National Security 2nd test – master copy Name_________________________________________
Fall 2017
Select the Best Answer
1. What was the turning point in the Western world’s indifference toward terrorism?
a. the King David Hotel
b. Operation Nimrod
c. the Munich massacre (Ref: page 250)
d. the Entebbe raid
2. ______________________ are the watchwords of the British Special Air Services.
a. Kill rather than be killed
b. Trained professionals
c. Secrecy and surprise (Ref: page 255)
d. Prepared and aware
3. The German unit that formed when the Bavarian State Police was unable to deal with the Munich
situation is known as the
a. Grenzschutzgruppe 9 (GSG-9). (Ref: page 258)
b. Central Intelligence Agency (CIA).
c. Special Air Services (SAS).
d. Long Range Reconnaissance Patrol (LRRP).
4. The _______________________ was established by the Department of Defense under
congressional orders as a single command for all of the special operations units.
a. Federal Bureau of Investigations
b. Delta Force
c. U.S. Special Operations Command (Ref: page 260)
d. Green Berets
5. ________________________ are highly mobile infantry able to deploy quickly anywhere in the
world.
a. SEAL teams
b. Green Beret detachments
c. Air Force Special Operations
d. Ranger units (Ref: pages 261-262)
6. The surreptitious searches authorized by warrants from FISA courts are known as a
a. trap and trace.
b. sneak and peek. (Ref: page 278)
c. roving wiretap.
d. target searches.
7. The PATRIOT Act enhances ______________________ authority for law enforcement enabling
greater access to suspect communication.
a. evidentiary
b. detention
c. electronic surveillance (Ref: page 277)
d. military force
8. Administrative subpoenas requiring no probable cause or judicial oversight provisions are known
as
a. National Security Letters. (Ref: page 279)
b. FISA warrants.
c. Alien and Sedition affidavits.
d. SIOC depositions.
9. The Alien and Sedition provisions of the PATRIOT Act make an unknowing association with a
terrorist a ___________________ offense.
a. felony
b. misdemeanor
c. petty
d. deportable (Ref: page 277)
10. Socialization toward politically violent extremism and terrorism is known as
a. desocialization.
b. radicalization. (Ref: page 67)
c. revenge.
d. religious fanaticism.
11. Religious advocacy that involves a pattern of violently deadly opposition to anyone not in
agreement with the faith is known as
a. a demographic trend.
b. religious fanaticism. (Ref: page 71)
c. socialization.
d. group dynamics.
12. Demographic trends in terrorist groups show a/an _________________ in age within the group.
a. increase
b. static level
c. decrease (Ref: page 73)
d. stagnation
13. Female terrorists are
a. not assigned life-threatening roles.
b. less loyal to the group.
c. less nurturing.
d. tougher and more fanatical than their male counterparts. (Ref: page 75)
14. Family, community, and religion offer ______________ for young people to carry out extreme acts
of violence against perceived enemies of their faith.
a. support (Ref: page 80)
b. scholarships
c. no compensation
d. no assistance
15. ________________ is the government’s efforts to create a complete change in a national lifestyle
through internal terrorism.
a. Coerced conversion (Ref: page 85)
b. Intimidation
c. Genocide
d. Torture
16. An example of genocide in which one million people died because of Communism in just a four-
year period can be found in
a. Cambodia. (Ref: page 86)
b. Nazi Germany.
c. Rwanda.
d. Bosnia and Herzegovina.
17. What country has been active in offering arms and safe haven in the support of terrorism?
a. Turkey
b. Israel
c. Greece
d. Syria (Ref: page 99)
18. Violent civil disobedience of Palestinians in the occupied territories to Israeli rule is known as the
a. madrassas.
b. jihad.
c. intifada. (Ref: page 101)
d. fedayeen.
19. __________________ is an informal Islamic banking network that links global brokers who
advance funds to depositors through a handshake.
a. Intifada
b. Hawala (Ref: page 118)
c. Fedayeen
d. Madrassas
20. ______________________ is known as the “central banker” of terrorism.
a. Syria
b. Saudi Arabia
c. Libya
d. Iran (Ref: page 120)
21. Which country in the Western hemisphere offered training to terrorist groups until the fall of the
Soviet Union?
a. Cuba (Ref: page 132)
b. Nicaragua
c. Columbia
d. Peru
22. ______________________ is a system in which individual instructors offer terrorism skills classes
at different locations.
a. Safe haven
b. Traveling terrorist training (Ref: page 136)
c. Mobile camp
d. Clandestine travel
23. Disseminating misinformation designed to confuse the enemy is known as
a. counterintelligence. (Ref: page 140)
b. intelligence collection.
c. miscommunication.
d. extortion.
24. A(n) __________________ is a homemade bomb designed to maim or kill, typically thrown or left
concealed on the side of a road.
a. improvised explosive device (Ref: page 145)
b. precision-guided munition
c. antirocket launcher
d. beehive bomb
25. The primary motivation for most suicide bombers is
a. to commit suicide.
b. to create a mood of fear. (Ref: pages 156-157)
c. mental illness.
d. ineptitude.
26. The _____________________ phase does not occur in every terrorist incident.
a. preincident
b. initiation
c. negotiation (Ref: page 160)
d. termination
27. What term best describes terrorist activities that are broadcast through the media to a much larger
audience than would normally be available?
a. mass-mediated terrorism
b. publicity
c. the amplification effect (Ref: page 171)
d. disinformation
28. A legal charge indicating active participation of a primary or secondary nature in terrorist events is
known as
a. complicity. (Ref: page 180)
b. conspiracy.
c. interference.
d. collusion.
29. The ______________________ is the impact of the media on terrorists to commit more and more
bizarre and cruel acts in an attempt to gain attention.
a. aggression model
b. interactive relationship
c. built-in escalation imperative (Ref: page 183)
d. application effect
30. ________________________ is accomplished by generating a sense of unrest, enhancing a fear
that the government is unable to offer security and stability to its people.
a. Denial of a platform
b. Criminality of act
c. Mass-mediated terrorism
d. Destabilizing the enemy (Ref: page 167)
31. What is a media goal in a terrorist event?
a. information and cooperation
b. criminality of the act
c. getting a scoop (Ref: page 169)
d. publicity
32. Inaccurate information designed to confuse is known as
a. duplicity
b. propaganda
c. destabilization
d. disinformation (Ref: page 169)
33. What legislation was passed in 1871 that imposed heavy penalties on terrorist organizations?
a. the Civil Rights Act
b. the Ku Klux Klan Act (Ref: page 192)
c. the Patriot Act
d. the Intelligence Reform and Terrorist Prevention Act
34. ______________________ are groups motivated by a desire to rebel against or radically change
the political system through the use of terrorist tactics.
a. Cyberterrorists
b. Transnational terrorists
c. Right-wing terrorists
d. Left-wing terrorists (Ref: page 194)
35. A left-wing group in the United States active during the1960s that eventually lost support due to
unsuccessful efforts in carrying out acts of violence was the
a. Earth Liberation Front.
b. Weather Underground. (Ref: page 195)
c. Armed Forces of National Liberation.
d. Aryan Nations.
36. The ______________________ is an example of a single-issue, left-wing extremism group.
a. Ku Klux Klan
b. Christian Identity Movement
c. Animal Liberation Front (Ref: page 198)
d. Students for a Democratic Society
37. What terrorist event made the United States aware for the first time of its vulnerability to attacks
from transnational terrorist agents?
a. the World Trade Center bombing in 1993 (Ref: page 207)
b. the Oklahoma City bombing
c. the U.S. embassies bombing in Kenya and Tanzania
d. the attack on the USS Cole
38. Persons taking no active part in hostilities are known as
a. combatants.
b. protected persons.
c. civilian noncombatants. (Ref: page 222)
d. hostis humanis generis.
39. The ______________________ refers to the need for the loss of civilian life to be minimal
compared to the military advantage gained.
a. novation
b. provisions of jurisdiction
c. loophole in the law
d. rule of proportionality (Ref: page 225)
40. ______________________ is the process of sending a person to another state for prosecution.
a. Attenuation
b. Expatriation
c. Extradition (Ref: page 228)
d. Expulsion
41. ________________ are states that have signed United Nations conventions.
a. Parties
b. Participants
c. Signatories (Ref: page 242)
d. Members
42. The objective of hardening a target against which an attack may be made is known as
_______________________ security.
a. operational
b. personnel
c. physical (Ref: page 301)
d. terrorist
43. ________________________ teams discover holes in security systems through which terrorist
attack teams could presumably penetrate and sabotage or destroy the target.
a. Penetration (Ref: page 301)
b. Incursion
c. Personnel
d. Invasion
44. A security weakness of airplane cockpits is the
a. frames.
b. windows.
c. doors. (Ref: page 306)
d. controls.
45. Nations and individuals use ____________________ to determine the potential risk of terrorism.
a. terrorist evaluations
b. threat assessments (Ref: page 317)
c. security appraisals
d. defense checklists
46. What is used to evaluate the vulnerability of a particular target to terrorism?
a. security inventories
b. protection reviews
c. local threat indicators
d. specific threat indicators (Ref: page 318)
47. What is considered a new phenomenon in terrorism?
a. It is less lethal.
b. Terrorists are not well financed.
c. It is almost completely transnational. (Ref: page 358)
d. There is no access to weapons of mass destruction.
48. Since 2000, the volume of terrorist incidents has ________________ in number every year.
a. doubled
b. tripled
c. increased (Ref: page 366)
d. decreased
49. Which of the below terrorist groups is currently experiencing difficulties due to the generational
differences that exist in the group?
a. HAMAS (Ref: page 373)
b. the PLO
c. Hezbollah
d. the PFLP
50. Why do terrorists prefer the use of Improvised Explosive Devices?
a. IEDs are very reliable.
b. IEDs are not letha.l
c. IEDs are difficult to detect. (Ref: page 373)
d. IEDs represent the newest technology.
National Security 2nd test – master copy Name_________________________________________
Fall 2017
Select the Best Answer
1. 2. 3. 4. 5.
6. 7. 8. 9. 10.
11. 12. 13. 14. 15.
16. 17. 18. 19. 20.
21. 22. 23. 24. 25.
26. 27. 28. 29. 30.
31. 32. 33. 34. 35.
36. 37. 38. 39. 40.
41. 42. 43. 44. 45.
46. 47. 48. 49. 50.