve methods of prevention and deterrence law enforcement must develop include, but not limited to the following:

Explanation

The correct answer is "all of the above" because the question asks for methods to improve prevention and deterrence in law enforcement, and all the options listed (adopting a new mindset, changing the patrol mindset, recognizing suspicious activity, reporting suspicious activity) are valid methods that law enforcement can utilize to achieve this goal. By adopting a new mindset, law enforcement can adapt to new challenges and approaches. Changing the patrol mindset can help officers be more proactive and vigilant. Recognizing and reporting suspicious activity allows law enforcement to take necessary actions and prevent potential crimes.

Submit
14. What are the six components of NIMS?

Explanation

The correct answer is "all of the above". This means that all six components mentioned in the question (Command and Management, Preparedness, Resource Management, Communication and Information Management, Supporting Technologies, and On-going Management and Maintenance) are part of NIMS. NIMS, or the National Incident Management System, is a standardized approach to incident management that provides a framework for coordinating and managing emergency responses. Each of these components plays a crucial role in ensuring effective and efficient incident management.

Submit
15. Secondary devices, Secondary contamination, and Suspects are potential dangers for first responders.

Explanation

First responders face potential dangers from secondary devices, which are additional explosive devices that may be present at the scene. Secondary contamination refers to the risk of being exposed to hazardous materials or substances that may be present at the scene. Suspects pose a potential danger as they may be armed or pose a threat to the safety of the first responders. Therefore, the statement that secondary devices, secondary contamination, and suspects are potential dangers for first responders is true.

Submit
16. The two kinds of explosives are high and low explosives.

Explanation

The statement is true because there are indeed two kinds of explosives: high explosives and low explosives. High explosives are characterized by their ability to detonate rapidly and produce a large amount of energy, while low explosives burn at a slower rate and release energy gradually. These two categories of explosives have different properties and uses, with high explosives typically being used in military applications and low explosives used in industries such as mining and construction.

Submit
17. Toxic agents include: 

Explanation

Toxic agents refer to substances that can cause harm or damage to living organisms. The given options, including nerve agents, blister agents, choking agents, and blood agents, all fall under the category of toxic agents. Nerve agents affect the nervous system, blister agents cause skin and tissue damage, choking agents interfere with breathing, and blood agents affect the blood's ability to carry oxygen. Therefore, the correct answer is "all of the above" as all the listed options are toxic agents.

Submit
18.  Basic general law enforcement actions/responsibilities at a WMD incident scene may include which of the following

Explanation

The basic general law enforcement actions/responsibilities at a WMD incident scene include isolation, identification, notification, protection/mitigation, documentation, and transition. Isolation involves securing the area to prevent unauthorized access and protect the public. Identification involves determining the nature of the incident and the hazardous materials involved. Notification involves alerting relevant authorities and agencies about the incident. Protection/mitigation involves taking measures to minimize the impact of the incident and protect responders and the public. Documentation involves recording all relevant information and evidence related to the incident. Transition involves handing over the scene to appropriate agencies for further investigation or cleanup. Therefore, all of the above actions/responsibilities are part of basic law enforcement responsibilities at a WMD incident scene.

Submit
19. The five phases of a WMD incident are:> Prevention and Deterrence, Notification, Response, Restoration and Recovery Phase 

Explanation

The five phases of a WMD incident are prevention and deterrence, notification, response, restoration, and recovery. These phases represent the different stages in managing a WMD incident, starting from measures to prevent and deter such incidents, followed by notifying relevant authorities and responding to the incident. The restoration phase involves restoring normalcy and addressing any damage caused, while the recovery phase focuses on long-term recovery efforts and learning from the incident. This answer is correct as it accurately identifies the five phases of a WMD incident.

Submit
20. What are the five categories of WMD as related in the B-NICE acronym?

Explanation

The correct answer is Biological, Nuclear, Incendiary, Chemical, and Explosive. This acronym, B-NICE, is used to categorize the five types of weapons of mass destruction. Biological refers to biological agents or toxins that can cause harm to humans, animals, or plants. Nuclear refers to nuclear weapons or devices that use nuclear reactions to release a large amount of energy. Incendiary refers to weapons or devices that are designed to start fires. Chemical refers to chemical agents or substances that can cause harm through their toxic properties. Explosive refers to weapons or devices that use explosive materials to cause damage and destruction.

Submit
21. Components of an incendiary device is an: ignition source, container for combustible filler material, combustible filler

Explanation

The given statement is true. An incendiary device typically consists of three main components: an ignition source, a container for combustible filler material, and the combustible filler itself. The ignition source is responsible for initiating the combustion process, while the container holds the combustible filler material, which is designed to burn rapidly and create a fire or explosion. Therefore, all three components are necessary for an incendiary device to function properly.

Submit
22. Intelligence resources accessible to a patrol officer are: 

Explanation

The correct answer is "all of the above" because the question asks about the intelligence resources accessible to a patrol officer, and all three options listed (CSWC, TSC, and JTTF) are intelligence resources that a patrol officer can access.

Submit
23. STTAC provides timely collection, coordination, analysis, investigation, and dissemination of criminal intelligence / information regarding terrorist activity to federal, state, and local law enforcement agencies. 

Explanation

The statement is true. STTAC (State and Major Urban Area Fusion Centers) is responsible for collecting, coordinating, analyzing, investigating, and disseminating criminal intelligence and information related to terrorist activities to various law enforcement agencies at the federal, state, and local levels. This helps in ensuring a timely and effective response to potential threats and enhances overall security measures.

Submit
24. The components of SEMS are: 

Explanation

The components of SEMS include the Incident Command System (ICS), Operational Area Concepts, Mutual Aid Agreements/Plans, and Multi-Agency Coordination. These components work together to ensure effective emergency management. The ICS provides a standardized structure for managing incidents, the Operational Area Concepts help in coordinating resources and response efforts within a defined geographic area, Mutual Aid Agreements/Plans facilitate the sharing of resources and assistance between different jurisdictions, and Multi-Agency Coordination promotes coordination and collaboration among multiple agencies involved in emergency response. Therefore, the correct answer is "all of the above".

Submit
25. How are Incendiary devices deployed?

Explanation

Incendiary devices can be deployed in various ways. They can be placed in a stationary position, such as on the ground or attached to a structure. They can also be thrown by hand, allowing for quick and flexible deployment. Additionally, some incendiary devices are self-propelled, meaning they can be launched or propelled towards a target. Therefore, all of the above options are correct as they represent different methods of deploying incendiary devices.

Submit
26. A pathway by which a hazardous material can enter the human body is through the:

Explanation

Hazardous materials can enter the human body through various pathways, including the skin, lungs, and eyes. When in contact with the skin, certain chemicals can be absorbed and enter the bloodstream. Inhaling hazardous substances can lead to their absorption in the lungs, where they can be transported throughout the body. Additionally, the eyes are a direct entry point for hazardous materials, as they are highly sensitive and can easily absorb substances. Therefore, all of the above options are pathways through which hazardous materials can enter the human body.

Submit
27. Isolation, Identification, Notification, Protection/Mitigation, Documentation and Transition are categories of basic law enforcement actions and responsibilities at a WMD incident scene.

Explanation

The given statement is true. Isolation, Identification, Notification, Protection/Mitigation, Documentation, and Transition are indeed categories of basic law enforcement actions and responsibilities at a WMD incident scene. These categories outline the necessary steps and protocols that law enforcement personnel should follow when responding to a WMD (Weapons of Mass Destruction) incident to effectively manage the situation and ensure the safety of the public.

Submit
28. What is the purpose of ICS?

Explanation

ICS, or Incident Command System, serves multiple purposes. It is designed to coordinate on-scene emergency operations, ensuring that different agencies and personnel work together efficiently. It also facilitates the coordination of multi-agency responses, allowing for effective communication and collaboration among various organizations involved in an incident. Additionally, ICS helps establish a temporary or permanent command structure at the scene, ensuring clear lines of authority and decision-making. Therefore, the correct answer is "All of the above".

Submit
29. The California State Warning Center (CSWC) is the  state "clearinghouse" for terrorist related information. 

Explanation

The California State Warning Center (CSWC) serves as the central hub for gathering and disseminating information related to terrorism in the state. It acts as a "clearinghouse" by collecting and analyzing intelligence from various sources and then sharing it with relevant agencies and authorities. This helps in coordinating efforts to prevent and respond to terrorist activities in California.

Submit
30. The Louisiana State University (LSU), WMD Response Guidebook is designed to assist First Responders in making initial assessments of all types of WMD incidents and to determine what type of WMD event may have occurred.  

Explanation

The Louisiana State University (LSU), WMD Response Guidebook is designed to assist First Responders in making initial assessments of all types of WMD incidents and to determine what type of WMD event may have occurred. This statement is true because the guidebook is specifically created to provide guidance and support to first responders in dealing with WMD incidents and helping them identify the nature of the event.

Submit
31. The Emergency Response Guide (ERG) was designed primarily to identify hazards and emergency response considerations associated with the transportation of hazardous materials. 

Explanation

The Emergency Response Guide (ERG) serves as a tool to identify hazards and provide guidance for emergency responders in situations involving the transportation of hazardous materials. It includes information on potential risks, protective measures, and response procedures. By providing this information, the ERG helps emergency responders make informed decisions and take appropriate actions to mitigate the risks associated with hazardous materials incidents. Therefore, the statement that the ERG was designed primarily for identifying hazards and emergency response considerations associated with the transportation of hazardous materials is true.

Submit
32. Critical Infrastructures are defined as those systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economy security, national public health or safety, or combination of those matters. 

Explanation

Critical infrastructures are defined as systems and assets, both physical and virtual, that are crucial to the United States. The incapacity or destruction of these systems and assets would have a severe impact on national security, the national economy, public health, and safety, or a combination of these factors. This statement accurately describes the definition of critical infrastructures, making the answer true.

Submit
33. A Water plant would be considered a critical infrastructure in the U.S.?

Explanation

A water plant would be considered a critical infrastructure in the U.S. because it plays a vital role in providing clean and safe drinking water to the population. Without a functioning water plant, there would be a significant impact on public health and safety. It is essential for daily life activities such as drinking, cooking, and sanitation. Additionally, water plants are crucial for industries, agriculture, and firefighting. Therefore, considering a water plant as critical infrastructure is necessary to ensure the well-being and functioning of society.

Submit
34. Which of the following is not one of the 12 "Building Blocks to a Terrorist Attack"?

Explanation

Determining Mecca's direction is not one of the 12 "Building Blocks to a Terrorist Attack" because it is not directly related to planning or executing a terrorist attack. The other options - Weapon Selection, Target Selection, and Fundraising - are all crucial components in the process of carrying out a terrorist attack. Determining Mecca's direction, on the other hand, is a religious practice that is important for Muslims during prayer, but it does not directly contribute to planning or executing a terrorist act.

Submit
35. Inhalation of hazardous materials is the leading cause of injuries to  first responders

Explanation

Inhalation of hazardous materials is indeed a leading cause of injuries to first responders. When first responders are exposed to hazardous materials, such as toxic gases or chemicals, through inhalation, it can lead to serious health issues and injuries. These materials can cause respiratory problems, chemical burns, and even death in extreme cases. Therefore, it is crucial for first responders to take necessary precautions and use appropriate protective gear to minimize the risk of inhalation injuries.

Submit
36. SEMS Incorporates ICS. 

Explanation

The statement "SEMS Incorporates ICS" is true. SEMS stands for Safety and Environmental Management System, which is a set of regulations and guidelines developed by the Bureau of Safety and Environmental Enforcement (BSEE) to ensure safe and environmentally responsible offshore operations. ICS, on the other hand, stands for Incident Command System, which is a standardized management system used to organize and coordinate emergency response efforts. SEMS incorporates ICS principles and practices to effectively respond to and manage emergencies in offshore operations. Therefore, the correct answer is True.

Submit
37. Features of ICS are:Command, Organization , Planning , Logistics, Finance 

Explanation

The given statement is true. The features of ICS include command, organization, planning, logistics, and finance. These features are essential for effective management and coordination during emergency response and incident management situations. Command ensures clear leadership and decision-making, organization establishes a structured framework for coordination, planning helps in setting objectives and strategies, logistics deals with resources and support, and finance manages the financial aspects of the response. Overall, these features contribute to the efficient and coordinated response to incidents.

Submit
38. The Terrorism Screening Center (TSC) can allow an officer access to its resources if he/she runs an individual locally first, then through the CSWC/TSC for terrorist related activity? 

Explanation

The explanation for the correct answer is that the Terrorism Screening Center (TSC) can grant access to its resources to an officer if they first run an individual's information locally and then through the CSWC/TSC for any terrorist-related activity. This two-step process ensures that the officer checks both local databases and the centralized TSC database to identify any potential terrorist threats. By following this procedure, the officer can effectively utilize the resources provided by the TSC to enhance national security.

Submit
39. SEMS Incorporates ICS. 

Explanation

SEMS (Standardized Emergency Management System) is a comprehensive framework that provides a common structure and terminology for managing emergencies. ICS (Incident Command System) is a key component of SEMS, which establishes a standardized organizational structure and management system during incidents. Therefore, it is correct to say that SEMS incorporates ICS, as ICS is an integral part of SEMS.

Submit
40. Which position is the only one that is always staffed in ICS operations? 

Explanation

The Incident Commander is the only position that is always staffed in ICS operations. The Incident Commander is responsible for overall management of the incident and making strategic decisions. They have the authority to establish objectives, make resource allocations, and coordinate with other agencies. This position ensures that there is always someone in charge and provides a clear chain of command during an incident.

Submit
41.   What does the acronym R.A.I.N. mean as it relates to first responders?

Explanation

The acronym R.A.I.N. stands for Recognize, Avoid, Isolate, and Notify. This acronym is used to guide first responders in their actions during emergency situations. First, they need to recognize the potential hazards or dangers present in the situation. Then, they should try to avoid these hazards and find a safe location. Next, they should isolate the area or individuals affected to prevent further harm. Finally, they need to notify the appropriate authorities or personnel to ensure a coordinated response and provide necessary assistance.

Submit
42. What two biological agents are most likely identified to be used by terrorist groups?

Explanation

Anthrax and Ricin are the most likely biological agents to be used by terrorist groups. Anthrax is a deadly bacterial infection that can be spread through inhalation, ingestion, or contact with the skin. It can cause severe illness and even death. Ricin, on the other hand, is a highly toxic substance derived from castor beans. It can be used as a weapon through inhalation, ingestion, or injection, and can cause organ failure and death. Both Anthrax and Ricin have been used in past terrorist attacks and are considered significant threats due to their potential for mass casualties.

Submit
43. The Primary features of ICS are: 

Explanation

The correct answer is "All of the above" because all of the listed features - Common Terminology, Modular Organization, Span of Control, and Integrated Communications - are primary features of ICS. Common Terminology ensures clear and consistent communication, Modular Organization allows for efficient allocation of resources, Span of Control establishes manageable supervisory ratios, and Integrated Communications enables effective information sharing among responders. Therefore, all of these features are essential components of the Incident Command System (ICS).

Submit
44. One goal of Counter-terrorism is to prevent deter terrorist activity by changing the patrol officers mindset? 

Explanation

Counter-terrorism aims to prevent and deter terrorist activities by various means, including changing the mindset of patrol officers. By training patrol officers to be vigilant and proactive in identifying and responding to potential threats, they can play a crucial role in preventing and deterring terrorist acts. This involves instilling a strong sense of awareness, preparedness, and the ability to recognize suspicious behavior or indicators of terrorism. By changing the patrol officers' mindset, they become a valuable frontline defense against terrorism, helping to keep communities safe.

Submit
45. Which of the following is considered a Critical Asset?

Explanation

All of the options listed (Agriculture, Emergency Services, Postal and Shipping) are considered critical assets. Critical assets are those resources or systems that are essential for the functioning of a society or organization. Agriculture is critical for food production, emergency services are crucial for public safety and well-being, and postal and shipping services are vital for communication and the movement of goods. Therefore, all three options are considered critical assets.

Submit
46. According to the FBI, Terrorism is defined as the unlawful use of force or violence against persons or property to intimidate or coerce  a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. 

Explanation

The given statement is true. The FBI defines terrorism as the unlawful use of force or violence to intimidate or coerce a government, civilian population, or any segment thereof, in furtherance of political or social objectives. This definition encompasses the key elements of terrorism, including the use of violence, the intention to intimidate or coerce, and the pursuit of political or social goals.

Submit
47. Incapacitating agents include a variety of chemical irritants familiar to law enforcement personnel. 

Explanation

Incapacitating agents, such as chemical irritants, are indeed familiar to law enforcement personnel. These agents are commonly used to temporarily disable or incapacitate individuals during law enforcement operations. Law enforcement officers are trained in the use and effects of these chemical irritants in order to effectively and safely carry out their duties. Therefore, the statement is true.

Submit
48. The Intelligence Cycle, which is ongoing and never-ending, includes which of the following?

Explanation

The Intelligence Cycle is a continuous process that involves various stages. It begins with understanding what information needs to be collected, followed by the planning and direction of the collection phase. The collected information then goes through the processing phase to analyze and interpret it. Finally, there is the evaluation, use, and feedback phase where the intelligence gathered is assessed and utilized. Therefore, the correct answer is "all of the above" as it encompasses all the stages mentioned in the question.

Submit
49. Which of the following group is not a Domestic terrorism group?

Explanation

Al Qaeda is not considered a domestic terrorism group because it is an international terrorist organization. While the other groups listed may have engaged in acts of domestic terrorism within their respective countries, Al Qaeda is known for its global reach and involvement in numerous international attacks, making it distinct from domestic-focused groups.

Submit
50. What is the relationship between the State Warning Center and the Joint Terrorism Task Forces?

Explanation

The State Warning Center and the Joint Terrorism Task Forces have a relationship where the State Warning Center serves as a clearing house for terrorist-related information and is operated by the FBI. This means that the State Warning Center acts as a central hub for gathering, analyzing, and disseminating information related to terrorist activities, and it is under the supervision and management of the FBI. The center plays a crucial role in coordinating efforts to prevent and respond to potential terrorist threats.

Submit
51. International terrorist groups are categorized as State sponsored, Formalized and Loosely Affiliated International Radical Extremists (Self-maintained moving towards Anonymous). 

Explanation

International terrorist groups can be categorized into three types: state-sponsored, formalized, and loosely affiliated international radical extremists. State-sponsored groups are supported and funded by governments, formalized groups have a clear structure and hierarchy, and loosely affiliated international radical extremists are self-maintained and moving towards anonymity. This categorization helps in understanding the different dynamics and motivations behind international terrorism. Therefore, the correct answer is true.

Submit
52. Nuclear WMD have advantages because: 

Explanation

Nuclear weapons of mass destruction (WMD) have several advantages. Firstly, they can create mass casualties, causing significant harm and loss of life. Additionally, they are difficult to counter due to their destructive power and ability to bypass conventional defenses. Moreover, nuclear weapons have the potential to devastate both individuals and infrastructures, causing widespread damage and disruption. Therefore, all of the mentioned options - creating mass casualties, difficult counter measures, and potential devastation to individuals and infrastructures - are advantages of nuclear WMD.

Submit
53.  Blister agents are also called "vesicants". 

Explanation

Blister agents are indeed called "vesicants". This term is used to describe chemical substances that cause severe skin, eye, and respiratory damage upon exposure. These agents are named as such because they cause the formation of blisters on the skin, which is a characteristic symptom of their toxicity. Therefore, the statement is true.

Submit
54. The three types of incendiary device activators are: mechanical, chemical ,electrical

Explanation

The statement accurately states that the three types of incendiary device activators are mechanical, chemical, and electrical. This means that these three methods can be used to activate or trigger an incendiary device, such as a bomb or explosive. It is important to be aware of these different types of activators in order to understand the potential dangers and risks associated with incendiary devices.

Submit
55. A WMD that has disease-causing organisms or the toxins produced by living organisms.

Explanation

The correct answer is biological. This is because a WMD that contains disease-causing organisms or the toxins produced by living organisms falls under the category of biological weapons. These weapons can be used to spread diseases and cause mass casualties. Chemical weapons involve the use of toxic chemicals, nuclear weapons involve the use of nuclear reactions, and incendiary weapons involve the use of fire or explosives. However, only biological weapons specifically involve disease-causing organisms or their toxins.

Submit
56. The KKK is a form of right wing terrorist group.

Explanation

The KKK, or the Ku Klux Klan, is indeed a form of right-wing terrorist group. The KKK originated in the United States in the late 1860s and has a history of promoting white supremacy, racism, and violence against minority groups, particularly African Americans. They have been involved in numerous acts of terrorism, including lynchings, bombings, and intimidation tactics, aimed at instilling fear and maintaining white dominance. Their extremist ideology and violent actions classify them as a right-wing terrorist organization.

Submit
57. How is terrorist activity classified?

Explanation

not-available-via-ai

Submit
58.  Which terrorist groups attempt, through their violent criminal actions, to force members of society to change their attitudes about issues they considered important to THEM.

Explanation

Special interest terrorist groups use violent criminal actions to coerce society into changing their attitudes about issues they consider important to them. Unlike religious or political terrorist groups, special interest groups focus on specific causes or grievances rather than broader religious or political ideologies. They often target specific industries, government agencies, or organizations that they believe are contributing to or benefiting from the issue they are fighting against. Their goal is to generate fear, disrupt normal functioning, and exert pressure on society to bring about the desired change.

Submit
59. The five functional areas of the Incident Command System (ICS) are

Explanation

The correct answer is Command, Operations, Planning, Logistics, and Finance. These five functional areas are the key components of the Incident Command System (ICS), which is a standardized approach to managing incidents. The Command function is responsible for overall management and decision-making, Operations deals with tactical activities and resource coordination, Planning involves developing strategies and gathering information, Logistics handles resource support and supply, and Finance manages financial aspects such as cost tracking and reimbursement. Together, these functional areas ensure effective incident management and coordination.

Submit
60. Numerous sick or dead victims, reports of strange odors, a visible vapor cloud, dead plants, and dead or dying animals are indicators of what WMD. 

Explanation

The given indicators such as numerous sick or dead victims, reports of strange odors, a visible vapor cloud, dead plants, and dead or dying animals are commonly associated with chemical or toxin-related incidents. These symptoms are often observed in cases involving the release or exposure to harmful chemicals or toxins, which can cause severe health issues and environmental damage. Therefore, the correct answer is chemical/Toxins.

Submit
61. When the country is at a severe risk of terrorist attack, what is the DHS threat level? 

Explanation

The DHS threat level is set to "Imminent" when the country is at a severe risk of a terrorist attack. This indicates that there is credible and specific intelligence suggesting an imminent threat. The "Elevated" threat level is used when there is a significant risk of a terrorist attack, but not an imminent one. As for Option 3 and Option 4, since the question does not provide any information about them, it is not possible to determine their relevance or connection to the DHS threat level.

Submit
62. Methods for establishing a perimeter at a hazardous materials incident include use of:

Explanation

Establishing a perimeter at a hazardous materials incident requires the use of barricades and traffic cones to restrict access and create a safe zone. Flares can be used to warn and divert traffic away from the incident area. Vehicles, such as fire trucks or emergency response vehicles, may also be used to block off roads and provide a physical barrier. Therefore, all the options mentioned (barricades and traffic cones, flares, and vehicles) are necessary for establishing a perimeter at a hazardous materials incident.

Submit
63.  The Incident Command System is a management system used at only the most catastrophic hazardous materials incident. 

Explanation

The given statement is false. The Incident Command System (ICS) is not only used at the most catastrophic hazardous materials incident. ICS is a standardized management system that can be applied to incidents of any size or complexity. It is designed to provide a flexible and scalable framework for effective incident management, regardless of the nature or scale of the incident. ICS is widely used by emergency response agencies and organizations to ensure a coordinated and efficient response to various types of incidents, including hazardous materials incidents.

Submit
64. Biological WMD agents are:

Explanation

Biological WMD agents refer to disease-causing organisms or the toxins produced by living organisms. This includes bacteria, viruses, fungi, and other microorganisms that can be used as weapons to cause widespread illness or death. These agents can be intentionally released by terrorists or used in bioweapons for warfare purposes. The answer "Disease-causing organisms or the toxins produced by living organisms" accurately describes the nature of biological WMD agents.

Submit
65. What are the two types of decontamination in the event of the deployment of a WMD?

Explanation

Emergency and technical decontamination are the two types of decontamination in the event of the deployment of a WMD. Emergency decontamination involves immediate actions taken to reduce contamination and prevent further spread of hazardous materials. It includes measures like removing contaminated clothing, washing exposed skin, and providing medical treatment. On the other hand, technical decontamination refers to the more thorough and extensive process of removing or neutralizing hazardous materials from equipment, vehicles, and the environment. Both types of decontamination are crucial in effectively responding to a WMD incident and minimizing the risks to individuals and the environment.

Submit
66. What are the reasons for conducting a Vulnerability Assessment?

Explanation

A vulnerability assessment is conducted for several reasons. Firstly, it helps in identifying potential targets, which are areas or systems that are susceptible to attacks or breaches. Secondly, it assists in assessing federal grant funds by identifying areas that require investment to enhance security and mitigate vulnerabilities. Lastly, it promotes interagency interaction and coordination by bringing various agencies together to collectively address vulnerabilities and improve overall security. Therefore, the correct answer is "All of the above."

Submit
67. International terrorist groups include all of the following except? 

Explanation

The International terrorist groups listed in the question are Al Qaeda, IRA, PLO. The ELF / ALF (Earth Liberation Front / Animal Liberation Front) is not typically considered an international terrorist group. While they have engaged in illegal activities to promote their causes, such as arson and vandalism, their focus is primarily on environmental and animal rights issues rather than political or religious motivations. Therefore, they are not usually categorized alongside groups like Al Qaeda, IRA, and PLO, which are known for their involvement in acts of terrorism for political or ideological reasons.

Submit
68.  Which of the following are three main segments of domestic terrorism?

Explanation

The correct answer is Left-Wing, Special Interest, and Right-Wing. These three segments are commonly recognized as the main categories of domestic terrorism. Left-wing terrorism refers to groups or individuals who are motivated by leftist ideologies. Special interest terrorism involves groups or individuals who are driven by specific causes or issues, such as environmental or animal rights activism. Right-wing terrorism refers to groups or individuals who are motivated by right-wing ideologies, such as white supremacy or anti-government beliefs.

Submit
69.  Which of the public agencies listed can law enforcement personal share information with and get information from

Explanation

Law enforcement personnel can share information with and get information from the Department of Homeland Security (DHS). The DHS is responsible for ensuring the security of the United States and has various agencies under its umbrella that work closely with law enforcement, such as Immigration and Customs Enforcement (ICE) and the Transportation Security Administration (TSA). These agencies collaborate with local, state, and federal law enforcement agencies to share information and coordinate efforts to protect the country from threats.

Submit
70. Information that has gone through the intelligence cycle is which of the following?

Explanation

Information that has gone through the intelligence cycle refers to the process of collecting, analyzing, and evaluating data to produce intelligence. This intelligence is derived from the raw information and is the result of a systematic and structured process. Therefore, the correct answer is "intelligence."

Submit
71.  SEMS is a component of ICS?

 

Explanation

SEMS stands for the Standardized Emergency Management System, which is a management framework used for emergency response and coordination. It is designed to facilitate effective communication and coordination among different agencies and organizations involved in emergency management. The ICS, or Incident Command System, is a key component of SEMS. Therefore, it can be concluded that SEMS is indeed a component of ICS.

Submit
72. ELF and ALF are forms of what type of terrorist groups?

Explanation

ELF (Earth Liberation Front) and ALF (Animal Liberation Front) are both examples of special interest terrorist groups. These groups are motivated by specific causes or issues, such as environmentalism or animal rights, and carry out acts of violence or sabotage to further their agendas. Unlike right-wing or left-wing groups, which are driven by political ideologies, special interest groups focus on a particular cause and are willing to use terrorism as a means to achieve their goals.

Submit
73. Which one of the following is not one of the 12 "Government/ Law Enforcement Counter-Terrorism Measures

Explanation

The correct answer is "None of the above." This means that all of the options listed - Surveillance, Counter Surveillance, and Increase Media Awareness of specific terrorism problem - are actually part of the 12 "Government/Law Enforcement Counter-Terrorism Measures."

Submit
74. Isolation, Identification, Notification, Protection/Mitigation, Documentation and Transition are categories of basic law enforcement actions and responsibilities at a WMD incident scene.

Explanation

The correct answer is A because Isolation, Identification, Notification, Protection/Mitigation, Documentation, and Transition are indeed categories of basic law enforcement actions and responsibilities at a WMD incident scene. These categories outline the necessary steps to be taken in order to effectively respond to and manage a WMD incident, ensuring the safety of individuals and the proper handling of the situation.

Submit
75. Prevention and deterrence, notification, response phase restoration and recovery are?

Explanation

The correct answer is "Phases of a WMD." Prevention and deterrence, notification, response phase restoration, and recovery are the different phases involved in dealing with a Weapon of Mass Destruction (WMD) incident. These phases outline the steps and actions that need to be taken to prevent, respond to, and recover from a WMD event. They help guide emergency management personnel and organizations in effectively handling the situation and minimizing its impact.

Submit
76. A counter measure for terrorist surveillance (recon) would be to cut funding?

Explanation

Cutting funding for terrorist surveillance would not be a counter measure, but rather a detrimental action. Counter measures for terrorist surveillance would involve increasing funding and resources to enhance surveillance capabilities, intelligence gathering, and counter-terrorism operations. Cutting funding would weaken these efforts and potentially leave security agencies ill-equipped to detect and prevent terrorist activities. Therefore, the correct answer is false.

Submit
77. SEMS is designed to ensure that all public agencies have a common system to utilize while responding only to crimes in progress calls.

Explanation

The statement is false because SEMS (Standardized Emergency Management System) is not specifically designed for responding to crimes in progress calls. SEMS is a standardized system used by public agencies to coordinate and manage emergency response activities, including natural disasters, public health emergencies, and other types of incidents. It provides a common framework and terminology for agencies to work together effectively during emergencies.

Submit
78. Indicators that may precede the deployment of a WMD include:

Explanation

The indicators that may precede the deployment of a WMD are suspicious activity at a known terrorist target and information received from the community. These indicators suggest that there may be potential threats or plans related to the use of a weapon of mass destruction. The feeling one gets when starting a shift is subjective and does not provide concrete evidence or information about a potential WMD deployment. Therefore, the correct answer includes options a) and b) only.

Submit
79. One ICS principle relates to the supervisory structure of the organization and pertains to the number of individuals or resources one incident supervisor can manage effectively.This operating guidelines is referred to as:

Explanation

The correct answer is "Span of Control". This principle refers to the number of individuals or resources that one incident supervisor can effectively manage. It is important to have a manageable span of control to ensure effective communication, coordination, and supervision within an organization.

Submit
80. Which of the following is not a critical infrastructure?

Explanation

Oil refineries are considered a critical infrastructure. They play a crucial role in refining crude oil into various petroleum products, such as gasoline, diesel, and jet fuel, which are essential for transportation and energy production. They are vulnerable to physical and cyber threats, making them a critical infrastructure that requires protection and resilience measures.

Submit
81. The ability to communicate within ICS is absolutely critical. To ensure efficient, clear communication, ICS requires the use of: 

Explanation

ICS (Incident Command System) is a standardized approach used by emergency response organizations to manage incidents effectively. One of the key elements of ICS is clear communication. Agency-specific codes refer to codes or jargon specific to a particular agency or organization. By using these codes, responders can quickly and efficiently communicate important information without confusion. This helps to streamline communication and ensure that everyone involved in the incident understands the information being conveyed. Therefore, the use of agency-specific codes is essential in ICS for effective communication.

Submit
82. \Which of the following is clearly the "weapons of choice" for terrorists?

Explanation

Armed attacks are clearly the "weapons of choice" for terrorists. This is because armed attacks allow terrorists to directly engage with their targets, causing harm and instilling fear in a more immediate and direct manner. Hijacking, explosives, and assassinations can also be used by terrorists, but armed attacks are often more visible and have a greater impact on society, making them a preferred method for terrorists to achieve their goals.

Submit
83. The highest level for skin, eyes, or respiratory tract protection is provided by using what level of PPE protection

Explanation

Level D PPE protection provides the highest level of protection for the skin, eyes, or respiratory tract. This level of protection typically involves wearing a full-body suit, gloves, and a face shield or goggles. Level D PPE is used in situations where there is no known or suspected hazard present that may cause skin irritation or respiratory problems. It is important to use the appropriate level of PPE to ensure the safety and well-being of individuals in potentially hazardous environments.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 25, 2016
    Quiz Created by
    Alvarez18
Cancel
  • All
    All (83)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Weapons of Mass Destruction (WMD) is any weapon that is designed...
Terrorists tend to look for targets that are high profile, have...
What are the four key elements in defining terrorism?
List three factor terrorists use in selecting a target?
Decontamination is the process of removing gross contaminants from...
What are the four routes of exposure that chemical, biological,...
International terrorism is usually perpetrated against the...
The TLO is the agency point-person for the focusing of...
 Information is anything we know about any person, place or...
 Establishing a perimeter at a WMD is the on-scene officers...
NIMS was created to integrate effective practices in...
Common methods, motivations and tactics for terrorists include...
Methods to improve methods of prevention and deterrence...
What are the six components of NIMS?
Secondary devices, Secondary contamination, and Suspects...
The two kinds of explosives are high and low explosives.
Toxic agents include: 
 Basic general law enforcement actions/responsibilities at a...
The five phases of a WMD incident are:> Prevention and...
What are the five categories of WMD as related in the B-NICE acronym?
Components of an incendiary device is an: ignition...
Intelligence resources accessible to a patrol officer are: 
STTAC provides timely collection, coordination,...
The components of SEMS are: 
How are Incendiary devices deployed?
A pathway by which a hazardous material can enter the human body...
Isolation, Identification, Notification,...
What is the purpose of ICS?
The California State Warning Center (CSWC) is the  state...
The Louisiana State University (LSU), WMD Response Guidebook...
The Emergency Response Guide (ERG) was designed primarily to...
Critical Infrastructures are defined as those systems and...
A Water plant would be considered a critical infrastructure in...
Which of the following is not one of the 12 "Building Blocks to...
Inhalation of hazardous materials is the leading cause of injuries...
SEMS Incorporates ICS. 
Features of ICS are:Command, Organization , Planning...
The Terrorism Screening Center (TSC) can allow an officer access...
SEMS Incorporates ICS. 
Which position is the only one that is always staffed in...
  What does the acronym R.A.I.N. mean as it relates to first...
What two biological agents are most likely identified to be used...
The Primary features of ICS are: 
One goal of Counter-terrorism is to prevent deter...
Which of the following is considered a Critical Asset?
According to the FBI, Terrorism is defined as the unlawful use...
Incapacitating agents include a variety of chemical...
The Intelligence Cycle, which is ongoing and never-ending,...
Which of the following group is not a Domestic terrorism group?
What is the relationship between the State Warning Center and...
International terrorist groups are categorized as State...
Nuclear WMD have advantages because: 
 Blister agents are also called "vesicants". 
The three types of incendiary device activators...
A WMD that has disease-causing organisms or the toxins produced...
The KKK is a form of right wing terrorist group.
How is terrorist activity classified?
 Which terrorist groups attempt, through their violent...
The five functional areas of the Incident Command System (ICS) are
Numerous sick or dead victims, reports of strange odors, a...
When the country is at a severe risk of terrorist attack, what is...
Methods for establishing a perimeter at a hazardous...
 The Incident Command System is a management system used at only...
Biological WMD agents are:
What are the two types of decontamination in the event of...
What are the reasons for conducting a Vulnerability Assessment?
International terrorist groups include all of the following...
 Which of the following are three main segments of domestic...
 Which of the public agencies listed can law enforcement...
Information that has gone through the intelligence cycle is which...
 SEMS is a component of ICS? 
ELF and ALF are forms of what type of terrorist groups?
Which one of the following is not one of the 12 "Government/...
Isolation, Identification, Notification,...
Prevention and deterrence, notification, response phase...
A counter measure for terrorist surveillance (recon) would be to cut...
SEMS is designed to ensure that all public agencies have a...
Indicators that may precede the deployment of a WMD include:
One ICS principle relates to the supervisory structure of...
Which of the following is not a critical infrastructure?
The ability to communicate within ICS is absolutely critical....
\Which of the following is clearly the "weapons of choice"...
The highest level for skin, eyes, or respiratory tract protection...
Alert!

Advertisement