0% found this document useful (0 votes)
224 views8 pages

Rutgers Final Exam Conflict Guide

This document contains a national security test with 38 multiple choice questions covering topics in terrorism and counterterrorism. The questions assess knowledge of key historical events like the Munich massacre, organizations like the GSG-9 and Delta Force, concepts like radicalization and hawala banking networks, tactics like improvised explosive devices and suicide bombings, and legislation like the Patriot Act. The test examines terrorism from several perspectives including religious, left-wing, right-wing, and transnational forms.

Uploaded by

Matthew Perry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
224 views8 pages

Rutgers Final Exam Conflict Guide

This document contains a national security test with 38 multiple choice questions covering topics in terrorism and counterterrorism. The questions assess knowledge of key historical events like the Munich massacre, organizations like the GSG-9 and Delta Force, concepts like radicalization and hawala banking networks, tactics like improvised explosive devices and suicide bombings, and legislation like the Patriot Act. The test examines terrorism from several perspectives including religious, left-wing, right-wing, and transnational forms.

Uploaded by

Matthew Perry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

National Security 2nd test – master copy Name_________________________________________

Fall 2017
Select the Best Answer

1. What was the turning point in the Western world’s indifference toward terrorism?
a. the King David Hotel
b. Operation Nimrod
c. the Munich massacre (Ref: page 250)
d. the Entebbe raid

2. ______________________ are the watchwords of the British Special Air Services.


a. Kill rather than be killed
b. Trained professionals
c. Secrecy and surprise (Ref: page 255)
d. Prepared and aware

3. The German unit that formed when the Bavarian State Police was unable to deal with the Munich
situation is known as the
a. Grenzschutzgruppe 9 (GSG-9). (Ref: page 258)
b. Central Intelligence Agency (CIA).
c. Special Air Services (SAS).
d. Long Range Reconnaissance Patrol (LRRP).

4. The _______________________ was established by the Department of Defense under


congressional orders as a single command for all of the special operations units.
a. Federal Bureau of Investigations
b. Delta Force
c. U.S. Special Operations Command (Ref: page 260)
d. Green Berets

5. ________________________ are highly mobile infantry able to deploy quickly anywhere in the
world.
a. SEAL teams
b. Green Beret detachments
c. Air Force Special Operations
d. Ranger units (Ref: pages 261-262)

6. The surreptitious searches authorized by warrants from FISA courts are known as a
a. trap and trace.
b. sneak and peek. (Ref: page 278)
c. roving wiretap.
d. target searches.

7. The PATRIOT Act enhances ______________________ authority for law enforcement enabling
greater access to suspect communication.
a. evidentiary
b. detention
c. electronic surveillance (Ref: page 277)
d. military force
8. Administrative subpoenas requiring no probable cause or judicial oversight provisions are known
as
a. National Security Letters. (Ref: page 279)
b. FISA warrants.
c. Alien and Sedition affidavits.
d. SIOC depositions.

9. The Alien and Sedition provisions of the PATRIOT Act make an unknowing association with a
terrorist a ___________________ offense.
a. felony
b. misdemeanor
c. petty
d. deportable (Ref: page 277)

10. Socialization toward politically violent extremism and terrorism is known as


a. desocialization.
b. radicalization. (Ref: page 67)
c. revenge.
d. religious fanaticism.

11. Religious advocacy that involves a pattern of violently deadly opposition to anyone not in
agreement with the faith is known as
a. a demographic trend.
b. religious fanaticism. (Ref: page 71)
c. socialization.
d. group dynamics.

12. Demographic trends in terrorist groups show a/an _________________ in age within the group.
a. increase
b. static level
c. decrease (Ref: page 73)
d. stagnation

13. Female terrorists are


a. not assigned life-threatening roles.
b. less loyal to the group.
c. less nurturing.
d. tougher and more fanatical than their male counterparts. (Ref: page 75)

14. Family, community, and religion offer ______________ for young people to carry out extreme acts
of violence against perceived enemies of their faith.
a. support (Ref: page 80)
b. scholarships
c. no compensation
d. no assistance

15. ________________ is the government’s efforts to create a complete change in a national lifestyle
through internal terrorism.
a. Coerced conversion (Ref: page 85)
b. Intimidation
c. Genocide
d. Torture

16. An example of genocide in which one million people died because of Communism in just a four-
year period can be found in
a. Cambodia. (Ref: page 86)
b. Nazi Germany.
c. Rwanda.
d. Bosnia and Herzegovina.

17. What country has been active in offering arms and safe haven in the support of terrorism?
a. Turkey
b. Israel
c. Greece
d. Syria (Ref: page 99)

18. Violent civil disobedience of Palestinians in the occupied territories to Israeli rule is known as the
a. madrassas.
b. jihad.
c. intifada. (Ref: page 101)
d. fedayeen.

19. __________________ is an informal Islamic banking network that links global brokers who
advance funds to depositors through a handshake.
a. Intifada
b. Hawala (Ref: page 118)
c. Fedayeen
d. Madrassas

20. ______________________ is known as the “central banker” of terrorism.


a. Syria
b. Saudi Arabia
c. Libya
d. Iran (Ref: page 120)

21. Which country in the Western hemisphere offered training to terrorist groups until the fall of the
Soviet Union?
a. Cuba (Ref: page 132)
b. Nicaragua
c. Columbia
d. Peru

22. ______________________ is a system in which individual instructors offer terrorism skills classes
at different locations.
a. Safe haven
b. Traveling terrorist training (Ref: page 136)
c. Mobile camp
d. Clandestine travel

23. Disseminating misinformation designed to confuse the enemy is known as


a. counterintelligence. (Ref: page 140)
b. intelligence collection.
c. miscommunication.
d. extortion.

24. A(n) __________________ is a homemade bomb designed to maim or kill, typically thrown or left
concealed on the side of a road.
a. improvised explosive device (Ref: page 145)
b. precision-guided munition
c. antirocket launcher
d. beehive bomb

25. The primary motivation for most suicide bombers is


a. to commit suicide.
b. to create a mood of fear. (Ref: pages 156-157)
c. mental illness.
d. ineptitude.

26. The _____________________ phase does not occur in every terrorist incident.
a. preincident
b. initiation
c. negotiation (Ref: page 160)
d. termination

27. What term best describes terrorist activities that are broadcast through the media to a much larger
audience than would normally be available?
a. mass-mediated terrorism
b. publicity
c. the amplification effect (Ref: page 171)
d. disinformation

28. A legal charge indicating active participation of a primary or secondary nature in terrorist events is
known as
a. complicity. (Ref: page 180)
b. conspiracy.
c. interference.
d. collusion.

29. The ______________________ is the impact of the media on terrorists to commit more and more
bizarre and cruel acts in an attempt to gain attention.
a. aggression model
b. interactive relationship
c. built-in escalation imperative (Ref: page 183)
d. application effect

30. ________________________ is accomplished by generating a sense of unrest, enhancing a fear


that the government is unable to offer security and stability to its people.
a. Denial of a platform
b. Criminality of act
c. Mass-mediated terrorism
d. Destabilizing the enemy (Ref: page 167)
31. What is a media goal in a terrorist event?
a. information and cooperation
b. criminality of the act
c. getting a scoop (Ref: page 169)
d. publicity

32. Inaccurate information designed to confuse is known as


a. duplicity
b. propaganda
c. destabilization
d. disinformation (Ref: page 169)

33. What legislation was passed in 1871 that imposed heavy penalties on terrorist organizations?
a. the Civil Rights Act
b. the Ku Klux Klan Act (Ref: page 192)
c. the Patriot Act
d. the Intelligence Reform and Terrorist Prevention Act

34. ______________________ are groups motivated by a desire to rebel against or radically change
the political system through the use of terrorist tactics.
a. Cyberterrorists
b. Transnational terrorists
c. Right-wing terrorists
d. Left-wing terrorists (Ref: page 194)

35. A left-wing group in the United States active during the1960s that eventually lost support due to
unsuccessful efforts in carrying out acts of violence was the
a. Earth Liberation Front.
b. Weather Underground. (Ref: page 195)
c. Armed Forces of National Liberation.
d. Aryan Nations.

36. The ______________________ is an example of a single-issue, left-wing extremism group.


a. Ku Klux Klan
b. Christian Identity Movement
c. Animal Liberation Front (Ref: page 198)
d. Students for a Democratic Society

37. What terrorist event made the United States aware for the first time of its vulnerability to attacks
from transnational terrorist agents?
a. the World Trade Center bombing in 1993 (Ref: page 207)
b. the Oklahoma City bombing
c. the U.S. embassies bombing in Kenya and Tanzania
d. the attack on the USS Cole

38. Persons taking no active part in hostilities are known as


a. combatants.
b. protected persons.
c. civilian noncombatants. (Ref: page 222)
d. hostis humanis generis.
39. The ______________________ refers to the need for the loss of civilian life to be minimal
compared to the military advantage gained.
a. novation
b. provisions of jurisdiction
c. loophole in the law
d. rule of proportionality (Ref: page 225)

40. ______________________ is the process of sending a person to another state for prosecution.
a. Attenuation
b. Expatriation
c. Extradition (Ref: page 228)
d. Expulsion

41. ________________ are states that have signed United Nations conventions.
a. Parties
b. Participants
c. Signatories (Ref: page 242)
d. Members

42. The objective of hardening a target against which an attack may be made is known as
_______________________ security.
a. operational
b. personnel
c. physical (Ref: page 301)
d. terrorist

43. ________________________ teams discover holes in security systems through which terrorist
attack teams could presumably penetrate and sabotage or destroy the target.
a. Penetration (Ref: page 301)
b. Incursion
c. Personnel
d. Invasion

44. A security weakness of airplane cockpits is the


a. frames.
b. windows.
c. doors. (Ref: page 306)
d. controls.

45. Nations and individuals use ____________________ to determine the potential risk of terrorism.
a. terrorist evaluations
b. threat assessments (Ref: page 317)
c. security appraisals
d. defense checklists

46. What is used to evaluate the vulnerability of a particular target to terrorism?


a. security inventories
b. protection reviews
c. local threat indicators
d. specific threat indicators (Ref: page 318)
47. What is considered a new phenomenon in terrorism?
a. It is less lethal.
b. Terrorists are not well financed.
c. It is almost completely transnational. (Ref: page 358)
d. There is no access to weapons of mass destruction.

48. Since 2000, the volume of terrorist incidents has ________________ in number every year.
a. doubled
b. tripled
c. increased (Ref: page 366)
d. decreased

49. Which of the below terrorist groups is currently experiencing difficulties due to the generational
differences that exist in the group?
a. HAMAS (Ref: page 373)
b. the PLO
c. Hezbollah
d. the PFLP

50. Why do terrorists prefer the use of Improvised Explosive Devices?


a. IEDs are very reliable.
b. IEDs are not letha.l
c. IEDs are difficult to detect. (Ref: page 373)
d. IEDs represent the newest technology.
National Security 2nd test – master copy Name_________________________________________
Fall 2017
Select the Best Answer

1. 2. 3. 4. 5.

6. 7. 8. 9. 10.

11. 12. 13. 14. 15.

16. 17. 18. 19. 20.

21. 22. 23. 24. 25.

26. 27. 28. 29. 30.

31. 32. 33. 34. 35.

36. 37. 38. 39. 40.

41. 42. 43. 44. 45.

46. 47. 48. 49. 50.

You might also like