Answer the following statement(s) true (T) or false (F)
1. Al-Qaeda has been known to recruit individuals with information technology or computer backgrounds.
2. Using social media to recruit supporters has resulted in zero terror attacks in the United States and in the international community.
3. There is no concern that cyberterrorists will use the electrical grid system to attack critical infrastructure, as they do not have the means to do so.
4. Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.
5. In order to examine the threat aspect of risk assessment, it should be understood that risk can come from two sources: natural disasters and man-made disasters.
1. True
2. False
3. False
4. False
5. True
You might also like to view...
In the case of ________, the Supreme Court applied Section 1983 to the police
A) Gideon v. Wainwright B) Carmelo v. Miller C) Monroe v. Pape D) Gilliam v. Falbo
One of the most important drug laws passed in the 1980s was the Anti-Drug Abuse Act of 1988. This legislation created a _________Director of National Drug Control Policy, often referred to in the media as the Drug Czar
Fill in the blank(s) with the appropriate word(s).
Latent fingerprints are caused by natural oils and:
a. lines on your fingers. b. crime scene dust. c. water. d. perspiration.
The first Congress created the office of attorney general and the United States attorneys through the:
A) Judiciary Act of 1789 B) Congressional Judiciary Act of 1788 C) Judiciary Act of 1891 D) Articles of Confederation