Deck 14: Crimes in the 21st Century
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/110
Play
Full screen (f)
Deck 14: Crimes in the 21st Century
1
Which statement best summarizes the challenges associated with creating a typology of high-tech crime?
A) The crimes are so complicated it is difficult for others to understand.
B) There are so few types of high-tech crimes that it is difficult to derive enough categories.
C) The crimes are complex and contain many elements making it difficult to create distinct categories.
D) The crimes are so similar to white-collar crime that it is difficult to create a unique typology that is distinct from existing typologies.
A) The crimes are so complicated it is difficult for others to understand.
B) There are so few types of high-tech crimes that it is difficult to derive enough categories.
C) The crimes are complex and contain many elements making it difficult to create distinct categories.
D) The crimes are so similar to white-collar crime that it is difficult to create a unique typology that is distinct from existing typologies.
The crimes are complex and contain many elements making it difficult to create distinct categories.
2
Which global system is information technology (IT) the key to?
A) business
B) Internet
C) economic
D) social
A) business
B) Internet
C) economic
D) social
economic
3
Cybercrime presents a compelling challenge for the justice system and law enforcement community. Which statement does NOT accurately describe the challenge cybercrime creates?
A) Cybercrime is rapidly evolving with new schemes being created daily.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime necessitates a lighter sentence due to limited state and federal laws.
A) Cybercrime is rapidly evolving with new schemes being created daily.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime necessitates a lighter sentence due to limited state and federal laws.
Cybercrime necessitates a lighter sentence due to limited state and federal laws.
4
What type of cybercriminal is motivated by the desire to commit technological destruction?
A) cyberterrorist
B) cybervandal
C) cybertheft
D) cyberspy
A) cyberterrorist
B) cybervandal
C) cybertheft
D) cyberspy
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
5
Why is it difficult to calculate an accurate computer crime rate?
A) Computer crime is often not reported by companies.
B) Most companies exaggerate the amount of computer crime.
C) Most companies are involved in computer crime and do not want to implicit themselves.
D) Police are not interested in computer crime because it is a private matter.
A) Computer crime is often not reported by companies.
B) Most companies exaggerate the amount of computer crime.
C) Most companies are involved in computer crime and do not want to implicit themselves.
D) Police are not interested in computer crime because it is a private matter.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
6
What percentage of attacks on businesses is estimated to be in the e-commerce area?
A) 4
B) 16
C) 55
D) 61
A) 4
B) 16
C) 55
D) 61
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
7
What term refers to the situation in which pornography websites send consumers to other sites involuntarily?
A) tripping
B) mousetrapping
C) slagging
D) ping-ponging
A) tripping
B) mousetrapping
C) slagging
D) ping-ponging
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
8
What type of computer crime uses a computer to reprogram another for illicit purposes; for example, telling a bank computer to put deposits in the criminal's accounts?
A) salami slice
B) super zapping
C) Trojan horse
D) logic bomb
A) salami slice
B) super zapping
C) Trojan horse
D) logic bomb
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
9
What term refers to the use of a maintenance subroutine to supersede an antitheft program?
A) salami slicing
B) super-zapping
C) interroutining
D) program redundancy
A) salami slicing
B) super-zapping
C) interroutining
D) program redundancy
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
10
A virus program is secretly attached to the company's computer system. What type of computer crime is this an example of?
A) computer voyeurism
B) data leakage
C) the logic bomb
D) super-zapping
A) computer voyeurism
B) data leakage
C) the logic bomb
D) super-zapping
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
11
What type of computer program disrupts or destroys existing programs and networks?
A) logic bomb
B) trap door
C) virus
D) Trojan horse
A) logic bomb
B) trap door
C) virus
D) Trojan horse
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
12
In 1986, the first bootable PC virus was released. What was the virus called?
A) Melissa macro
B) Hacker's haven
C) the Brain
D) Morris worm
A) Melissa macro
B) Hacker's haven
C) the Brain
D) Morris worm
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
13
In 2003, which Internet "worm" infected hundreds of thousands of computers as the fastest spreading worm in history?
A) Trojan
B) Morris
C) Slammer
D) Earth
A) Trojan
B) Morris
C) Slammer
D) Earth
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
14
In 2004, the first webworm was launched which used Google to find new targets. What was the worm called?
A) Sony
B) Daprosy
C) Laroux
D) Santy
A) Sony
B) Daprosy
C) Laroux
D) Santy
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
15
What term is used to describe the intentional manipulation of the securities marketplace through the use of the Internet for the purposes of profit?
A) Internet fraud
B) Internet manipulation
C) e-fraud
D) electronic fraud
A) Internet fraud
B) Internet manipulation
C) e-fraud
D) electronic fraud
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
16
George posts negative information about a particular company in an attempt to reduce stock price. Once the price has lowered, George purchases the stock before the company is able to reverse the negative damage and re-inflate the stock price. What crime has George committed?
A) fraudulent stock exchange
B) illegal touting
C) illegal infringement
D) market manipulation
A) fraudulent stock exchange
B) illegal touting
C) illegal infringement
D) market manipulation
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
17
Identity theft is a type of cybercrime that has grown at surprising rates over the past few years. Which statement does NOT accurately describe identity theft?
A) Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B) Opening new lines of credit is the most common goals of credit card thieves.
C) Some identity theft schemes are extremely elaborate.
D) Much is known about the extent of identity theft.
A) Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B) Opening new lines of credit is the most common goals of credit card thieves.
C) Some identity theft schemes are extremely elaborate.
D) Much is known about the extent of identity theft.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a common phishing scam?
A) account verification scams in which the victim is directed to a bogus website by clicking the legitimate-looking address
B) the Nigerian 419 scam in which an alleged representative of a foreign government asking the victim to help move money from one account to another
C) a free credit report through Experian, TransUnion, and Equifax
D) an e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling
A) account verification scams in which the victim is directed to a bogus website by clicking the legitimate-looking address
B) the Nigerian 419 scam in which an alleged representative of a foreign government asking the victim to help move money from one account to another
C) a free credit report through Experian, TransUnion, and Equifax
D) an e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
19
Which term refers to phishing; that is, the act of setting up phony websites to gain access to personal information?
A) e-hooking
B) e-tailing
C) vishing
D) spoofing
A) e-hooking
B) e-tailing
C) vishing
D) spoofing
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
20
What is the purpose of phishing?
A) to make connections in order launder money
B) to protect against potential internet scams
C) to gain access to personal information
D) to fence illegal goods
A) to make connections in order launder money
B) to protect against potential internet scams
C) to gain access to personal information
D) to fence illegal goods
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
21
What term refers to the use of computer networks to illegally acquire privileged information?
A) e-tailing fraud
B) cyberterrorism
C) cyberwar
D) cyberespionage
A) e-tailing fraud
B) cyberterrorism
C) cyberwar
D) cyberespionage
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
22
What is a method used by terrorist groups to acquire funds to carry out operations?
A) collecting donations using fraudulent charities websites
B) threatening existing organizations with a denial-of-service attack
C) using profits from illegal touting scams
D) using profits from selling illegal goods on the Internet
A) collecting donations using fraudulent charities websites
B) threatening existing organizations with a denial-of-service attack
C) using profits from illegal touting scams
D) using profits from selling illegal goods on the Internet
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
23
Why is international cooperation required for the control of cybercrime?
A) It is too expensive to combat cybercrime on the national level.
B) Cybercrime can operate from anywhere in the world making it a global matter to control.
C) International efforts are required to detect cybercrime.
D) Recognizing cybercrime at the international level will act as more of a deterrent to cybercriminals.
A) It is too expensive to combat cybercrime on the national level.
B) Cybercrime can operate from anywhere in the world making it a global matter to control.
C) International efforts are required to detect cybercrime.
D) Recognizing cybercrime at the international level will act as more of a deterrent to cybercriminals.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
24
What is the name of the first international treaty that was created to address the cybercrime?
A) the Internet Crime Treaty
B) the Convention on Cybercrime
C) the Treaty of Cybercrime Enforcement
D) the Declaration of Cybercrime Prevention
A) the Internet Crime Treaty
B) the Convention on Cybercrime
C) the Treaty of Cybercrime Enforcement
D) the Declaration of Cybercrime Prevention
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
25
What is type of crime is website damage or defacement?
A) cybervandalism
B) cyberterrorism
C) cyberespionage
D) cybertheft
A) cybervandalism
B) cyberterrorism
C) cyberespionage
D) cybertheft
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
26
What generally motivates cybervandals?
A) thrill
B) need
C) greed
D) malice
A) thrill
B) need
C) greed
D) malice
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
27
Which reason often motivates Internet crimes?
A) revenge against an enemy
B) a need to exhibit technical skills and prowess
C) a need to spy on other people's private information
D) a need to make cash with computer ransom
A) revenge against an enemy
B) a need to exhibit technical skills and prowess
C) a need to spy on other people's private information
D) a need to make cash with computer ransom
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
28
What type of threat is represented by Titan Rain?
A) cyberfraud
B) cyberterrorism
C) cyberespionage
D) cyberstalking
A) cyberfraud
B) cyberterrorism
C) cyberespionage
D) cyberstalking
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following led to the emergence of a national gang syndicate?
A) the advent of the Internet
B) the implementation of prohibition
C) changing values in society
D) weak law enforcement strategies
A) the advent of the Internet
B) the implementation of prohibition
C) changing values in society
D) weak law enforcement strategies
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
30
Besides narcotics distribution and Internet pornography, what generates most organized crime income?
A) charitable funds
B) terrorism
C) human trafficking
D) labour unions
A) charitable funds
B) terrorism
C) human trafficking
D) labour unions
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
31
What term best describes international covert crime activities that involve large networks of people?
A) national crime organizations
B) the Mafia
C) international crime groups
D) transnational organized crime
A) national crime organizations
B) the Mafia
C) international crime groups
D) transnational organized crime
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
32
What term is used to describe a crime that is committed in more than one state by the same criminal organization?
A) international
B) transnational
C) regional
D) intercontinental
A) international
B) transnational
C) regional
D) intercontinental
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
33
Which statement does NOT describe the decline of Mafia power?
A) Reigning family heads are quite old.
B) The code of silence is now regularly broken by younger members.
C) Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D) Younger members are not as educated as earlier generations.
A) Reigning family heads are quite old.
B) The code of silence is now regularly broken by younger members.
C) Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D) Younger members are not as educated as earlier generations.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
34
Which statement best describes the current state of traditional organized crime syndicates?
A) They are thriving and gaining "membership."
B) They are eroding and in decline.
C) They are maintaining stability but only in large city "territories.
D) They are virtually nonexistent having been replaced by newer ethnic gangs.
A) They are thriving and gaining "membership."
B) They are eroding and in decline.
C) They are maintaining stability but only in large city "territories.
D) They are virtually nonexistent having been replaced by newer ethnic gangs.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
35
What is a main goal for transnational organized crime?
A) political change
B) economic gain
C) social transformation
D) exporting terrorism
A) political change
B) economic gain
C) social transformation
D) exporting terrorism
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
36
What has enabled the recent success of transnational organized crime?
A) social change
B) economic turmoil
C) tools of the internet
D) traditional forms of organization
A) social change
B) economic turmoil
C) tools of the internet
D) traditional forms of organization
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
37
What type of crime have organized crime cartels recently become involved in?
A) pirating software
B) securities fraud
C) cyberespionage
D) cybertrafficking
A) pirating software
B) securities fraud
C) cyberespionage
D) cybertrafficking
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
38
What is characteristic of a nation in which a transnational crime syndicate is most likely to develop?
A) a weak government with no effective methods of opposition
B) a corrupt government who is willing to work with the organization for a cut of the profits
C) areas with a stable economy and disposable income
D) areas with few existing crime syndicates to limit competition
A) a weak government with no effective methods of opposition
B) a corrupt government who is willing to work with the organization for a cut of the profits
C) areas with a stable economy and disposable income
D) areas with few existing crime syndicates to limit competition
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
39
What is the main focus of eastern European gangs?
A) Internet securities fraud
B) political terrorism
C) drug smuggling
D) human trafficking
A) Internet securities fraud
B) political terrorism
C) drug smuggling
D) human trafficking
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
40
In contrast to other international organizations, what crime is Russian organized crime more involved with?
A) money laundering
B) drug smuggling
C) human trafficking
D) illegal arms sales
A) money laundering
B) drug smuggling
C) human trafficking
D) illegal arms sales
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
41
What crime is Russian organized crime less likely to be involved with?
A) human trafficking
B) healthcare fraud
C) drug trafficking
D) extortion
A) human trafficking
B) healthcare fraud
C) drug trafficking
D) extortion
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
42
How much in illegal drug proceeds do Mexican gangs annually smuggle in for laundering?
A) $10 million to $100 million
B) $100 million to $1 billion
C) $1 billion to $5 billion
D) $8 billion to $25 billion
A) $10 million to $100 million
B) $100 million to $1 billion
C) $1 billion to $5 billion
D) $8 billion to $25 billion
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
43
What crimes are Asian transnational organized gangs notorious for?
A) political corruption
B) illegal arms sales and terrorism
C) drug smuggling and human trafficking
D) corruption in industrial construction
A) political corruption
B) illegal arms sales and terrorism
C) drug smuggling and human trafficking
D) corruption in industrial construction
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
44
What kind of crime must carry with it the intent to disrupt and change the government and must not be a simple common-law crime committed for reasons of greed or egotism?
A) political crime
B) Marxist revolution
C) workplace violence
D) computer theft
A) political crime
B) Marxist revolution
C) workplace violence
D) computer theft
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
45
How do most political criminals characterize themselves?
A) vengeful
B) greedy
C) selfless
D) frustrated
A) vengeful
B) greedy
C) selfless
D) frustrated
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
46
An individual who threatens an adversary in response to a difference in political opinion is engaging in what method to achieve their political goal?
A) oppression
B) coercion
C) bullying
D) intimidation
A) oppression
B) coercion
C) bullying
D) intimidation
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
47
What term is used to describe a political criminal who does not view their actions as criminal but rather in the best interest of society?
A) decisive
B) conviction
C) purposeful
D) intimidation
A) decisive
B) conviction
C) purposeful
D) intimidation
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
48
What term is used to describe a political criminal whose actions are criminally motivated but disguises these motivations by presenting the actions as selfless and beneficial to society?
A) pseudo-conviction
B) pseudo-criminal
C) false-conviction
D) imitation-crime
A) pseudo-conviction
B) pseudo-criminal
C) false-conviction
D) imitation-crime
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
49
What term refers to the act of an individual or group who engages in actions with the purpose to topple the current government and replace it with their leader of choice?
A) revolution
B) democracy
C) equality
D) political harmony
A) revolution
B) democracy
C) equality
D) political harmony
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
50
What type of election fraud is vandalizing a polling station in an attempt to scare individuals and to prevent individuals from voting an example of?
A) neutralization
B) espionage
C) intimidation
D) terrorism
A) neutralization
B) espionage
C) intimidation
D) terrorism
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
51
What term describes acts that are specifically designed to scare individuals away from polling stations to prevent them from casting their vote?
A) coercion
B) intimidation
C) anarchism
D) preventative tactics
A) coercion
B) intimidation
C) anarchism
D) preventative tactics
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
52
What type of election fraud is the circulation of incorrect information regarding the location of polling stations to voters registered with the opposing party in an attempt to prevent them from casting their vote?
A) misinformation
B) registration fraud
C) false advertising
D) disruption
A) misinformation
B) registration fraud
C) false advertising
D) disruption
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
53
In the eighteenth century, what political crime was considered to be most serious?
A) election fraud
B) espionage
C) treason
D) desertion
A) election fraud
B) espionage
C) treason
D) desertion
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
54
What term refers to the covert practice of obtaining confidential information from organizations without their knowledge?
A) treason
B) espionage
C) corruption
D) voyeurism
A) treason
B) espionage
C) corruption
D) voyeurism
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
55
What political crime was former FBI agent, Robert Hanssen, convicted of?
A) espionage
B) election fraud
C) transnational crimes
D) securities fraud
A) espionage
B) election fraud
C) transnational crimes
D) securities fraud
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
56
What type of espionage is deliberately inserting an individual into a corporation with the purpose of extracting confidential information without the corporation's knowledge an example of?
A) economic
B) political
C) industrial
D) military
A) economic
B) political
C) industrial
D) military
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
57
What does the crime of terrorism emphasize in order to promote change?
A) rationality
B) violence
C) demonstrations
D) spying
A) rationality
B) violence
C) demonstrations
D) spying
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
58
What is the purpose of terrorism?
A) to acquire profits for personal use
B) to demonstrate superiority over a competitor
C) to expose a vulnerability in a rival
D) to evoke change in the political party in power
A) to acquire profits for personal use
B) to demonstrate superiority over a competitor
C) to expose a vulnerability in a rival
D) to evoke change in the political party in power
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
59
What distinguishes terrorism from conventional warfare?
A) Terrorism does not involve excessive war-like violence.
B) Terrorism requires secrecy and operations to exert control over large populations.
C) Terrorism is not a very organized crime.
D) Terrorism is less political in its nature than conventional warfare.
A) Terrorism does not involve excessive war-like violence.
B) Terrorism requires secrecy and operations to exert control over large populations.
C) Terrorism is not a very organized crime.
D) Terrorism is less political in its nature than conventional warfare.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
60
The word "assassin" is derived from an Arabic term. What does it mean?
A) crazy man
B) hashish eater
C) political prisoner
D) killer of men
A) crazy man
B) hashish eater
C) political prisoner
D) killer of men
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
61
In which historical period was terrorism more pervasive?
A) Elizabethan
B) Post Modern
C) Victorian
D) Middle Ages
A) Elizabethan
B) Post Modern
C) Victorian
D) Middle Ages
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
62
When did the word "terrorist" first become popular?
A) during the Second World War
B) during the Spanish Inquisition
C) during the French Revolution
D) during the plague in England
A) during the Second World War
B) during the Spanish Inquisition
C) during the French Revolution
D) during the plague in England
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is characteristic of insurgents?
A) They engage in actions to maintain and promote the existing government.
B) The underlying motivation of any insurgent action is economic gain.
C) They engage in actions to oppose and undermine the existing government.
D) The purpose of insurgent action is to promote and maintain peace within the nation.
A) They engage in actions to maintain and promote the existing government.
B) The underlying motivation of any insurgent action is economic gain.
C) They engage in actions to oppose and undermine the existing government.
D) The purpose of insurgent action is to promote and maintain peace within the nation.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
64
What kind of terrorism has, as its ultimate goal, replacing an existing government with a regime that holds acceptable political views?
A) political
B) revolutionary
C) nationalistic
D) individualistic
A) political
B) revolutionary
C) nationalistic
D) individualistic
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
65
What kind of terrorist group is the Ku Klux Klan an example of?
A) non-political
B) nationalistic
C) political
D) state-sponsored
A) non-political
B) nationalistic
C) political
D) state-sponsored
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
66
Which type of terrorism is designed to promote the interests of minority ethnic groups or religious groups that believe they have been persecuted under majority rule?
A) state-sponsored
B) non-political
C) nationalistic
D) revolutionary
A) state-sponsored
B) non-political
C) nationalistic
D) revolutionary
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is the best-known nationalistic terrorist group from Ireland?
A) the Irish Battalion of the Poor
B) the Provisional Irish Republican Army
C) the Liberation Front of Ireland
D) the Irish Nationalists
A) the Irish Battalion of the Poor
B) the Provisional Irish Republican Army
C) the Liberation Front of Ireland
D) the Irish Nationalists
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
68
What kind of terrorism is exemplified by anti-abortion groups sponsoring demonstrations at abortion clinics, attacking clinics, and killing doctors with bombs?
A) justifiable
B) non-political
C) nationalistic
D) state-sponsored
A) justifiable
B) non-political
C) nationalistic
D) state-sponsored
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
69
What kind of terrorism is represented by a repressive government regime forcing its citizens into obedience, oppressing minorities, and stifling political dissent?
A) nationalistic
B) state-sponsored
C) political
D) non-political
A) nationalistic
B) state-sponsored
C) political
D) non-political
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
70
State-sponsored terrorism includes a type of violence which involves physical harm caused by the unequal distribution of wealth. What is this type of violence called?
A) feministic
B) structural
C) patriarchal
D) unstructured
A) feministic
B) structural
C) patriarchal
D) unstructured
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
71
What is the most extreme form of state-sponsored terrorism?
A) hijacking
B) genocide
C) structural
D) catastrophic
A) hijacking
B) genocide
C) structural
D) catastrophic
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
72
What kind of terrorism involves individuals engaging in acts of violence as a way to demonstrate their loyalty to a group leader?
A) non-political
B) political
C) cult
D) patriotic
A) non-political
B) political
C) cult
D) patriotic
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
73
How do leaders of cult terror groups ensure obedience from group members?
A) severe discipline
B) positive reinforcement
C) cultivating a supportive environment
D) engaging in open dialogue
A) severe discipline
B) positive reinforcement
C) cultivating a supportive environment
D) engaging in open dialogue
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
74
What organization uses the acronym "ALF"?
A) Albanian Liberation Front
B) Armenian Liberty Foundation
C) Animal Liberation Front
D) Activism, Liberty, and Freedom
A) Albanian Liberation Front
B) Armenian Liberty Foundation
C) Animal Liberation Front
D) Activism, Liberty, and Freedom
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
75
What is NOT a condition that has preceded genocide in Western societies?
A) authority orientation
B) "just world" thinking
C) new ideology
D) high levels of mental illness
A) authority orientation
B) "just world" thinking
C) new ideology
D) high levels of mental illness
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
76
What term refers to the organizational structure of a group in which the group is subdivided into smaller independent groups as a means to enhance security?
A) insurgent cell
B) militant cell
C) terror cell
D) guerrilla cell
A) insurgent cell
B) militant cell
C) terror cell
D) guerrilla cell
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following factors may influence the formation of a terror cell?
A) socioeconomic status
B) personality type
C) educational background
D) family membership
A) socioeconomic status
B) personality type
C) educational background
D) family membership
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
78
What term refers to loosely organized groups with diverse leadership who are dispersed across a range of locations?
A) networks
B) webs
C) colonies
D) districts
A) networks
B) webs
C) colonies
D) districts
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
79
Which statement describes a characteristic of terrorist networks?
A) They follow a hierarchical model of leadership.
B) Most members are inexperienced.
C) They have access to vast amount of resources.
D) They are very well funded.
A) They follow a hierarchical model of leadership.
B) Most members are inexperienced.
C) They have access to vast amount of resources.
D) They are very well funded.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
80
Terrorists may be motivated by feelings of alienation. What do they feel?
A) lost in the complexities of modern society
B) secure in their violent role
C) that their actions are wrong, but necessary
D) fearful to begin their actions
A) lost in the complexities of modern society
B) secure in their violent role
C) that their actions are wrong, but necessary
D) fearful to begin their actions
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck

