What department or agency holds sector responsibilities for Information Technology?
Department of Homeland Security
Federal Communications Commission
National Institute of Standards and Technology
The Answer Is:
AExplanation:
Under theNational Infrastructure Protection Plan (NIPP), theDepartment of Homeland Security (DHS)is the designated Sector-Specific Agency (SSA) for theInformation Technology (IT) Sector.20This responsibility is specifically executed by theCybersecurity and Infrastructure Security Agency (CISA)within DHS. The IT Sector is considered a "cross-cutting" sector because nearly every other critical infrastructure sector (such as Energy, Finance, and Water) depends on IT for its daily operations.
The DHS role in IT sector responsibility includes:
Risk Management:Identifying and mitigating threats to the hardware, software, and systems that enable the Internet and other critical networks.
Incident Response:Coordinating the federal response to significant cyber-attacks through theNational Cyber Incident Response Plan (NCIRP).
Information Sharing:Facilitating the exchange of threat indicators between the government and private IT companies via theIT-ISAC(Information Sharing and Analysis Center).
TheFCC(Option B) focuses on theCommunicationssector (the physical wires and airwaves), andNIST(Option C) develops theStandardsused for cybersecurity, but it isDHS/CISAthat holds the operational and coordination responsibility for the sector's protection. For theCEDPprofessional, this means that DHS is the primary point of contact for cyber-resilience. By securing the IT sector, DHS protects the "Virtual Systems" that manage everything from the electric grid to the air traffic control system, ensuring that the nation's digital backbone remains resilient against both natural disruptions and intentional attacks.
What terms best describe potential emergency preparedness related risks?
Likelihood and consequence
Likelihood and resilience
Consequence and vulnerability
The Answer Is:
AExplanation:
In the standard scientific and regulatory definition of risk used byFEMA,ISO 31000, and theIBFCSM, risk is fundamentally expressed as a function ofLikelihood and Consequence. This is often simplified into the mathematical formula $Risk = Probability \times Impact$. "Likelihood" refers to the probability or frequency with which a specific hazard (e.g., a flood, earthquake, or cyber-attack) is expected to occur. "Consequence" (or Impact) refers to the severity of the result if that hazard does manifest, measured in terms of life safety, economic loss, environmental damage, and infrastructure failure.
While "Vulnerability" (Option C) and "Resilience" (Option B) are critical components of the riskequation, they are not the primary terms used to describe the risk itself. Vulnerability describes the characteristics of an asset that make it susceptible to a hazard, and Resilience describes the ability to recover. However, to prioritize emergency preparedness efforts, planners first plot hazards on aRisk Matrixusing likelihood and consequence. A high-likelihood, low-consequence event (like a localized power outage) might require different preparedness steps than a low-likelihood, high-consequence event (like a nuclear detonation).
According to theCEDPcurriculum, understanding these two terms allows for the objective ranking of threats. This ranking is the core of theHazard Identification and Risk Assessment (HIRA)process. By quantifying the likelihood (e.g., a "100-year flood" has a 1% annual likelihood) and the consequence (e.g., $10 million in projected damage), emergency managers can justify the costs of mitigation and preparedness projects to stakeholders and government officials. It ensures that resources are directed toward the most significant "Realized Risks"—those that are both plausible and potentially devastating.
What should be the lowest operational priority following an organizational cyber-attack?
Defining scope and impact of the cyber related event or incident
Isolating affected systems and restoring services as soon as possible
Reporting the apparent attack to appropriate local law enforcement
The Answer Is:
CExplanation:
In the immediate aftermath of a cyber-attack, the operational focus is governed by the "Containment, Eradication, and Recovery" cycle defined by theNIST Special Publication 800-61 (Computer Security Incident Handling Guide). Within this framework,Reporting to local law enforcement(Option C) is considered the lowest operational priority relative to the immediate technical response. While reporting is an essential legal and compliance step, it does not stop the spread of malware or restore critical business functions.
The highest priority is alwaysDefining the scope and impact(Option A) because you cannot fix what you have not identified. This involves forensic analysis to determine which systems are compromised and whether the attack is ongoing. Following closely isIsolating affected systems(Option B), which is a "Life Safety" equivalent in the digital world. By disconnecting infected servers or segments of the network, the incident response team prevents the "lateral movement" of the attacker, thereby protecting remaining assets and preparing for the restoration of services.
According to theIBFCSM CEDPbody of knowledge, emergency managers must distinguish between "Technical Response" and "Investigative Support." Law enforcement’s primary goal is the preservation of evidence for prosecution, which can sometimes conflict with the organization’s need for rapid service restoration. Therefore, a well-designed Incident Response Plan (IRP) ensures that the technical team stabilizes the "patient" (the network) first. Only once the threat is neutralized and the impact is understood should the organization transition its resources toward external reporting and legal proceedings. For most local cyber incidents, federal agencies (like the FBI or CISA) are often more relevant than local law enforcement, further lowering the priority of a "local" report during the high-stress execution phase of the response.
U.S. disaster management efforts adhere to what type of authority model?
Coordinated
Vertical
Bureaucratic
The Answer Is:
BExplanation:
U.S. disaster management, as codified in theNational Incident Management System (NIMS)and theIncident Command System (ICS), adheres to aVerticalauthority model. This model is defined by a clearChain of Commandand a top-down reporting structure. In every incident, there is a singleIncident Commander (IC)(or a Unified Command group acting as one) at the top of the hierarchy. Orders, objectives, and strategic priorities flow vertically downward from the IC through Section Chiefs to tactical personnel in the field.
The vertical model is essential forAccountabilityandUnity of Command. It ensures that every individual involved in the response reports to exactly one supervisor, preventing the confusion of conflicting orders that often occurs in "coordinated" but non-hierarchical (Option A) or overly "bureaucratic" (Option C) systems. While the response involves thecoordinationof many agencies, theauthorityto make life-safety decisions remains vertical to ensure speed and efficiency. As an incident grows, the structure expands modularly, adding layers of supervision (Branches, Divisions, Groups) to maintain a manageableSpan of Control, but the vertical integrity of the command remains intact.
According to theCEDPcurriculum, this verticality is what allows for "Interoperability." Because every jurisdiction in the U.S. uses this same vertical ICS model, a firefighter from California can report into a vertical structure in Florida and immediately understand who they work for and who is in charge of the scene. This "Paramilitary" structure is the proven method for managing high-consequence, high-velocity events where decentralized or horizontal decision-making would lead to delays and increased risk to life.
What is the purpose of validating capabilities using drills and exercises?
Identifying planning gaps
Preventing unwanted outcomes
Collecting threat and risk data
The Answer Is:
AExplanation:
The primary purpose of validating capabilities throughdrills and exercises, as defined by theHomeland Security Exercise and Evaluation Program (HSEEP), isidentifying planning gapsand areas for improvement. Exercises provide a "no-fault" environment to test whether the policies, procedures, and resources described in an Emergency Operations Plan (EOP) actually work in a simulated real-world scenario. Without validation, a plan is merely a set of untested assumptions.
Validation through exercises serves several critical functions:
Clarifying Roles:Ensuring every agency knows its specific responsibilities under theIncident Command System (ICS).
Resource Verification:Confirming that the equipment and personnel "typed" in the plan are actually available and functional.
Revealing Gaps:Identifying if communications are not interoperable, if triage protocols are too slow, or if the "span of control" is too wide.
While Option B (Preventing unwanted outcomes) is a long-term goal of theentirepreparedness program, an exercise itself cannot "prevent" a real-world disaster; it can only prepare you for it. Option C (Collecting threat data) is part of theTHIRA/HVAprocess that happensbeforethe exercise is designed. According to theCEDPcurriculum, the "output" of an exercise is theAfter-Action Report (AAR)and theImprovement Plan (IP). These documents formally list the identified gaps and assign tasks to fix them. By systematically identifying and closing these planning gaps, an organization builds a higher level of "Realized Capability," ensuring that when a real disaster occurs, the response is characterized by competence and coordination rather than confusion and failure.
What legislation does EPA use to enforce hazardous materials waste disposal laws?
Resource Conservation and Recovery Act (RCRA)
Universal Waste Act
Toxic Substances Control Act
The Answer Is:
AExplanation:
TheResource Conservation and Recovery Act (RCRA)is the primary federal law that gives the Environmental Protection Agency (EPA) the authority to control hazardous waste from the "cradle-to-grave."12This includes the generation, transportation, treatment, storage, and disposal of hazardous waste. RCRA was enacted in 1976 to address the growing public health and environmental threats posed by industrial waste and "midnight dumping."13
RCRA is divided into several "Subtitles."14Subtitle Cis the most relevant for hazardous materials, as it establishes a comprehensive system for managing "characteristic" hazardous waste (ignitability, corrosivity, reactivity, and toxicity) and "listed" hazardous waste. The law requires that all hazardous waste be tracked using aUniform Hazardous Waste Manifest, ensuring that the waste is handled properly at every stage until it reaches a permitted Treatment, Storage, and Disposal Facility (TSDF).
For aCEDPprofessional, RCRA is critical during theRecoveryphase of a disaster. Large-scale events often generate massive amounts of "Disaster Debris," which may be contaminated with chemicals, asbestos, or lead-based paint. Under RCRA, the EPA ensures that this waste is not simply dumped into local landfills, which could lead to groundwater contamination.15Instead, the EPA provides guidance on the "segregation" of waste streams. While theToxic Substances Control Act (TSCA)(Option C) regulates specific chemicals like PCBs and lead, and "Universal Waste" (Option B) is a categorywithinRCRA for common items like batteries, it is theRCRAitself that provides the overarching regulatory and enforcement framework for the entire hazardous waste industry.16
What alternative describes the mission of the Emergency Response Interoperability Center (ERIC)?
Operating the 700 MHz public broadband wireless network
Providing situation reports to on-site leadership and key agencies
Coordinating communication restoration priorities for key sectors
The Answer Is:
AExplanation:
TheEmergency Response Interoperability Center (ERIC)was established within theFederal Communications Commission (FCC)specifically to promote the development and use of the700 MHz public safety broadband wireless network. Its mission is to ensure that this high-speed data network is fully interoperable across different jurisdictions and agencies, allowing police, fire, and EMS to share video, data, and maps seamlessly during a disaster.
Before the creation of ERIC and the subsequent development ofFirstNet, public safety communications were often fragmented across different frequency bands and proprietary technologies. ERIC was tasked with creating the technical standards and "rules of the road" for the 700 MHz band to prevent the interoperability failures seen during 9/11 and Hurricane Katrina. While coordinating restoration (Option C) is a role ofESF #2 (Communications)and situation reports (Option B) are a general EOC function, the specific "mission" of ERIC is tied to the technical implementation of the national broadband infrastructure for first responders.
For aCertified Emergency and Disaster Professional (CEDP), understanding the role of ERIC/FirstNet is critical for modernizing a community'sInteroperable Communications Plan. This high-speed network allows for the use of advanced tools like real-time drone footage, remote medical monitoring, and tablet-based incident management. By ensuring that the 700 MHz network is standardized and interoperable, ERIC provides the "digital highway" that supports theCommon Operating Picture (COP), ensuring that life-saving data can flow freely between agencies, regardless of their badge or city of origin.
What term describes a type of human hazard that would be excluded from classification listings of chemical agents that could be used as a terrorist weapon?
Blood agents
Blister agents
Liver agents
The Answer Is:
CExplanation:
In the classification of chemical warfare agents (CWA) and toxic industrial chemicals (TICs) used in terrorism and disaster planning, the termLiver agentsis not a recognized category. Traditional chemical threats are classified based on their physiological effects on the human body into four primary categories:Nerve agents,Blister agents(Vesicants),Blood agents(Cyanides), andChoking agents(Pulmonary agents).
Blood agents(Option A), such as Hydrogen Cyanide, interfere with the body's ability to use oxygen at the cellular level.Blister agents(Option B), such as Sulfur Mustard or Lewisite, cause severe chemical burns on the skin and respiratory tract. While some chemicals may eventually cause organ damage (including hepatotoxicity or liver damage) as a secondary effect or through long-term chronic exposure, "Liver agent" is not a tactical classification used by the CDC, OSHA, or the Organization for the Prohibition of Chemical Weapons (OPCW) to describe acute terrorist weaponry.
For the Certified Emergency and Disaster Professional (CEDP), recognizing these classifications is vital for identifying the correct medical countermeasures and Personal Protective Equipment (PPE). For example, Nerve agents require the rapid administration of atropine and 2-PAM chloride, whereas Blood agents require cyanide antidotes. By focusing on the recognized classifications—Nerve, Blister, Blood, and Choking—emergency managers can streamline their detection protocols and triage processes. Excluding non-standard terms like "Liver agents" ensures that responders stay focused on the acute, life-threatening symptoms associated with the most likely chemical terrorist threats.
What element would not serve as a basic building block of cyber-security efforts?
Automation
Interoperability
Encryption
The Answer Is:
BExplanation:
In the domain of cybersecurity,Interoperabilityis generally not considered a "building block" of security itself; in fact, in many critical infrastructure contexts, interoperability can actuallyincreasevulnerability if not managed correctly. While interoperability is a foundational goal forEmergency Communications(allowing different radios to talk to each other), in cybersecurity, the focus is onSegmentationandAccess Control.
The actual building blocks of a robust cybersecurity strategy, as outlined by theNIST Cybersecurity Framework, include:
Encryption (Option C):Protecting data at rest and in transit so that it cannot be read by unauthorized parties.
Automation (Option A):Using automated tools for threat detection, patch management, and incident response to keep up with the speed of modern cyber-attacks.
Authentication:Verifying the identity of users and devices.
Interoperability (Option B) refers to the ability of different systems to exchange and use information. While important for business efficiency and disaster coordination, it often creates "lateral movement" opportunities for hackers. If a public works water system is highly interoperable with the city’s general Wi-Fi network, a breach in the Wi-Fi could lead to a breach in the water controls.
For theCEDPcandidate, it is crucial to distinguish between "Information Management" goals and "Security" goals. While we want systems to talk to each other during a disaster (Interoperability), we must secure those connections through encryption and monitor them through automation. Therefore, interoperability is anoperationalrequirement that cybersecurity mustprotect, but it is not a tool used tocreatesecurity.
What NRF sectors rely heavily on other sectors for operational continuity?
Communications and Emergency Services Sectors
Energy and Information Technology Sectors
Healthcare and Public Health Sectors
The Answer Is:
BExplanation:
In the framework of theNational Response Framework (NRF)and theNational Infrastructure Protection Plan (NIPP), theEnergy and Information Technology (IT)sectors are identified as the most critical "enabling" sectors. These two sectors are characterized by their deep "interdependency," meaning that almost every other critical infrastructure sector—including Water, Transportation, and Healthcare—relies on them to function. This concept is often referred to as "cascading failure" risk: if the Energy or IT sector fails, the operational continuity of all other sectors is immediately compromised.
TheEnergy Sectorprovides the "fuel" for the nation's economy and life-safety systems. Without electricity or liquid fuels, water pumps stop, hospitals revert to limited battery power, and communication towers fail. Similarly, theIT Sectorprovides the "brains" of modern infrastructure. Most critical infrastructure now relies on Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that are managed via IT networks. The NRF highlights that a cyber-attack on the IT sector can "blind" the Energy sector, just as a power outage can "silence" the IT sector.
According to theCEDPbody of knowledge, understanding these dependencies is the key toBusiness Continuity Planning (BCP). Emergency managers must realize that their "internal" plans are only effective if the "external" dependencies of Energy and IT remain stable. For example, a hospital's EOP might be perfect, but if the local IT provider suffers a data breach or the regional power grid collapses for an extended period, the hospital's ability to maintain electronic health records or operate laboratory equipment is lost. This is why federal resilience efforts focus heavily on "hardening" these two specific sectors. By ensuring that the "enabling" sectors are resilient, the government creates a foundation that supports the operational continuity of the entire "Whole Community" during and after a catastrophic event.