FEMA IS 156: Building Design for Homeland Security for Continuity of Operations Answers

FEMA provides really valuable Tests and Exercises. There are many different exams under their different programs. Here we have studied and taught our students in order to train them. All answers are sourced and many different professionals have helped to find the best answers.

About FEMA IS-156

FEMA IS 156: Building Design for Homeland Security for Continuity of Operations has 47 questions. These Questions are given below. Learning is free and so is this page. We recommend studying well and practicing and check the answers in case you get stuck in a doubt.

See also  calculate the mass percent of a vinegar solution with a total mass of 96.41 g that contains 2.80 g of acetic acid

NOTE: Don’t use this as CheatSheet but as self-preparatory notes

1. A ____________________ is an action, device, or system used to reduce risk by affecting as asset, threat, or vulnerability.

Defensive corollary

Consequence

Aggressor tactic

Mitigation measure

2. Personal protective equipment is only effective against specific agents if:

The PPE is stored in warm dry office space

The HVAC system is turned off and the building is sealed

The purchased equipment is one size fits all

The PPE is worn correctly when needed

3. The consequences are defined as the degree of ________________ that is caused by the loss of an asset.

economic disruption

productivity interruption

debilitating impact

customer dissatisfaction

4. A vulnerability can be described as weakness that can be exploited by someone or as weakness that would make a facility susceptible during a natural disaster.

TRUE

FALSE

5. Brittle materials such as glass are most affected by?

Impulse Wave

Peak incident pressure

Shock wave

Both A & B

6. Which biological agents are contagious

Anthrax

Salmonella

Ricin

Small pox

7. Which of the following public areas should be separated from areas requiring more security by the use of buffer zones?

Warehouses

Parking areas

Retail establishments

Lobbies

All of the above

8. What preparations are needed in order to safely shelter in place?

Lan ports for laptops, printer paper, office supplies, food and water, Duct tape and plastic, plants

Permanently sealed room, direct phone line, 1 gallon of water per person per day, good ventilation

Supplies to seal room, HVAC shutoff, carbon dioxide absorbers, food and water, communications, and a well practiced plan

Supplies to seal the room, HEPA filter, food and water, windows and a well practiced plan

9. When designating or designing a Continuity of Operations (COOP) facility,which hazards should be considered?

Man-made

Natural

terrorist

All of the above

10. Lacerations occur the furthest distance from an explosive event as a result of?

Sub-standard structural components.

high- velocity glass fragments.

Projectile debris from progressive collapse

blast loading effects of the

2/

3’s conflaguration.

11. Of all blast mitigation measures which is the most effective?

added steel reinforcement

thicker glass veneer

increased stand-off distance

All are equally effective

12. CBR detectors can not be successfully integrated into the buildings security operations center and building automation systems.

TRUE

See also  What are two application layer preprocessors? (Choose two.)

FALSE

13. When estimating the direct consequences of an attack you should consider, the target, the effect of the weapon, physical and environmental conditions and ________________ ?

estimated damage

how many people work in the building

cascading effects

potential losses

14. Continuity programs are a required and critical component of Government and critical infrastructure operations, and during emergencies and disasters, ensure that the Government at all levels can continue to operate and provide essential functions and services.

TRUE

FALSE

15. The concept of Design basis Threat (DBT) is essential to building protection because?

DBT establishes the minimum criteria necessary for the proper selection of window thickness and fragment retention films.

DBT provides a means to identify and characterize all threat groups operating in the local area that could impact the buildings occupancy.

DBT provides the mitigations necessary to ensure that standoff is kept to a minimum.

DBT establishes the threat tactics that architects and engineers use in designing mitigations for a new structure or renovation.

16. A threat is any indication, circumstance, or event with the potential to cause loss of, or damage to an asset?

TRUE

FALSE

17. Which type of map can be used for establishing emergency evacuation routes?

Emergency response map

10 mile radius map

metro center map

regional transportation map

18. Which of the following is the least desirable type of passive barrier, in terms of its vehicle stopping ability, aesthetics, affect on pedestrian access, and performance in blast loading?

Berms

Bollards

reinforced street furniture

Jersey Barriers

19. In some cases the best mitigation measure may be to nothing?

TRUE

FALSE

20. According to the FEMA 452 Manual which tier of Risk Assessment methodology requires using blast and WMD models?

Tier 1

Tier II

Tier III

Tier IV

21. Risk is a combination of: The probability that an event will occur, and the probability that a terrorist will be able to successfully plan an attack?

TRUE

FALSE

22. Assessing a building’s vulnerabilities requires a multi-disciplinary team. It should not be conducted solely by an engineer or security specialist?

TRUE

FALSE

23. Assembling a GIS Portfolio can help in performing a Vulnerability Assessment on a continuity facility?

TRUE

FALSE

24. Layers of defense are used to provide?

A basis for the design based threat.

justification for funding expenditures for new technology.

defensive barriers to channel hostile vehicles toward active barriers.

Multiple opportunities to detect and defeat an aggressor.

25. Activated Carbon filters are designed to filter a broad range of toxic chemicals, but not all chemicals.

TRUE

FALSE

26. When conducting a building assessment which of the following should be a member of the multi functional team?

engineer/ architect

Security

Emergency Manager

subject matter experts

All of the above

27. Which risk management choice achieves the lowest Risk but has the greatest cost?

Install an electrified fence with razor wire

Do nothing

Harden the building

Install bollards

28. The geographical isolation of the United States is a sufficient barrier to prevent terrorist attacks?

TRUE

FALSE

29. The four main categories of consequences are?

Human impacts, economic impacts, Public confidence and Re-election impacts

Impacts of government ability, damage to company name, distribution of product lines, loss of life

Human impacts, economic impacts, public confidence impacts, and impacts on government ability

Loss of life, loss of communications, loss of revenue, loss of client base

30. Resilience is the ability of an organization or asset to _________________ its critical functionality in a short period of time after the impact of an adverse event.

Maintain or recover quickly

Contract or transfer the responsibility of

gracefully shut-down computer functions of

Back-up data for

31. Which of the following is not an infrastructure single point vulnerabilities common in commercial facilities?

entry/exit points

See also  Which of the following most accurately describes a conflict of commitment?

electrical

water

telecom

All of the above

32. A single point vulnerability is:

A critical infrastructure component with redundant feeds and back-ups

Multiple nodes and distribution paths

Critical components or systems with more than 100 feet of separation

A point where multiple systems come together and an incident at this location could cause multiple systems to be taken down

33. The best way to lower peak incident pressure and the reflective wave is?

Decrease distance of detonation

increase distance of detonation

peak incident pressure does not cause damage

reflective wave does not matter

34. A ___________________ is any weakness that can be exploited by an aggressor or, in a non-terrorist threat environment, make an asset susceptible to hazard damage?

Consequence

design flaw

Remunerability

Vulnerability

35. The consequences resulting from a pandemic would primarily impact which two areas?

Human

Economic

Public confidence

Government ability

A & B

36. Core functions can include all of the following except?

Primary services or outputs.

Critical activities.

inputs from external organizations.

Building utilities.

37. The process of making the site or building of little to no value or consequence, from the terrorists’ perspective, such that an attack on the facility would not yield their desired result.

Deter

Detect

Devalue

Deny

38. The third layer of defense determines which of the following?

Angle of incidence

Stand-off distance required

Amount of explosive

Reflected pressure over the exterior of the building

39. A numeric risk value can be computed once the following information is known:

Design Basis threat, level of protection, defensive layers

Threat rating, consequence rating, vulnerability rating

building ranking, mitigation, level of protection

Threat rating, vulnerability rating, design basis threat

40. Which item is an example of a threat and/or hazard that could potentially impact a building or site?

Bombing

Armed Attack

Kidnapping

All of the above

41. Mitigation measures can be conducted by which of the following means?

Regulatory measures

Rehabilitation of facilities

Protective and control structures

all of the above

42. In most cases trying to add security measures into facility planning proves to be too costly?

TRUE

FALSE

43. Consequences can include the ________________ and cost for infrastructure and equipment, it can also include lost profit or a lost capability.

replacement time

cost

loss of personnel

loss of an essential function

44. Risk is defined as the probability of an event times the consequences if it occurs?

TRUE

FALSE

45. The initial step of a risk assessment is to:

Evaluate the security master plan.

Define and understand a building’s core functions and processes, and identify building infrastructure.

Interview staff to determine if there are alternates assigned to key functions.

Collect site data from interactive GIS maps.

46. What is the primary method of terrorist attack according to NCTC?

bombings and arson

kidnapping

CBR attacks and fire bombing

armed attack and bombings

47. The most commonly selected terrorist targets, worldwide, are?

Military bases

Government facilities

Law enforcement facilities

Commercial facilities

FEMA IS 156: Building Design for Homeland Security for Continuity of Operations Completed

This was all about FEMA IS 156: Building Design for Homeland Security for Continuity of Operations Exam. All the answers are correct.

Please comment on any issues. We hope you’ll find more valuable answers to your Queries

Leave a Comment