Deck 8: Sea Change: the New Terrorism and Homeland Security

ملء الشاشة (f)
exit full mode
سؤال
______ is regularly condemned when used in any non-warfare environment,regardless of the characteristics of the victim.

A)Use of force
B)Blind force
C)Indiscriminate force
D)Discriminate force
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following best describes a type of asymmetrical attack that has been gaining popularity among terrorists since 2014?

A)armored vehicle attacks using explosives
B)motorized vehicle attacks using unarmored,nonexplosive vehicles
C)Molotov cocktails being thrown from public transportation vehicles
D)stealing tanks from the armed forces and driving them into concerts
سؤال
What are soft targets?

A)military arsenals and combat outposts
B)civilians and passive military targets
C)naval bases and air stations
D)garrisons and military camps
سؤال
Counterterrorist experts seek to prevent terrorist groups from finalizing their plans,deter extreme activists from becoming terrorists,minimize destruction and casualties,and ______.

A)procure weapons of mass destruction to destroy disputed territories
B)use social media to infiltrate all terrorist organizations
C)implement treaties,laws,and task forces to create a counterterrorist environment
D)create stricter immigration laws
سؤال
Which of the following is considered a cause for the globalization of political violence?

A)new information technologies
B)established bureaucracies within terrorist networks
C)increased predictability of terrorist acts
D)vacuums of political leadership
سؤال
The ______ describes the emerging mode of conflict and crime in which the protagonists use network forms of organization and related doctrines,strategies,and technologies attuned to the information age.

A)Internet contagion theory
B)netwar theory
C)protagonist method
D)combatant method
سؤال
Which of the following is an attribute of the Old Terrorism?

A)loose cell-based networks
B)skillful manipulation of the media
C)political vagueness
D)a "surgical" selection of targets
سؤال
Which of the following was the most serious domestic incident of religious terrorism on United States soil prior to September 11,2001?

A)the 2000 sinking of the U.S.S.Cole in Yemen
B)the 1998 embassy bombings in Nairobi,Kenya,and Dar es Salaam,Tanzania
C)the 2000 Palestinian bombings on the Gaza strip
D)the 1993 vehicular bomb detonated at the World Trade Center by Ramzi Yousef
سؤال
The main goals of ISIS are first,to refuse to recognize the borders of Syria,Iraq,and other nations and second,______.

A)to wage war against the United States and claim all of its territory
B)to protest anti-Muslim sentiments worldwide and win converts to their faith
C)to win control of the government through legitimate,democratic means
D)to wage war to establish a renewed Islamic state that will encompass the entire Muslim world
سؤال
Which of the following is an attribute of the New Terrorism?

A)clearly identifiable organizations or movements
B)the view that civilian casualties are "collateral damage" to the intended target
C)utilization of modern networking technologies
D)focused messaging to a small,targeted national audience
سؤال
Insurgencies like those led by Mao Zedong in China,Ho Chi Minh in Vietnam,and Fidel Castro in Cuba are examples of wars of ______.

A)national liberation
B)loyalism
C)capitalism
D)traditionalism
سؤال
Beginning in the late 1960s,______ nationalists were the leading practitioners of international terrorism.

A)Palestinian
B)Israeli
C)Northern Irish
D)White
سؤال
______ terrorism is political violence conducted by groups of "true believers" who have fervent faith in the sacred righteousness of their cause.

A)Political
B)Religious
C)Environmental
D)Philosophical
سؤال
Peace processes,negotiations,and social reforms are all examples of ______.

A)conciliatory options
B)dissident action
C)diplomatic immunity
D)international immunity
سؤال
Groups from ______ and ______ figured prominently in left-wing domestic and international terrorist incidents between the 1960s and the early 1980s.

A)North Africa; Southeast Asia
B)North America; North Africa
C)Latin America; Western Europe
D)South America; Eastern Europe
سؤال
______ are conventional or unconventional adversaries who engage in armed conflict as members of regular military or irregular guerrilla fighting units.

A)Noncombatants
B)Extremists
C)Old Terrorists
D)Combatants
سؤال
Proponents of New Terrorism justify their goal of maximizing casualties because they want to attract attention to their cause,damage the economies of their enemies,make enemy populations scrutinize their demands,and ______.

A)carry out religious mandates
B)generate revenue
C)collect raw materials
D)return to traditional methods
سؤال
Current methods of fighting New Terrorism include increased homeland security measures,counterterrorist financial operations,global surveillance,identification and disruption of transnational terrorist cells,and ______.

A)publicized mediations
B)covert shadow wars
C)invitations to join NGO's
D)chemical warfare
سؤال
Experts do not know how many people count themselves as Al-Qaeda operatives,but estimates range from ______.

A)3,000 to 5,000
B)35,000 to 50,000
C)350,000 to 500,000
D)3 million to 5 million
سؤال
Which term describes the "copy-catting" phenomenon among terrorists where one terrorist group imitates another's tactics?

A)totalitarian method
B)contagion effect
C)fear dyad
D)proxy warfare method
سؤال
List three attributes of the New Terrorism profile.
سؤال
Asymmetrical warfare refers to the use of unexpected,nearly unpredictable,and unconventional methods of political violence.
سؤال
The Palestinian nationalist movement created a movement characterized by the acceptance of communal dissident terrorism as a strategy.
سؤال
During the Cold War,the United States and the U.S.S.R.engaged in a predictable pattern of behavior whereby the United States would support established governments,and the U.S.S.R.would support nationalist insurgencies.
سؤال
New Terrorism is characterized by rigid,strictly defined chains of command.
سؤال
Counterterrorism and antiterrorism are one in the same.
سؤال
List three attributes of the "Old Terrorism" profile.
سؤال
The "Old Terrorism" profile included unclear grievances promoting ambiguous causes.
سؤال
Chain networks occur when a set of actors is tied to a central node or actor and must go through that node to communicate and coordinate.
سؤال
Modern-day terrorists use unconventional methods,such as asymmetrical and indiscriminate attacks,because if they used conventional methods,they would never be a match for a superpower like the United States.
سؤال
There is no unanimity on what kind of violence constitutes an act of terrorism.
سؤال
The Internet,encryption applications,and social communication technologies are now used extensively by many terrorist groups and extremist movements.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Sea Change: the New Terrorism and Homeland Security
1
______ is regularly condemned when used in any non-warfare environment,regardless of the characteristics of the victim.

A)Use of force
B)Blind force
C)Indiscriminate force
D)Discriminate force
C
2
Which of the following best describes a type of asymmetrical attack that has been gaining popularity among terrorists since 2014?

A)armored vehicle attacks using explosives
B)motorized vehicle attacks using unarmored,nonexplosive vehicles
C)Molotov cocktails being thrown from public transportation vehicles
D)stealing tanks from the armed forces and driving them into concerts
B
3
What are soft targets?

A)military arsenals and combat outposts
B)civilians and passive military targets
C)naval bases and air stations
D)garrisons and military camps
B
4
Counterterrorist experts seek to prevent terrorist groups from finalizing their plans,deter extreme activists from becoming terrorists,minimize destruction and casualties,and ______.

A)procure weapons of mass destruction to destroy disputed territories
B)use social media to infiltrate all terrorist organizations
C)implement treaties,laws,and task forces to create a counterterrorist environment
D)create stricter immigration laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is considered a cause for the globalization of political violence?

A)new information technologies
B)established bureaucracies within terrorist networks
C)increased predictability of terrorist acts
D)vacuums of political leadership
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
The ______ describes the emerging mode of conflict and crime in which the protagonists use network forms of organization and related doctrines,strategies,and technologies attuned to the information age.

A)Internet contagion theory
B)netwar theory
C)protagonist method
D)combatant method
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is an attribute of the Old Terrorism?

A)loose cell-based networks
B)skillful manipulation of the media
C)political vagueness
D)a "surgical" selection of targets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following was the most serious domestic incident of religious terrorism on United States soil prior to September 11,2001?

A)the 2000 sinking of the U.S.S.Cole in Yemen
B)the 1998 embassy bombings in Nairobi,Kenya,and Dar es Salaam,Tanzania
C)the 2000 Palestinian bombings on the Gaza strip
D)the 1993 vehicular bomb detonated at the World Trade Center by Ramzi Yousef
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
The main goals of ISIS are first,to refuse to recognize the borders of Syria,Iraq,and other nations and second,______.

A)to wage war against the United States and claim all of its territory
B)to protest anti-Muslim sentiments worldwide and win converts to their faith
C)to win control of the government through legitimate,democratic means
D)to wage war to establish a renewed Islamic state that will encompass the entire Muslim world
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is an attribute of the New Terrorism?

A)clearly identifiable organizations or movements
B)the view that civilian casualties are "collateral damage" to the intended target
C)utilization of modern networking technologies
D)focused messaging to a small,targeted national audience
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
Insurgencies like those led by Mao Zedong in China,Ho Chi Minh in Vietnam,and Fidel Castro in Cuba are examples of wars of ______.

A)national liberation
B)loyalism
C)capitalism
D)traditionalism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
Beginning in the late 1960s,______ nationalists were the leading practitioners of international terrorism.

A)Palestinian
B)Israeli
C)Northern Irish
D)White
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
______ terrorism is political violence conducted by groups of "true believers" who have fervent faith in the sacred righteousness of their cause.

A)Political
B)Religious
C)Environmental
D)Philosophical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
Peace processes,negotiations,and social reforms are all examples of ______.

A)conciliatory options
B)dissident action
C)diplomatic immunity
D)international immunity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
Groups from ______ and ______ figured prominently in left-wing domestic and international terrorist incidents between the 1960s and the early 1980s.

A)North Africa; Southeast Asia
B)North America; North Africa
C)Latin America; Western Europe
D)South America; Eastern Europe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
______ are conventional or unconventional adversaries who engage in armed conflict as members of regular military or irregular guerrilla fighting units.

A)Noncombatants
B)Extremists
C)Old Terrorists
D)Combatants
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Proponents of New Terrorism justify their goal of maximizing casualties because they want to attract attention to their cause,damage the economies of their enemies,make enemy populations scrutinize their demands,and ______.

A)carry out religious mandates
B)generate revenue
C)collect raw materials
D)return to traditional methods
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
Current methods of fighting New Terrorism include increased homeland security measures,counterterrorist financial operations,global surveillance,identification and disruption of transnational terrorist cells,and ______.

A)publicized mediations
B)covert shadow wars
C)invitations to join NGO's
D)chemical warfare
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
Experts do not know how many people count themselves as Al-Qaeda operatives,but estimates range from ______.

A)3,000 to 5,000
B)35,000 to 50,000
C)350,000 to 500,000
D)3 million to 5 million
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which term describes the "copy-catting" phenomenon among terrorists where one terrorist group imitates another's tactics?

A)totalitarian method
B)contagion effect
C)fear dyad
D)proxy warfare method
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
List three attributes of the New Terrorism profile.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
Asymmetrical warfare refers to the use of unexpected,nearly unpredictable,and unconventional methods of political violence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Palestinian nationalist movement created a movement characterized by the acceptance of communal dissident terrorism as a strategy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
During the Cold War,the United States and the U.S.S.R.engaged in a predictable pattern of behavior whereby the United States would support established governments,and the U.S.S.R.would support nationalist insurgencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
New Terrorism is characterized by rigid,strictly defined chains of command.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
Counterterrorism and antiterrorism are one in the same.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
List three attributes of the "Old Terrorism" profile.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
The "Old Terrorism" profile included unclear grievances promoting ambiguous causes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
Chain networks occur when a set of actors is tied to a central node or actor and must go through that node to communicate and coordinate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
Modern-day terrorists use unconventional methods,such as asymmetrical and indiscriminate attacks,because if they used conventional methods,they would never be a match for a superpower like the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
There is no unanimity on what kind of violence constitutes an act of terrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
The Internet,encryption applications,and social communication technologies are now used extensively by many terrorist groups and extremist movements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.