Overview: FEMA IS-914 course was published on 10/31/2013 to provide an overview of surveillance activities and the indicators associated with them, as well as the actions that employees and service providers can take to report potential surveillance incidents.
Primary audience: FEMA IS-914 is designed for critical infrastructure owners and operators, employees, and service providers as well as those with critical infrastructure protection duties and responsibilities at the State, local, tribal, and territorial levels.
FEMA IS-914 test answers
Each time this test is loaded, you will receive a unique set of questions and answers. The test questions are scrambled to protect the integrity of the exam.
Question 1. How does practicing your observation skills improve your ability to detect and report adversarial surveillance?
A. You will improve your distance vision.
B. You will have a better idea of what is normal or unusual for your environment.✅
C. You will enhance your ability to confront personnel engaged in surveillance activities.
D. You will gain an enhanced understanding of reporting procedures for your organization.
Question 2. True or False. The process of taking notes about security and security routines is an example of adversarial surveillance activity.
Question 3. Complete the statement: The three simple actions that you can take to help prevent terrorism and criminal activities include the following, EXCEPT FOR
A. Ignore surveillance✅
B. Report surveillance
C. Understand surveillance
D. Detect surveillance
Question 4. Complete the statement: Surveillance-related activities can be detected because they often will:
A. Take place in a single visit
B. Appear unusual and out of place✅
C. Be conducted at night
D. Occur when a facility is closed.
Question 5. You can improve your ability to detect and report surveillance by doing all of the following EXCEPT FOR
A. Writing down the details about suspected surveillance activities.
B. Identifying what is unusual and suspicious about observed potential surveillance activities.
C. Practicing observation skills.
D. Confiscating notes and equipment from suspicious persons.✅
Question 6. Complete the statement: Adversarial surveillance is conducted to gather information in order to:
A. Document the surveillance conducted by potential adversaries✅.
B. Commit an act of terrorism or other crime.
C. Conduct an investigation of criminal activity.
D. Assess the risk of potential acts of terrorism or other crimes.
Question 7. Complete the statement: Adversarial surveillance is conducted to identify the following types of information, EXCEPT FOR
A. Possible avenues of approach.
B. Business performance✅
C. Security weaknesses
D. Routine security activities
Question 8. Fill in the blank: Terrorists tend to engage in ___ in advance of a planned attack.
A. No acquisition activities.
B. Communications strategies.
C. Planning activities, including surveillance.✅
D. Significant change management activities.
Question 9. Which of the following is an example of a failure to adopt the appropriate “character” during surveillance?
A. An unknown person claiming to be a maintenance worker who has no tools or equipment and is dressed inappropriately.✅
B. An unknown person claiming to be a courier who has a clipboard and large padded envelope.
C. An unknown person claiming to be a cleaning service employee who is pushing a wheeled trash bin and wearing casual clothing.
D. An unknown person claiming to be attending an office meeting who is wearing a business suit and has a briefcase.
Question 10. Complete the statement. In addition to reporting details about the people or vehicles involved, you should include in your report information that identifies
A. security procedure for your organization regarding reporting.
B. in what ways the situation was unusual and suspicious.✅
C. an assessment of the specific threat to the target of the surveillance.
D. the response from the persons involved when confronted or questioned.
Question 11. True or False. Individuals involved in surveillance prior to a terrorist attack are always well-trained and equipped.
Question 12. Complete the statement: The behavior and actions of persons who are not well-trained in conducting surveillance often appear to be ___.
D. Normal and routine
Question 13. Complete the statement: Adversarial surveillance is conducted to gather information in preparation for the following actions, EXCEPT FOR
B. Crimes against individuals
C. Risk fusion✅
D. Domestic or international terrorism
Question 14. True or False. Observation of security responses to one or more attempts to gain unauthorized access is an example of adversarial surveillance activity.
Question 15. Complete the statement: The ability to detect surveillance activities is improved when:
A. Surveillance takes place over a long period of time and involves repeated visits.
B. Surveillance is conducted using sophisticated surveillance equipment.
C. Surveillance is conducted by trained personnel✅
D. Surveillance involves videography by professional firm crews.
Critical Infrastructure Security and Resilience Curriculum
The IS-914 course is part of the Security Awareness cluster of courses under the Critical Infrastructure Security and Resilience curriculum. You can find the other courses below.
Security awareness courses
- IS-906: Workplace Security Awareness
- IS-907: Active Shooter: What You Can Do
- IS-912: Retail Security Awareness: Understanding the Hidden Hazards
- IS-915: Protecting Critical Infrastructure Against Insider Threats
- IS-916: Critical Infrastructure Security: Theft and Diversion – What You Can do
- IS-860: The National Infrastructure Protection Plan
- IS-913: Critical Infrastructure Security and Resilience: Achieving Results through Partnership and Collaboration
- IS-870: Dam Sector: Crisis Management
- IS-871: Dam Sector: Security Awareness
- IS-872: Dam Sector: Protective Measures
- IS-1170: Introduction to the Interagency Security Committee (ISC)
- IS-1171: Overview of Interagency Security Committee (ISC) Publications
- IS-1172: The Risk Management Process for Federal Facilities: Facility Security Level (FSL) Determination
- IS-1173: Levels of Protection (LOP) and Application of the Design-Basis Threat (DBT) Report
- IS-1174: Facility Security Committees