Assignment EMI Author`s Name

Institution`s Name
IS-235.B: Emergency Planning
IS 860 National Infrastructure Protection Plan
Debris Operations and Waste Management: An Introduction
Waste management for instance the Debris operations is a complicated procedure that necessitates a lot of data from different sources like factors in waste generation as well as the waste quantity estimations ( Bovea et al., 2010 Zurbrügg et al., 2012).
The following report based on Multiple Question & Answers (MCQs) delves into the Debris Operations and Management in critical management and operations context.
IS-632.A: Introduction to Debris Operations
1. A temporary location where debris can be hauled and segregated for recycling or reduction is a:
A. Recycling center
B. Floodplain
C. Landfill
D. Debris Management Site (DMS)
2. It is FEMA`s responsibility to monitor contractors and to ensure compliance with contracts and environmental requirements.
A. True
B. False
3. Debris Making formulas_ make(s) it difficult to estimate the amount of debris to be removed following a disaster.
A. Number of survivors
B. Aerial photography
C. Multiple types of debris
D. Debris estimating formulas
4. Public Assistance grants are awarded based on the eligibility of the applicant, facility, work, and:
A. Past experiences.
B. Contractor.
C. Cost.
D. Force account labor.
5. A lump-sum contract for debris removal is appropriate when:
A. Negotiating a non-competitive contract.
B. The scope of work is well-defined.
C. Right of way clearance is critical.
D. Contract monitoring is not available.
6. Which statement is correct concerning debris removal from private property?
A. Solely at discretion of local government
B. Requires Right-of-Entry Agreement and Hold-Harmless Agreement
C. Always eligible
D. Reimbursement direct to private owner
7. Debris removal operations account for approximately __27%___ percent of disaster recovery costs.
A. 10%
B. 17%
C. 27%
D. 49%
8. A Preliminary Damage Assessment (PDA) estimates the:
A. Recovery time.
B. Quantity and mix of debris.
C. Federal cost share.
D. Applicant`s cost share.
9. Which activity in the contracting process could be provided by FEMA staff?
A. Timeframe for contract activation and completion
B. Contract review and approval
C. Determination of contract type
D. Technical assistance to ensure compliance with Federal laws
10. Incineration can reduce vegetative debris up to 95 percent.
A. True
B. False
11. Consultation with the State Historic Preservation Officer during demolition is necessary to ensure compliance with:
A. National Historic Preservation Act.
B. Stafford Act.
C. Endangered Species Act.
D. Resource Conservation and Recovery Act.
12. Federal aid for debris removal operations is authorized through the:
A. Stafford Act.
B. 44 CFR.
C. State.
D. EO 11990.
13. A debris management team should only include personnel from the jurisdiction impacted by the debris removal process.
A. True
B. False
14. An eligible applicant for Public Assistance is a:
A. Private business.
B. Federal agency.
C. Individual property owner.
D. State agency.
15. Debris work needs to be in the public interest to qualify for Public Assistance. True
A. True
B. False
16. The Federal share of eligible costs incurred as a direct result of a declared disaster is no less than:
A. 25%.
B. 50%.
C. 75%.
D. 100%.
IS-235.B: Emergency Planning
1. The main purpose of the emergency planning process is to:
A. Conduct a community risk assessment.
B. Assemble a multiagency planning team.
C. Create collaboration among different agencies.
D. Develop and maintain an emergency operations plan.
2. Checklists are most useful when narrative observations or calculations must be recorded.
A. True
B. False
3. Implementing instructions include:
A. A statement that addresses liability issues.
B. Standard operating procedures.
C. A promulgation document signed by the Chief Executive Officer.
D. Identification of shared responsibilities.
4. Which type of implementing instruction would be most appropriate for completing a multi-step task on the job?
A. Recordkeeping/combination form
B. Checklist
C. Information card
D. Map
5. The recommended emergency operations plan format includes:
A. Response operations.
B. The basic plan.
C. Hazard-specific analyses.
D. Vulnerability studies.
6. The basic plan should contain enough detail to stand alone as the community`s specific approach to emergency response.
A. True
B. False
7. In developing a community profile, one of the factors to include is:
A. Applying for Federal aid to supplement community resource shortfalls.
B. Developing mutual aid agreements and assistance agreements.
C. Determining what resources the community has to respond to a disaster.
D. Supplementing community resources with State assistance.
8. Which of the following is the first response priority?
A. Infrastructure
B. Essential facilities
C. Life safety
9. Which of the following is the final step of the emergency planning process?
A. Preparing, reviewing, and approving the plan
B. Determining goals and objectives
C. Implementing and maintaining the plan
D. Understanding the situation
10. It is advisable to wait to consult with agencies with specialized expertise such as hazardous materials responders until the later phases of the planning process.
A. True
B. False
11. Which of the following is the first step of the emergency planning process?
A. Determining goals and objectives
B. Forming a collaborative planning team
C. Implementing and maintaining the plan
D. Developing the plan
12. Which type of implementing instruction would be the most appropriate for a resource list?
A. Information card
B. Job aid
C. Standard operating procedures
D. Checklist
13. Which type of implementing instruction would be most appropriate for recording calculations and/or observations? #
A. Standard operating procedures
B. Checklist
C. Information card
D. Recordkeeping/combination form
14. Which of the following is the second response priority?
A. Infrastructure
B. Essential facilities
C. Life safety
15. The Situation and Assumptions component of the basic plan includes:
A. Legal bases for emergency operations and activities.
B. Instructions for compiling situation reports.
C. Threats addressed by the plan.
D. Disclaimers to limit the liability in case of emergency.
16. A document describing how a community will respond to a wide variety of potential hazards is:
A. A support document.
B. A standard operating procedure.
C. An emergency operations plan.
D. An implementing instruction.
17. Which of the following is the third response priority?
A. Infrastructure
B. Essential facilities
C. Life safety
18. There is a standardized set of hazard-specific annexes that appear in emergency operations plans nationwide.
A. True
B. False
19. All of the following are examples of functional annexes, EXCEPT FOR:
A. Population Warning.
B. Direction and Control.
C. Hazardous Materials Response.
D. Communications.
20. A threat analysis is used to determine:
A. How to carry out a specific function in the face of a specific threat.
B. How a community plans to respond to a given threat.
C. The causes of hazards that threaten a community.
D. How vulnerable a community is to a threat.
21. Which of the following is the second step of the emergency planning process?
A. Understanding the situation
B. Implementing and maintaining the plan
C. Developing the plan
D. Preparing, reviewing, and approving the plan
22. A detailed annex repeats content presented in the basic plan.
A. True
B. False
23. Successful collaboration among different agencies requires that the participants chosen for the planning team share a common experience and culture.
A. True
B. False
24. Which part of the EOP is hazard-, threat-, or incident-specific?
A. Implementing instructions
B. Annex
C. Assumptions
D. Basic plan
25. The National Incident Management System (NIMS) is used to:
A. Develop scenarios for a given hazard or threat.
B. Identify which entities should be involved in emergency planning.
C. Keep track of resources at an incident.
D. Manage all incidents, including recurring and/or planned events.
IS 860 National Infrastructure Protection Plan
1. Which of the following is NOT an example of critical infrastructure covered by the NIPP?
A. Nuclear power plants
B. Agricultural distribution centers
C. Highways and bridges
D. Military installation
2. According to the NIPP, effective protective actions and programs are:
* Comprehensive.
* Coordinated.
* Cost effective.
A. DHS approved.
B. Regionally centered.
C. Risk-informed.
D. Industry certified.
3. The NIPP: B
A. Recognizes that the disclosure of sensitive business or security information could cause serious damage to companies, the economy, public safety, or security.
B. Mandates that State and local government disclose sensitive security information to all CIKR partners within their jurisdictions.
C. Prohibits the government from requesting sensitive business information from private sector partners.
D. Establishes reporting formats for the disclosure of sensitive CIKR security information by government agencies to the public.
4. One step in the NIPP risk management framework is to: A
A. Identify assets, system and networks.
B. Define roles and responsibilities.
C. Determine implementation timeframes.
D. Estimate budgetary needs.
5. Risk assessment results can inform all of the following decisions, EXCEPT FOR: A
A. DHS grant allocations.
B. Allocation of response and recovery resources during an incident.
C. Identifying gaps and requirements for protective measures and actions.
D. Evaluating regulatory compliance with the Federal infrastructure protection policies and procedures.
6. What is the name of the group (composed of private industry, academia, and State and local government representatives) that provides the President with advice on the security of the critical infrastructure sectors and their information systems? B
A. Homeland Security Council (HSC)
B. National Infrastructure Advisory Council (NIAC)
C. Critical Infrastructure Protection Advisory Council (CIPAC)
D. Federal Leadership Advisory Council (FLAC)
7. To ensure an effective, efficient CIKR protection program over the long term, the NIPP relies on all of the following EXCEPT FOR: A
A. Enabling education, training, and exercise programs.
B. Creating mandatory programs regulated by DHS.
C. Developing, protecting, and maintaining data systems and simulations.
D. Conducting R&D and using technology.
8. Which program includes procedures that govern the receipt, validation, handling, dissemination, storage, marking, and use of critical infrastructure information voluntarily submitted to the Department of Homeland Security? D
A. Protective Security Advisor Program
B. Control Systems Security Initiative
C. Protective Community Support Program
D. Protected Critical Infrastructure Information (PCII) Program
9. Sector-Specific Agencies (SSAs) are responsible for: A
A. Developing Sector-Specific Plans to guide the CIKR protection and resiliency efforts throughout their sector.
B. Funding the implementation of optimal protection programs proposed by State, local, and tribal entities.
C. Providing advice to the Secretary of Homeland Security on cross-sector security issues related to critical infrastructure.
D. Evaluating the effectiveness of mandatory protection measures implemented by the private sector and industry.
10. The value proposition for participating as a CIKR partner within the NIPP framework refers to:
A. The funding provided by the Federal Government to local jurisdictions for the development and implementation of protection programs. B
B. The expertise within the Government for protecting the country`s infrastructure against terrorist attacks.
C. The benefits gained from the public private partnership.
D. The research and development initiatives being conducted by the academic community to enhance infrastructure protection technology.
Next >
11. The scope of the NIPP is designed to address which of the following types of events? D
A. A virus that attacks multiple companies` computer systems.
B. A localized flood that causes dirt roads in a rural county to wash out.
C. A mass murder in London.
D. A military attack overseas on U.S. interests.
12. Which of the following statements about the NIPP is FALSE? D
A. The NIPP framework is applicable for both terrorist attacks and natural disasters.
B. The NIPP replaces a business` continuity of operations and emergency operations plans.
C. The NIPP`s risk management framework allows for differences based on unique sector characteristics
D. The NIPP approach is to foster collaboration between the private sector and the public sector.
13. Protective actions or programs are designed to manage risks by: D
* Deterring threats.
* Minimizing consequences.
* Mitigating vulnerabilities
A. Eliminating consequences.
B. Mitigating vulnerabilities.
C. Neutralizing consequences.
D. Counteracting consequences.
14. Sector-Specific Plans are: D
A. Developed by the Sector-Specific Agencies and tailored to address the unique characteristics of each sector.
B. Submitted by State, local, and tribal governments who receive Homeland Security grants.
C. Designed to provide specific guidance for incorporation into local emergency operations plans.
D. Required as part of the Federal Government regulatory oversight of vulnerable industries.
15. Sector-specific NIPP planning and coordination are addressed through the: D
A. Sector Coordinating Councils (SCC).
B. Infrastructure Policy Coordinating Committee (I-PCC).
C. Federal Sector Leadership Council (FSLC).
D. Homeland Security Information Network for Critical Sectors (HSIN-CS).
16. The Critical Infrastructure Partnership Advisory Council (CIPAC) facilitates effective coordination between Federal CIKR partners and: B
A. Agencies and organizations within the Department of Homeland Security
B. Private sector and State, local, territorial, and tribal governments.
C. Nongovernmental organizations within designated high-risk regions.
D. Federal agencies and departments that are designated as sector-specific agencies.
17. The NIPP advocates that the Government and private sector partners participate in the multidirectional exchange of information. The NIPP refers to this as: D
A. Hierarchal information sharing
B. Cyber information sharing
C. Open-source information sharing
D. Networked information sharing
18. In the context of the NIPP, risk is defined as: A
A. The elements within an asset, system, or network`s design, location, or operation that render it susceptible to destruction.
B. The estimated magnitude of financial loss or damage that can be expected from a terrorist attack or natural disaster.
C. The potential for an unwanted outcome resulting from an incident, event, or occurrence, as determined by its likelihood and the associated consequences.
D. The likelihood that a particular asset, system, or network will suffer a terrorist attack or a natural disaster.
19. The risk management framework is comprehensive and takes into account CIKR assets, systems, and networks. It also considers the following elements: A
* Physical
* Cyber
* Resiliency__
A. Resiliency
B. Financial
C. Policies
D. Human
20. For the purpose of calculating risk, the threat of an intentional hazard is generally estimated as the likelihood of: C
A. A single point of failure.
B. A loss of competitive edge in the international marketplace.
C. An attack being attempted by an adversary.
D. A negative effect on the Nation`s economy and the public health and safety of the citizens.
21. Read the following definition and select the correct component of risk: A physical feature or operational attribute that renders an entity open to exploitation or susceptible to a given hazard. A
A. Consequences
B. Vulnerability
C. Threat
22. According to the NIPP, a natural or man-made occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property is the: C
A. Risk
B. Consequence
C. Threat
D. Vulnerability
23. The NIPP and the National Response Framework (NRF) work together to provide a comprehensive, integrated approach to the homeland security mission. The NRF provides: D
A. The detailed risk management model for CIKR protection.
B. The approach to domestic incident management.
C. The measures of CIKR protection program effectiveness.
D. The system used to allocate resources for CIKR protection.
24. Which of the following CIKR partners are most likely to establish Centers of Excellence to provide independent analysis of CIKR protection issues? A
A. The academic community
B. Federal agencies
C. State, local, and tribal governments
D. NIPP councils
25. What provides the basis for the Department of Homeland Security (DHS) responsibilities in the protection of the Nation`s CIKR? C
A. The Homeland Security Presidential Directive 5 (HSPD-5)
B. The National Incident Management System (NIMS)
C. The Homeland Security Act of 2002
D. The National Response Framework (NRF)
Bovea, M.D., Ibáñez-Forés, V., Gallardo, A. & Colomer-Mendoza, F.J. (2010). Environmental assessment of alternative municipal solid waste management strategies. A Spanish case study Waste Management, 30 (11), 2383-2395.
Zurbrügg, C., Gfrerer, M., Ashadi, H., Brenner,W., & Küper, D. (2011). Determinants of sustainability in solid waste management. The Gianyar Waste Recovery Project in Indonesia. Waste Management, 11.

Close Menu