Filters
Question type

Study Flashcards

The Internet,encryption applications,and social communication technologies are now used extensively by many terrorist groups and extremist movements.

Correct Answer

verifed

verified

True

______ are conventional or unconventional adversaries who engage in armed conflict as members of regular military or irregular guerrilla fighting units.


A) Noncombatants
B) Extremists
C) Old Terrorists
D) Combatants

Correct Answer

verifed

verified

List three attributes of the New Terrorism profile.

Correct Answer

verifed

verified

Students should list three of the follow...

View Answer

Insurgencies like those led by Mao Zedong in China,Ho Chi Minh in Vietnam,and Fidel Castro in Cuba are examples of wars of ______.


A) national liberation
B) loyalism
C) capitalism
D) traditionalism

Correct Answer

verifed

verified

Modern-day terrorists use unconventional methods,such as asymmetrical and indiscriminate attacks,because if they used conventional methods,they would never be a match for a superpower like the United States.

Correct Answer

verifed

verified

The main goals of ISIS are first,to refuse to recognize the borders of Syria,Iraq,and other nations and second,______.


A) to wage war against the United States and claim all of its territory
B) to protest anti-Muslim sentiments worldwide and win converts to their faith
C) to win control of the government through legitimate,democratic means
D) to wage war to establish a renewed Islamic state that will encompass the entire Muslim world

Correct Answer

verifed

verified

Beginning in the late 1960s,______ nationalists were the leading practitioners of international terrorism.


A) Palestinian
B) Israeli
C) Northern Irish
D) White

Correct Answer

verifed

verified

Which of the following is an attribute of the New Terrorism?


A) clearly identifiable organizations or movements
B) the view that civilian casualties are "collateral damage" to the intended target
C) utilization of modern networking technologies
D) focused messaging to a small,targeted national audience

Correct Answer

verifed

verified

During the Cold War,the United States and the U.S.S.R.engaged in a predictable pattern of behavior whereby the United States would support established governments,and the U.S.S.R.would support nationalist insurgencies.

Correct Answer

verifed

verified

New Terrorism is characterized by rigid,strictly defined chains of command.

Correct Answer

verifed

verified

False

______ terrorism is political violence conducted by groups of "true believers" who have fervent faith in the sacred righteousness of their cause.


A) Political
B) Religious
C) Environmental
D) Philosophical

Correct Answer

verifed

verified

List three attributes of the "Old Terrorism" profile.

Correct Answer

verifed

verified

Students should list three of the follow...

View Answer

Chain networks occur when a set of actors is tied to a central node or actor and must go through that node to communicate and coordinate.

Correct Answer

verifed

verified

False

Peace processes,negotiations,and social reforms are all examples of ______.


A) conciliatory options
B) dissident action
C) diplomatic immunity
D) international immunity

Correct Answer

verifed

verified

Proponents of New Terrorism justify their goal of maximizing casualties because they want to attract attention to their cause,damage the economies of their enemies,make enemy populations scrutinize their demands,and ______.


A) carry out religious mandates
B) generate revenue
C) collect raw materials
D) return to traditional methods

Correct Answer

verifed

verified

The "Old Terrorism" profile included unclear grievances promoting ambiguous causes.

Correct Answer

verifed

verified

Counterterrorist experts seek to prevent terrorist groups from finalizing their plans,deter extreme activists from becoming terrorists,minimize destruction and casualties,and ______.


A) procure weapons of mass destruction to destroy disputed territories
B) use social media to infiltrate all terrorist organizations
C) implement treaties,laws,and task forces to create a counterterrorist environment
D) create stricter immigration laws

Correct Answer

verifed

verified

The ______ describes the emerging mode of conflict and crime in which the protagonists use network forms of organization and related doctrines,strategies,and technologies attuned to the information age.


A) Internet contagion theory
B) netwar theory
C) protagonist method
D) combatant method

Correct Answer

verifed

verified

The Palestinian nationalist movement created a movement characterized by the acceptance of communal dissident terrorism as a strategy.

Correct Answer

verifed

verified

There is no unanimity on what kind of violence constitutes an act of terrorism.

Correct Answer

verifed

verified

Showing 1 - 20 of 32

Related Exams

Show Answer