Answers Graded A
As of 2015, the number of TSA personnel had grown to a size represented by
which of the following ranges?
$49,000 - $51,000
Which of the following has received the highest priority among TSA
responsibilities?
Aviation Security
TSA was originally created within the Department of Transportation by the
authority of which of the following?
The Aviation and Transportation Security Act
Trucking is considered a priority of the TSA because of which of the following
factors?
Hazardous Materials
Which of the following is the often-neglected link in transportation security?
Bus Transportation
Which of the following is responsible for transporting a majority of the goods and
commodities Americans depend on?
The Freight Railroad Network
Which of the following is considered a Class I Railroad?
Railroads that operate over large areas, in multiple states, and concentrate on the long-
haul, high-density, intercity traffic lines with annual revenues over $250 million
Which of the following is not considered part of the motor carrier industry?
None of the above
How many official ports of entry are there in the United States?
327
Which of the following is not considered "Mass Transit"?
None of the above
Which of the following sectors was added to the transportation network in 2013
as a result of Presidential Policy Directive 21?
Postal and Shipping Services
Which of the following communicates the assessed threat environment to
maritime elements of the transportation system, and is closely aligned to the DHS
National Terrorism Advisory System?
MARSEC
Which of the following TSA offices is tasked with leading the national-level effort
to protect and secure US transportation and transport systems?
Office of Transportation Sector Network Management
Which of the following is not a focus of TSA Transportation Security Grants?
Oil Pipelines
The manner in which the Federal government views the role of the various federal
partners in protecting the transportation network is outlined in which of the
following documents?
National Infrastructure Protection Plan
, The three grant programs that had previously existed to address transportation
security were consolidated within which of the following?
Transit Security Grant Program
Which of the following serves as the primary law enforcement entity within TSA?
The Federal Air Marshals
Which of the following programs helps to increase flight safety by authorizing
certain cockpit-based crew to be armed?
Federal Flight Deck Officers Program
Which of the following programs coordinates public and private sector partners
for exercise, training, and information sharing, and to address transportation
security issues focused on protecting travelers, commerce, and infrastructure?
I-STEP
Which of the following tasked DHS with the responsibility of assuring maritime
security and protecting the nation's ports?
SAFE Port Act of 2006
The Second Quadrennial Homeland Security Review identified three factors that
explained why cyberspace is particularly difficult to secure. Which of the
following is not one of those factors?
The low cost of cyberterrorism
Which of the following terms is defined by US-CERT to be, "The activity or
process, ability or capability, or state whereby information and communications
systems and the information contained therein are protected from and/or
defended against damage, unauthorized use or modification, or exploitation"?
Cybersecurity
Which of the following is defined as the "creation, access, modification, and
destruction of information"?
Processing
Which of the following is defined as "the global network of information
technology infrastructure, inclusive of the internet, the telecom network, systems
of servers and computers, electronic control mechanisms, and the embedded
processes in microchips and other semiconductors"?
Cyberspace
Which of the following is defined as "the use or destruction of computing or
information technology resources aimed at harming, coercing, or intimidating
others in order to achieve a greater political or ideological goal"?
All of the above
The Stuxnet Worm is most likely an example of which of the following?
Cyberwarfare
The Edward Snowden leaks exposed US programs to conduct which of the
following?
Cyberespionage
Which of the following is not one of the three "clusters" of cyberterrorism?
Exploitive cyberterrorism
Which of the following is a "self-organized, self-run, and self-governed private
sector council consisting of owners and operators and their representatives,