We thoroughly check each answer to a question to provide you with the most correct answers. Found a mistake? Tell us about it through the REPORT button at the bottom of the page. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions.
The FEMA IS-395 course teaches building professionals how to prepare risk assessments using a database.
The course covers downloading and installing the database, conducting assessments, performing Rapid Visual Screenings, and managing the assessment program.
The primary audience includes building sciences and design professionals, building owners, operators, and managers in public and private institutions, and COOP community members. The course was published on 10/31/2013.
IS-395: FEMA Risk Assessment Database Answers
Question | Answer |
---|---|
Starting from the Master Database Main Menu, how do you import an assessment into the Master Database? | Left-click on Administrative Functions and then select Import Assessor Database |
The first photo uploaded to the Assessment Tool is automatically set as the default image displayed each time the assessment is accessed. | False |
On the Rapid Visual Screening Data Collection screens, what is the function of the Comments check box? | Indicates that a response to a question may be a vulnerability requiring immediate attention |
Which of the following user accounts is NOT preloaded in the database? | Read Only |
Which of the following is NOT an acceptable user password? | NGC5139 |
On the Rapid Visual Screening Data Collection screens, what is the function of the “?” button? | Provides additional information as well as an extract of the Rapid Visual Screening publication and page number |
As a best practice, an organization should _. | Load one copy on a computer at your organization’s headquarters operating in the Master Database mode |
When you empty the database, it deletes _. | All assessments, files, and folders |
When customizing the Critical Infrastructure defaults, you can delete labels but you cannot add additional labels to the existing defaults. | True |
On the Rapid Visual Screening Data Collection screens, a red flag generates a mandatory comment field to support the assessor’s decision. | True |
What function is selected to erase a single assessment in the database, permanently? | Select the Delete an Assessment button. |
When you need to upload photos, GIS images, or miscellaneous files, how many files can you upload at one time? | 1 file or all files in a folder |
In order to change the permission level of a user, you must open the Assessment Tool in Master Database Mode and _. | Left-click on Administrative Functions and then select Manage User Accounts |
At the end of the assessment, which function will the assessment team leader use in the Assessment Tool operating mode to combine the team’s checklist, vulnerability, and recommendation entries into one record? | Import Checklist |
Which of the following is NOT a minimum system requirement to install the database? | Microsoft Internet Explorer 7 or higher |
When deleting an assessment record, the files and folders under that assessment are not deleted unless you select the Yes button to delete them. | True |
The order of your user-customized list within the risk matrices can be changed except for: | The first ten of the Critical Infrastructure List |
The Master Database mode of the database provides the organization the ability to search for vulnerabilities common to many assessed facilities. | True |
Changes to the report handling markings can only be made by those logged on with administrator permission. | True |
The Vulnerability Assessment Checklist function gives the Project Manager or an assessor the ability to view _ answers for individual checklist questions. | All |
Which of the following is NOT a file type that the database will recognize for the “Photos” and “GIS Portfolio” folders? | .tif |
In the Other Reports Menu, the Administrator/Manager can search the Vulnerabilities and Recommendations/Remediations form, but he/she is limited to the assessment currently being viewed. | False |
What are the proper steps to open the Assessment Tool? | Left-click on Start, Programs, and then the FEMA Master Assessment Database icon. |
One way you can get vulnerabilities and recommendations/remediations into the fields on the Vulnerabilities tab is by clicking the “Vuln?” box on a site checklist Tab. | True |
On the Rapid Visual Screening Data Collection screens, what is the function of the Red Flag check box? | Indicates that a response to a question may be a vulnerability requiring immediate attention |