Terrorism And Homeland Security 9th Edition by Jonathan R. White - Test Bank

Terrorism And Homeland Security 9th Edition by Jonathan R. White - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   1. While the term terrorism is difficult to define, the process of terrorism is not. a. True b. False ANSWER: True REFERENCES: Tactics and Force …

$19.99

Terrorism And Homeland Security 9th Edition by Jonathan R. White – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

1. While the term terrorism is difficult to define, the process of terrorism is not.
a. True
b. False

ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

2. Although terrorist tactics change through time, the most common weapon of terrorism has been and remains the bomb.
a. True
b. False

ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

3. The media can be used as a force multiplier.
a. True
b. False

ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

4. Examples of force multipliers include technology and reserve units ‘at the ready’.
a. True
b. False

ANSWER: False
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.03 – List and describe four force multipliers.
KEYWORDS: BLOOM’S: Remember

5. Media coverage can make a minor group appear to be politically important.
a. True
b. False

ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.03 – List and describe four force multipliers.
KEYWORDS: BLOOM’S: Remember

6. The most common tactic of cyberterrorism to date has been the defacement of Web sites.
a. True
b. False

ANSWER: True
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember

7. Terrorism is not influenced by technology.
a. True
b. False

ANSWER: False
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember

8. Cyberterrorism is an attractive, low-risk strategy.
a. True
b. False

ANSWER: True
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember

9. Radioactive poisoning is highly contagious.
a. True
b. False

ANSWER: False
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

10. Nuclear waste is a ready-made dirty bomb.
a. True
b. False

ANSWER: True
REFERENCES: Nuclear Terrorism
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Understand

11. Only the government and military have access to highly enriched uranium (HEU).
a. True
b. False

ANSWER: False
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Understand

12. All researchers have determined that the frequency of violence is more important than the severity of terrorist attacks.
a. True
b. False

ANSWER: False
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Understand

13. Researchers have found no relationship between terrorism and tourism.
a. True
b. False

ANSWER: False
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Understand

14. The role of females in terrorist groups is decreasing around the globe.
a. True
b. False

ANSWER: False
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.
KEYWORDS: BLOOM’S: Understand

15. Women often receive combat or leadership positions in international terrorist organizations.
a. True
b. False

ANSWER: False
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.
KEYWORDS: BLOOM’S: Remember

16. Which of the following is not a tactic of terrorism as defined by Brian Jenkins?
a. bombing
b. larceny
c. arson
d. assault

ANSWER: b
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

17. Which of the following tactics is most often employed by terrorists?
a. bombing
b. kidnapping
c. hijacking
d. arson

ANSWER: a
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

18. In 1848, anarchists talked about , meaning that the only way to communicate with the social order was to destroy it.
a. propaganda by the deed
b. media propaganda
c. public awareness campaigns
d. the philosophy of the bomb

ANSWER: d
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

19. Which type of explosive is designed to spread fuel in the air and then ignite it?
a. Thermobaric bomb
b. Double-sidedbomb
c. Traditional bomb
d. Radio-signaled bomb

ANSWER: a
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

20. In 2004, New Scientist reported that Middle Eastern terrorist groups were working on a two-stage military-style weapon called a(n) .
a. IED
b. mininuke
c. drone
d. dirty bomb

ANSWER: b
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

21. Terrorists use __________________ to increase their attacking power.
a. force multipliers
b. tactics
c. large memberships
d. secrecy

ANSWER: a
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.
KEYWORDS: BLOOM’S: Remember

22. Which of the following is NOT considered a force multiplier?
a. Technology
b. Media
c. Military
d. Religious fanaticism

ANSWER: c
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.
KEYWORDS: BLOOM’S: Understand

23. The National Conference of State Legislature defines as “the use of information technology by terrorists to promote a political agenda.”
a. narcoterrorism
b. cyberterrorism
c. domestic terrorism
d. transnational terrorism

ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember

24. refers to the use of computers to attack technological targets or physical attacks on computer networks.
a. Narcoterrorism
b. Cyberterrorism
c. Domestic terrorism
d. Transnational terrorism

ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember

25. Which of the following is NOT a target for cyberterrorism?
a. Computers
b. Freeways
c. Computer networks
d. Information storage and retrieval systems

ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember

26. attacks are susceptible to antibiotics.
a. Bacterial
b. Chemical
c. Viral
d. Nuclear

ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

27. There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses; (3) bacteria; and (4) .
a. radiation
b. plagues
c. nerve gas
d. plutonium

ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

28. Ebola virus is considered a .
a. bacterial infection
b. food borne illness
c. radiological weapon
d. hemorrhagic fever

ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Understand

29. What biological agent infected citizens through the mail in the wake of the attacks on September 11, 2001?
a. Anthrax
b. Smallpox
c. Plague
d. Botulism

ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

30. Anthrax is considered a .
a. vermin
b. virus
c. bacteria
d. chemical

ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

31. enter the body through ingestion, respiration, or contact.
a. Blood agents
b. Blistering agents
c. Nerve agents
d. Choking agents

ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

32. Most dirty-bomb scenarios are based on the premise that a agent will be used with a conventional explosive.
a. bacterial
b. viral
c. chemical
d. radiological

ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

33. is considered a non-contagious bacterial infection.
a. Smallpox
b. MRSA
c. Hemorrhagic fever
d. Anthrax

ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

34. The United States has experienced notable biological attacks since 1980.
a. zero
b. one
c. two
d. ten

ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

35. Nerve agents, blood agents, choking agents, and blistering agents are all examples of agents.
a. bacterial
b. chemical
c. viral
d. radiological

ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

36. According to the text, is the only group that has made an effort to obtain a nuclear device.
a. LTTE Black Tigers
b. Hezbollah
c. Al Qaeda
d. Kurdistan Workers Party

ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Remember

37. HEU stands for ________ .
a. heavily elongated uranium
b. high evolution utilities
c. harsh environmental usage
d. highly enriched uranium

ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Remember

38. Congress mandates that all radioactive waste from America’s nuclear power plants be transported to a repository in what state?
a. Nevada
b. Arizona
c. Alaska
d. Colorado

ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Remember

39. The type of nuclear bomb used at Hiroshima employed .
a. highly enriched uranium
b. plutonium
c. neptunium
d. deuterium

ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Remember

40. As the world moves closer to a global economy, terrorists have found that striking increases the effectiveness of operations.
a. economic targets
b. national targets
c. symbolic targets
d. security targets

ANSWER: a
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

41. Which of the following is NOT a target of transnational attack?
a. Tourism
b. Energy
c. Transportation
d. Consumerism

ANSWER: d
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

42. J. Bowyer Bell refers to ___________________ terrorism, which is a form of violence that occurs in Africa where arbitrary national boundaries have been drawn through ethnic and tribal divisions.
a. endemic
b. ethnic
c. epidemic
d. evident

ANSWER: a
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

43. In 2003, Al Qaeda began targeting oil facilities in what country?
a. Iran
b. Saudi Arabia
c. Iraq
d. Kuwait

ANSWER: b
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

44. Daly says that the Taliban believes that the most effective way to destroy the Pakistan government is to attack
.
a. political targets
b. women and children
c. economic targets
d. allies of the Pakistani government

ANSWER: c
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

45. After the September 11 attacks, the federal government immediately budgeted $ 4.8 billion to protect the industry.
a. shipping
b. aviation
c. computer
d. banking

ANSWER: b
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

46. The in eastern Turkey conducted the least deadly attacks in the course of modern suicide bombing, killing an average of two people per incident.
a. Black Tigers
b. Kurdistan Workers’ Party
c. Tamil Hindus
d. Russian Orthodox Christians

ANSWER: b
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

47. According to the text, the have conducted more suicide bombings than any other group.
a. Buddhist Sinhalese
b. Sunni Kurds
c. LTTE Black Tigers
d. Hezbollah

ANSWER: c
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

48. The major factor in deciding to employ suicide terrorists is the of the group.
a. social structure and culture
b. religiousbeliefs
c. rational choice
d. economic strength

ANSWER: a
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand

49. Rohan Gunaratna sees that suicide bombings have which three things in common?
a. Secrecy, reconnaissance, and rehearsal
b. Secrecy, religion, and political agendas
c. Political agendas, chance of success, and secrecy
d. Secrecy, rehearsal, and chance of success

ANSWER: a
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

50. Which of the following is not a major type of suicide attack?
a. Suicide in warfare
b. Suicide for a principle without killing others
c. Suicide by cop
d. Suicide terrorism

ANSWER: c
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

51. More are targeted in suicide attacks than any other group.
a. Catholics
b. Muslims
c. Jews
d. atheists

ANSWER: b
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand

52. Margaret Gonzalez-Perez found that the role of women in terrorist groups is more closely determined by the
__________ orientation of an organization than its tactics.
a. gender
b. economic
c. religious
d. political

ANSWER: d
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.
KEYWORDS: BLOOM’S: Understand

53. Criminologists frequently complain that are often ignored in the study of crime, unless the study focuses on victimization.
a. children
b. females
c. males
d. animals

ANSWER: b
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.
KEYWORDS: BLOOM’S: Understand

54. The first known female suicide bomber (employed against an Israeli convoy) occurred in which decade? a. 1970s
b. 1980s c. 1990s d. 1960s
ANSWER: b
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.
KEYWORDS: BLOOM’S: Remember

55. Gender impacts terrorist tactics and is often related mostly to the .
a. social standing of the terrorist organization
b. ideology of the terrorist organization
c. economics of the terrorist organization
d. media influence upon the terrorist organization

ANSWER: b
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.
KEYWORDS: BLOOM’S: Understand

Terrorists tend to increase their effectiveness in bombing by applying improved explosives technology to their weapons just as conventional military forces constantly improve the killing power of their munitions. In 2004, New Scientist reported that Middle Eastern terrorist groups were working on a two-stage military-style weapon called a mininuke. This type of explosive is designed to spread fuel in the air and then ignite it. Known as a thermobaric bomb, it actually explodes the air in the blast area. One analyst speculated that an attack on a Tunisian synagogue in 2002 used this technology (Hambling, 2004).
56. A thermobaric bomb is a force multiplier of what classification?
a. Transnational support
b. Technology
c. Media coverage
d. Religion

ANSWER: b
REFERENCES: Technology
PREFACE NAME: Scientist
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Analyze

57. In which targeted environment would you suspect a thermobaric bomb to be a terrorist’s most desirable weapon of choice?
a. A small classroom
b. An underground tunnel
c. An open-air market
d. Middle of the ocean

ANSWER: c
REFERENCES: Technology
PREFACE NAME: Scientist
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Analyze

Brian Jenkins says that the six tactics of terrorism can be enhanced by force multipliers. In military terms, a force multiplier increases striking power without increasing the strength of a unit. He labels four kinds of force multipliers: Transnational support, Technology, Media coverage, and Religion. Terrorists routinely use force multipliers because they add to their aura. All political terrorists want to give the illusion that they can fight on a higher, more powerful level.
58. A terrorist group receives a large sum of cash from a charity organization from another country that enables them to purchase weapons. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion

ANSWER: a
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Analyze

59. A terrorist leader sends coded messages to members of the organization during a televised interview with a local journalist. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion

ANSWER: c
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Analyze

60. Terrorists break through Homeland Security’s firewalls, and hijack and destroy several drones. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion

ANSWER: b
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Analyze

61. A suicide bomber explodes in a local supermarket. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion

ANSWER: a
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Analyze

62. Terrorist cell members receive instructions from within the shelter of a local church. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion

ANSWER: a
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Analyze

63. Terrorists activate a dirty bomb, which explodes within a military outpost. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion

ANSWER: b
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Analyze

Terrorism by WMD presents a potential strategic scenario and includes biological agents, or biological weapons, which have been used for centuries. Modern arsenals contain bacterial weapons and viral weapons, with microbes cultured and refined, or weaponized, to increase their ability to kill. Because bacterial agents are susceptible to antibiotics, nations with bacterial weapons programs have created strains of bacterial microbes resistant to such drugs. Viral agents are produced in the same manner, and they are usually more powerful than bacterial agents. Biological agents are difficult to control but relatively easy to produce. Terrorists may find them to be effective weapons.
There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses; (3) bacteria; and (4) plagues. The Centers for Disease Control and Prevention (CDC) classifies the most threatening from the groups as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.
64. Smallpox is classified under which category?
a. Toxin
b. Virus
c. Bacteria
d. Plague

ANSWER: b
REFERENCES: Technology
PREFACE NAME: WMD
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Analyze

65. Hemorrhagic fever is classified under which category?
a. Toxin
b. Virus
c. Bacteria
d. Plague

ANSWER: b
REFERENCES: Technology
PREFACE NAME: WMD
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Analyze

66. is a phrase used by anarchists around 1848. It means that social order can only be changed through violent upheaval.
ANSWER: Philosophy of the bomb
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

67. Jenkins says that there are six tactics of terrorism: , arson, assault, kidnapping, bombing, and hostage taking.
ANSWER: hijacking
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

68. increase terrorists’ attacking power without increasing personnel.
ANSWER: Force multipliers
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

69. Force multipliers include , transnational support, media coverage, and religious fanaticism.
ANSWER: technology
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember

70. present an attractive weapon for terrorists because they are easy to control and the users can avoid the area they attack.
ANSWER: Chemicals
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

71. Nerve agents enter the body through ingestion, respiration, or ___________________.
ANSWER: contact
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

72. When people are victims of a bacterial attack, may be an effective treatment.
ANSWER: antibiotics
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

73. There are four types of chemical agents: nerve agents, blood agents, choking agents, and
__________________________.
ANSWER: blistering agents
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

74. The most fearful scenario related to WMD involves a(n) explosion.
ANSWER: nuclear
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Remember

75. systems present a tempting economic target because they produce mass casualties with minimal effort.
ANSWER: Transportation
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

76. ____________________ increases the ability of terrorist groups to move and hide across a nation.
ANSWER: Transnational support
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

77. Terrorism most frequently affects travelers.
ANSWER: international
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

78. ____________________ terrorism is terrorism that exists inside a political entity.
ANSWER: Endemic
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

79. Energy, shipping, and __________________________ industries are the most likely targets for a transnational attack.
ANSWER: tourism
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember

80. suicide refers to the willingness of individuals to sacrifice their lives to benefit their primary reference group, such as a family, military unit, ethnic group, or country.
ANSWER: Altruistic
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

81. The formal name of the terrorist group referred to as PKK is the _________________________.
ANSWER: Kurdistan Workers’ Party
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

82. Pape takes the study of beyond a simple definition of how it happens and offers a theory.
ANSWER: suicide terrorism
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

83. The popular conception in Lebanon is that __________________________ causes suicide terrorism.
ANSWER: militant Islamic theology
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember

84. have been involved in terrorist groups throughout the history of modern terrorism, but their role has been ignored.
ANSWER: Women
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.
KEYWORDS: BLOOM’S: Remember

85. The Pakistani Taliban and ______________ formed female suicide cells after the first female suicide bomber struck in Pakistan in 2010.
ANSWER: al Qaeda
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.
KEYWORDS: BLOOM’S: Remember

86. What is a force multiplier? List and explain force multipliers and how they are used.
ANSWER: • Force multipliers are a method of increasing striking power without increasing the number of combat troops in a military unit.

Terrorists have four force multipliers: (1) technology to enhance weapons or attacks on technological facilities, which allows a small group to launch a deadly attack; (2) transnational support which increases the ability of terrorist groups to move and hide; (3) media coverage, which can make a minor group appear to be politically important; and
(4) religious fanaticism, which transcends normative political and social boundaries, increasing violence and decreasing opportunities for negotiation.
• Cyberterrorism and potential WMD attacks are examples of technological force multipliers.
Media coverage and interpretation of terrorist events often serve as force multipliers – one incident can be converted into a “campaign” as electronic media scrambles to break the latest news.
• The triborder region in South America demonstrates that transnational support networks multiply the striking power of terrorists.
• A new force multiplier has been the introduction of religious fanaticism in terrorist activities.
• The introduction of religion has introduced suicide attacks into the arsenals of terrorism.
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.
TERR.WHIT.17.05.03 – List and describe four force multipliers.
KEYWORDS: BLOOM’S: Remember

87. Describe cyberterrorism and its targets; why is it attractive to terrorists? How can cyberterrorism be utilized by terrorists?
ANSWER: Cyberterrorism refers to the use of computers to attack technological targets or physical attacks on computer networks; The National Conference of State Legislatures defines cyber-terrorism as the use of information technology by terrorists to promote a political agenda.
• Terrorists differ from hackers, the council argues, because their purpose is to launch a systematic attack for political purposes.
• Cyber-terrorism is an attractive low-risk strategy.
• Computers allow terrorist groups to remain connected, providing a means for covert discussions and anonymity.
• Computer networks are also much less expensive and work intensive than the secretive infrastructures necessary to maintain terrorist groups.
• Modern Western society needs information and the flow of information to function, so cyber-terrorists threaten to interrupt or confuse that flow of information.
• The most common tactic to date has been the defacement of websites.
• The targets for cyber-terrorism include: computers, computer networks, and information storage and retrieval systems.
• Computer virus is implanted in an enemy’s computer.
“Logic bombs,” or snippets of program code that lie dormant for years until they are instructed to overwhelm a computer system.
• Bogus computer chips sold to sabotage an enemy’s computer network.
• Trojan horses can contain malevolent code that can destroy a system, and “back doors” in computer systems can allow terrorists to enter systems thought to be secured.
• Shahar believes that conventional attacks, such as overloading an electrical system, threaten computer security.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember

88. Name and summarize the effects of the most threatening biological agents indicated by the Centers for Disease Control and Prevention. Describe the two biological attacks on U.S. soil.
ANSWER: • The Centers for Disease Control and Prevention (CDC) classifies the most threatening agents as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.
Smallpox is a deadly, contagious virus. Many people were vaccinated against smallpox in their childhood, but these old vaccinations are no longer effective against the disease.
• Anthrax is a noncontagious bacterial infection, and plague is transmitted by insects.
• Botulism is a kind of food borne illness, and other bacteria can be modified to serve as weapons.
• Hemorrhagic fevers are caused by viruses. One of the most widely known hemorrhagic fevers is the Ebola virus.
• The first modern use of biological terrorism in the United States was engineered in 1984 by followers of a religious group in Oregon.
• The group spread bacteria in area salad bars in attempt to sicken voters during a local election.
• Their intent was to elect their religious followers to local office.
• Hundreds of people suffered food poisoning as a result.
• The second attack involved anthrax and came in the wake of 9/11.
• It began in Florida when two tabloid workers were infected by anthrax through the mail. One of the victims died.
• In the following days anthrax appeared again as NBC Nightly News received spores in the mail.
• Staffers at the office of former Senate majority leader Thomas Daschle noticed a white powdery substance in a letter.
• The powder contained anthrax spores, and although there were no fatalities, legislative offices were closed in Washington, D.C., for several weeks.
Mysteriously, other people died on the East Coast with no explanation of how the anthrax was spreading.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Remember

89. Describe the four types of chemical agents as well as the problems they present. When are chemical weapons most effective?
ANSWER: • There are four types of chemical agents: nerve agents, blood agents, choking agents, and blistering agents.
• Nerve agents enter the body through ingestion, respiration, or contact.
• Blood and choking agents are usually absorbed through the respiratory system.
• Blistering agents burn skin and internal tissue upon contact.
Chemicals present an attractive weapon for terrorists because they are easy to control and, unlike biological weapons, the users can avoid the area they attack.
• Chemical weapons present four problems.
• First, terrorists must have a delivery mechanism; that is, they need some way to spread the chemical.
• The second problem is related to the first. Bombing is a popular tactic, but the heat of most explosives incinerates chemical agents.
• It takes a lot of chemicals to present a threat.
• Finally, weather patterns, air, and water can neutralize a chemical threat.
• Chemical weapons are most effective when used in a confined space, and they are difficult to use effectively in large outdoor areas.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.
KEYWORDS: BLOOM’S: Understand

90. What are Michael Levi’s five goals for policy makers? How does Levi suggest the United States approach nuclear terrorism?
ANSWER: Support international efforts to stop the proliferation of nuclear weapons.
• Address nuclear terrorism in conjunction with all other terrorist threats.
• Mandate nuclear threat analysis based on the most probable dangers.
• Create a cooperative multiagency defense system.
• Audit the defense system and reward cooperation.
• Levi suggests that the United States should approach nuclear terrorism in two manners.
• The first involves debunking popular myths about the subject.
• Policy makers and the public need to understand the basic aspects of nuclear security and must realize that it is never 100% effective.
• Fear should be rationalized.
• Levi believes it is more logical to look at several realistic scenarios and aim preventive measures at high probability targets.
• It is not enough to limit the focus on nuclear terrorism – Levi argues for a comprehensive approach to a terrorist group and all its activities as this provides a better threat analysis than limited attention to nuclear terrorism.
• The second response is to revamp defense systems.
• Protection against any form of terrorism does not involve a single agency working against a single group.
• Defense involves a multitude of agencies and organizations at all levels of government and liaison with private organizations.
• Levi argues that the current bureaucracy does not provide protection because agencies protect turf, they do not share information, and administration is confused and competitive.
• Oversight of defense systems needs to be clarified and streamlined, and agency managers should be routinely evaluated on the ability to work with other agencies and to share information.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.
KEYWORDS: BLOOM’S: Analyze

91. How does oil in the Niger Delta represent a different opportunity for economic attack?
ANSWER: • Oil in the Niger Delta represents a different opportunity for economic attack as it simultaneously funds terrorists and other violent groups while serving as a target for terrorism.
• Dilapidated storage facilities and pipelines have become an ecological disaster for the impoverished local residents.
• The result is an environment that encourages sub-national violence and that might serve as a base for international terrorism.
• The energy environment in Africa represents an interesting paradox.
• If poverty, endemic terrorism, and criminalized politics are not addressed by the industrial world, areas like the Niger Delta will evolve in two directions.
• They will become the base for the emergence of new international terrorist groups, providing excellent resources for training and eluding detection.
• At the same time, the energy resources in the delta provide a target-rich environment for terrorists.
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.
KEYWORDS: BLOOM’S: Analyze

92. Explain Pape’s theory of suicide terrorism.
ANSWER: He believes three factors must be in place before a suicide terror campaign can take place. First, a nationalistic or ethnic group must be resisting the occupation of a foreign power. Second, the foreign power must have a democratic government whose voters will not routinely allow the indiscriminate slaughter and total repression of the people in the occupied area. Finally, there must be a difference in the religions of the occupying power and the people living under occupation. This is a key point in the theory. Such terrorism does not happen when the occupied and occupier share a single religion; it is caused by differences between the two religions.
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand

93. Explain Domenico Tosini’s beliefs regarding suicide, religion, and terrorism.
ANSWER: • Tosini believes the link between suicide and religion has been disproved given that secular terrorist groups have employed the tactic.
• Tosini believes that rational choice and religion are secondary factors in suicide attacks.
• The major factor is the social structure and culture of the group engaged in suicide terrorism.
• Groups take actions inside social structures based on their understanding of reality – this can create the group dynamics that lead to suicide terrorism.

• The dynamic agents involved in a suicide bombing are the armed terrorist group, the group’s supporters, and the bombers.

• These three entities operate in a social network where decisions are made based on the interpretations of situations.
• The decision to engage in suicide bombing is based on the interactions of terrorists, supporters, and attackers within a surrounding social network.
• Moving beyond rational choice, Tosini argues that the social climate must readily accept suicide bombings.
• Supporters of a terrorist group have to embrace the idea, and create social rewards for bombers and their relatives.
• Beyond this, the entire community must accept violence as a normative response to social grievances and believe that suicide bombing is an acceptable expression of violence.
• Supporting groups need material and symbolic rewards, and attackers must have a deep attachment to idealized representations of their communities.
When altruism enters the equation, it produces culture of martyrdom and this in turn, combines with two common military approaches to war – dehumanization and depersonalization of enemies.
• Tosini argues that suicide terrorism develops when a culture accepts it as an expression of altruistic martyrdom and terrorist groups with the culture embrace the tactic.
• Suicide bombing takes place through a social process that endorses self- sacrifice as a legitimate expression of normal behavior.
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand

94. What is Laura Sjober’s view of the scholarly literature that covers women and terrorism? Do you agree with Sjober’s view that the field would be enriched through feminist perspectives? Why or why not?
ANSWER: • Studies of women in terrorism are generally ignored, and when females are discussed it is in gendered terms.
• They are not “terrorists,” they are “women involved in terrorism.”
• There are exceptions, but most scholars and analysts conclude that women play some type of nebulous role in terrorism.
• They cannot define the role, and they do not seem to care to do so.
• Media presentations follow the same track – women are neither significant nor worthy of analysis.
• Sjoberg vehemently disagrees with such characterizations.
• Women do have a special place in terrorism; women are terrorists just like men who do the same thing.
• There are terrorists who happen to be women, and they have been around for quite some time.
• There is also no feminist perspective of terrorism; there are feminists who study terrorism in a variety of ways.
Sjoberg says that scholars and other researchers are reluctant to study political and criminal violence among women because it violates idealized notions of womanhood.
• Their behavior should be studied from a variety of feminist perspectives, Sjoberg concludes. Such literature would enrich the field.
• Views will vary.
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.
KEYWORDS: BLOOM’S: Understand

95. Discuss why Margaret Gonzalez-Perez states that women are more attracted to domestic terrorist organizations than international groups.
ANSWER: Domestic organizations are focused on revolution and social change –
• women are attracted to such groups because they have a chance to redefine their roles, and males and females welcome them since they want the same
change.

Some groups have a feminist agenda.
• Women have opportunities for leadership in revolutionary groups.
International terrorists resist outside forces such as capitalism and imperialism–they try to defend a traditional culture that limits the role of women.
• Women in domestic groups gravitate toward combat and leadership.
• Women in international groups are given more limited roles – international terrorists tend to employ women as supporters, sympathizers, and spies, seldom receiving combat or leadership positions.
• This pattern remains constant even in social systems that emphasize male dominance.
• For example, it is thought that the machismo influence in Central and South America would blunt female leadership and combat roles, but the opposite is true.
• Most Central and South American groups have a left-wing revolutionary focus.
• Women move into active roles because the groups are seeking to restructure their culture and political structure.
Every geographical area produced a common trend; domestic groups emphasized the role of women even when they have no stated feminist agenda.
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.
KEYWORDS: BLOOM’S: Understand

 

Additional information

Add Review

Your email address will not be published. Required fields are marked *