Deck 4: Toward a Smarter Defense: Big Data and Risk Assessments in Homeland Security

ملء الشاشة (f)
exit full mode
سؤال
The 3 V's of big data refer to volume, velocity, and ______________.

A) vitality
B) veracity
C) variety
D) vacuum
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Approximately, how many air passengers per day does the TSA screen?

A) 750,000
B) 1,000,000
C) 2,000,000
D) 2,700,000
سؤال
_________ assessment is a process to identify potential threats or hazards and analyze what could happen if a threat or hazard occurs.

A) data
B) risk
C) expectation
D) transportation
سؤال
What permits government employees and contractors to review classified information?

A) Needs assessment
B) Minimum qualifications
C) Security requests
D) Security clearances
سؤال
Which system developed in 1994 allowed Border Patrol agents to identify illegal border crossers using biometric information.

A) Automated targeting system
B) Automated biometric identification system (IDENT)
C) Customs-trade partnership against terrorism (C-TPAT)
D) Personally identifiable information (PII)
سؤال
Which of the following terms describes a compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information?

A) Automated Targeting
B) Operating Picture
C) Waitlist
D) Watchlist
سؤال
Which of the following terms describes any information that permits the identity of an individual to be directly or indirectly inferred, including any other information that is linked or linkable to that individual?

A) Data Mining
B) Derogatory Information
C) Personally Identifiable Information
D) Watchlist
سؤال
The fifteenth century saw the development of data storage on magnetic tape and the invention of early computers
سؤال
Big data is revolutionizing medicine and the ability to diagnose and treat patients.
سؤال
Risk segmentation involves the separation of low-risk cargo or people from high risk, or unknown, cargo or people.
سؤال
A watchlist is compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information.
سؤال
The use of IDENT and the CDS exemplify how big data and risk assessment can be used to inform homeland security decision-making.
سؤال
The industrial and economic boom that occurred during the mid-twentieth century saw the emergence of business intelligence, data centers, and the more direct ancestors of today's computers.
سؤال
Describe a historical period in which humans used and managed knowledge before the use of computers.
سؤال
Explain why information sharing was problematic in the pre-9/11 era.
سؤال
Which agencies are provided with information available in the Terrorist Screening Database (TSDB)?
سؤال
Identify some potential flaws in the Secure Flight program.
سؤال
Explain how homeland security programs now rely on the use of "big data".
سؤال
Discuss how national preparedness and resilience rely on big data.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Toward a Smarter Defense: Big Data and Risk Assessments in Homeland Security
1
The 3 V's of big data refer to volume, velocity, and ______________.

A) vitality
B) veracity
C) variety
D) vacuum
C
2
Approximately, how many air passengers per day does the TSA screen?

A) 750,000
B) 1,000,000
C) 2,000,000
D) 2,700,000
C
3
_________ assessment is a process to identify potential threats or hazards and analyze what could happen if a threat or hazard occurs.

A) data
B) risk
C) expectation
D) transportation
B
4
What permits government employees and contractors to review classified information?

A) Needs assessment
B) Minimum qualifications
C) Security requests
D) Security clearances
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which system developed in 1994 allowed Border Patrol agents to identify illegal border crossers using biometric information.

A) Automated targeting system
B) Automated biometric identification system (IDENT)
C) Customs-trade partnership against terrorism (C-TPAT)
D) Personally identifiable information (PII)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following terms describes a compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information?

A) Automated Targeting
B) Operating Picture
C) Waitlist
D) Watchlist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following terms describes any information that permits the identity of an individual to be directly or indirectly inferred, including any other information that is linked or linkable to that individual?

A) Data Mining
B) Derogatory Information
C) Personally Identifiable Information
D) Watchlist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
8
The fifteenth century saw the development of data storage on magnetic tape and the invention of early computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
9
Big data is revolutionizing medicine and the ability to diagnose and treat patients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
10
Risk segmentation involves the separation of low-risk cargo or people from high risk, or unknown, cargo or people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
11
A watchlist is compilation of individuals or entities that have been deemed to pose a threat based upon the analysis of derogatory information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
12
The use of IDENT and the CDS exemplify how big data and risk assessment can be used to inform homeland security decision-making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
13
The industrial and economic boom that occurred during the mid-twentieth century saw the emergence of business intelligence, data centers, and the more direct ancestors of today's computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
14
Describe a historical period in which humans used and managed knowledge before the use of computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
15
Explain why information sharing was problematic in the pre-9/11 era.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which agencies are provided with information available in the Terrorist Screening Database (TSDB)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
17
Identify some potential flaws in the Secure Flight program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
18
Explain how homeland security programs now rely on the use of "big data".
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
19
Discuss how national preparedness and resilience rely on big data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.