Pay And Download
$15.00
Complete Test Bank With Answers
Sample Questions Posted Below
1. While the term terrorism is difficult to define, the process of terrorism is not.
a. True
b. False
ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
2. Although terrorist tactics change through time, the most common weapon of terrorism has been and remains the bomb.
a. True
b. False
ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
3. The media can be used as a force multiplier.
a. True
b. False
ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
4. Examples of force multipliers include technology and reserve units ‘at the ready’.
a. True
b. False
ANSWER: False
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.03 – List and describe four force multipliers.
KEYWORDS: BLOOM’S: Remember
5. Media coverage can make a minor group appear to be politically important.
a. True
b. False
ANSWER: True
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.03 – List and describe four force multipliers.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page 16. The most common tactic of cyberterrorism to date has been the defacement of Web sites.
a. True
b. False
ANSWER: True
REFERENCES: Technology
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
7. Terrorism is not influenced by technology.
a. True
b. False
ANSWER: False
REFERENCES: Technology
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
8. Cyberterrorism is an attractive, low-risk strategy.
a. True
b. False
ANSWER: True
REFERENCES: Technology
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
9. Radioactive poisoning is highly contagious.
a. True
b. False
ANSWER: False
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
10. Nuclear waste is a ready-made dirty bomb.
a. True
b. False
ANSWER: True
REFERENCES: Nuclear Terrorism
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
terrorism.
KEYWORDS: BLOOM’S: Understand
Copyright Cengage Learning. Powered by Cognero. Page 211. Only the government and military have access to highly enriched uranium (HEU).
a. True
b. False
ANSWER: False
REFERENCES: Technology
LEARNING OBJECTIVES: terrorism.
KEYWORDS: BLOOM’S: Understand
TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
12. All researchers have determined that the frequency of violence is more important than the severity of terrorist attacks.
a. True
b. False
ANSWER: False
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Understand
13. Researchers have found no relationship between terrorism and tourism.
a. True
b. False
ANSWER: False
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Understand
14. The role of females in terrorist groups is decreasing around the globe.
a. True
b. False
ANSWER: False
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and
religious groups.
KEYWORDS: BLOOM’S: Understand
15. Women often receive combat or leadership positions in international terrorist organizations.
a. True
b. False
ANSWER: False
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and
religious groups.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page 316. Which of the following is not a tactic of terrorism as defined by Brian Jenkins?
a. bombing
b. larceny
c. arson
d. assault
ANSWER: b
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
17. Which of the following tactics is most often employed by terrorists?
a. bombing
b. kidnapping
c. hijacking
d. arson
ANSWER: a
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
18. In 1848, anarchists talked about to destroy it.
a. propaganda by the deed
b. media propaganda
c. public awareness campaigns
d. the philosophy of the bomb
, meaning that the only way to communicate with the social order was
ANSWER: d
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
19. Which type of explosive is designed to spread fuel in the air and then ignite it?
a. Thermobaric bomb
b. Double-sidedbomb
c. Traditional bomb
d. Radio-signaled bomb
ANSWER: a
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page 420. In 2004, New Scientist reported that Middle Eastern terrorist groups were working on a two-stage military-style
weapon called a(n) .
a. IED
b. mininuke
c. drone
d. dirty bomb
ANSWER: b
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
21. Terrorists use
a. force multipliers
b. tactics
c. large memberships
d. secrecy
__________________
to increase their attacking power.
ANSWER: a
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.
KEYWORDS: BLOOM’S: Remember
22. Which of the following is NOT considered a force multiplier?
a. Technology
b. Media
c. Military
d. Religious fanaticism
ANSWER: c
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.
KEYWORDS: BLOOM’S: Understand
23. The National Conference of State Legislature defines promote a political agenda.”
a. narcoterrorism
b. cyberterrorism
c. domestic terrorism
d. transnational terrorism
as “the use of information technology by terrorists to
ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
Copyright Cengage Learning. Powered by Cognero. Page 524. refers to the use of computers to attack technological targets or physical attacks on computer networks.
a. Narcoterrorism
b. Cyberterrorism
c. Domestic terrorism
d. Transnational terrorism
ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
25. Which of the following is NOT a target for cyberterrorism?
a. Computers
b. Freeways
c. Computer networks
d. Information storage and retrieval systems
ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
26. attacks are susceptible to antibiotics.
a. Bacterial
b. Chemical
c. Viral
d. Nuclear
ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
27. There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses;
(3) bacteria; and (4) .
a. radiation
b. plagues
c. nerve gas
d. plutonium
ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
Copyright Cengage Learning. Powered by Cognero. Page 628. Ebola virus is considered a .
a. bacterial infection
b. food borne illness
c. radiological weapon
d. hemorrhagic fever
ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Understand
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
29. What biological agent infected citizens through the mail in the wake of the attacks on September 11, 2001?
a. Anthrax
b. Smallpox
c. Plague
d. Botulism
ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
30. Anthrax is considered a .
a. vermin
b. virus
c. bacteria
d. chemical
ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
31. enter the body through ingestion, respiration, or contact.
a. Blood agents
b. Blistering agents
c. Nerve agents
d. Choking agents
ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
Copyright Cengage Learning. Powered by Cognero. Page 732. Most dirty-bomb scenarios are based on the premise that a a. bacterial
b. viral
c. chemical
d. radiological
agent will be used with a conventional explosive.
ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
33. is considered a non-contagious bacterial infection.
a. Smallpox
b. MRSA
c. Hemorrhagic fever
d. Anthrax
ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
34. The United States has experienced notable biological attacks since 1980.
a. zero
b. one
c. two
d. ten
ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
35. Nerve agents, blood agents, choking agents, and blistering agents are all examples of agents.
a. bacterial
b. chemical
c. viral
d. radiological
ANSWER: b
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
Copyright Cengage Learning. Powered by Cognero. Page 8is the only group that has made an effort to obtain a nuclear device.
36. According to the text, a. LTTE Black Tigers
b. Hezbollah
c. Al Qaeda
d. Kurdistan Workers Party
ANSWER: c
REFERENCES: Technology
LEARNING OBJECTIVES: terrorism.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
37.HEU stands for
________
a. heavily elongated uranium
b. high evolution utilities
c. harsh environmental usage
d. highly enriched uranium
.
ANSWER: d
REFERENCES: Technology
LEARNING OBJECTIVES: terrorism.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
38. Congress mandates that all radioactive waste from America’s nuclear power plants be transported to a repository in
what state?
a. Nevada
b. Arizona
c. Alaska
d. Colorado
ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: terrorism.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
39. The type of nuclear bomb used at Hiroshima employed .
a. highly enriched uranium
b. plutonium
c. neptunium
d. deuterium
ANSWER: a
REFERENCES: Technology
LEARNING OBJECTIVES: terrorism.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
Copyright Cengage Learning. Powered by Cognero. Page 940.As the world moves closer to a global economy, terrorists have found that striking of operations.
a. economic targets
b. national targets
c. symbolic targets
d. security targets
increases the effectiveness
ANSWER: a
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
41. Which of the following is NOT a target of transnational attack?
a. Tourism
b. Energy
c. Transportation
d. Consumerism
ANSWER: d
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
42.J. Bowyer Bell refers to
terrorism, which is a form of violence that occurs in Africa
___________________
where arbitrary national boundaries have been drawn through ethnic and tribal divisions.
a. endemic
b. ethnic
c. epidemic
d. evident
ANSWER: a
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
1043. In 2003, Al Qaeda began targeting oil facilities in what country?
a. Iran
b. Saudi Arabia
c. Iraq
d. Kuwait
ANSWER: b
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
44. Daly says that the Taliban believes that the most effective way to destroy the Pakistan government is to attack
.
a. political targets
b. women and children
c. economic targets
d. allies of the Pakistani government
ANSWER: c
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
45. After the September 11 attacks, the federal government immediately budgeted $ 4.8 billion to protect the a. shipping
b. aviation
c. computer
d. banking
ANSWER: b
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
46.The in eastern Turkey conducted the least deadly attacks in the course of modern
suicide bombing, killing an average of two people per incident.
a. Black Tigers
b. Kurdistan Workers’ Party
c. Tamil Hindus
d. Russian Orthodox Christians
ANSWER: b
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. industry.
Page
11have conducted more suicide bombings than any other group.
47. According to the text, the a. Buddhist Sinhalese
b. Sunni Kurds
c. LTTE Black Tigers
d. Hezbollah
ANSWER: c
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
48. The major factor in deciding to employ suicide terrorists is the a. social structure and culture
b. religiousbeliefs
c. rational choice
d. economic strength
of the group.
ANSWER: a
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand
49. Rohan Gunaratna sees that suicide bombings have which three things in common?
a. Secrecy, reconnaissance, and rehearsal
b. Secrecy, religion, and political agendas
c. Political agendas, chance of success, and secrecy
d. Secrecy, rehearsal, and chance of success
ANSWER: a
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
50. Which of the following is not a major type of suicide attack?
a. Suicide in warfare
b. Suicide for a principle without killing others
c. Suicide by cop
d. Suicide terrorism
ANSWER: c
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
1251.More a. Catholics
b. Muslims
c. Jews
d. atheists
are targeted in suicide attacks than any other group.
ANSWER: b
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand
52. Margaret Gonzalez-Perez found that the role of women in terrorist groups is more closely determined by the
__________ orientation of an organization than its tactics.
a. gender
b. economic
c. religious
d. political
ANSWER: d
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored
women in terrorism.
KEYWORDS: BLOOM’S: Understand
53. Criminologists frequently complain that on victimization.
a. children
b. females
c. males
d. animals
are often ignored in the study of crime, unless the study focuses
ANSWER: b
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored
women in terrorism.
KEYWORDS: BLOOM’S: Understand
54. The first known female suicide bomber (employed against an Israeli convoy) occurred in which
decade? a. 1970s
b. 1980s
c. 1990s
d.
1960s
ANSWER: b
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and
religious groups.
Copyright Cengage Learning. Powered by Cognero. Page
13KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
1455. Gender impacts terrorist tactics and is often related mostly to the .
a. social standing of the terrorist organization
b. ideology of the terrorist organization
c. economics of the terrorist organization
d. media influence upon the terrorist organization
ANSWER: b
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and
religious groups.
KEYWORDS: BLOOM’S: Understand
Terrorists tend to increase their effectiveness in bombing by applying improved explosives technology to their weapons just
as conventional military forces constantly improve the killing power of their munitions. In 2004, New Scientist reported
that Middle Eastern terrorist groups were working on a two-stage military-style weapon called a mininuke. This type of
explosive is designed to spread fuel in the air and then ignite it. Known as a thermobaric bomb, it actually explodes the air
in the blast area. One analyst speculated that an attack on a Tunisian synagogue in 2002 used this technology (Hambling,
2004).
56.A thermobaric bomb is a force multiplier of what classification?
a. Transnational support
b. Technology
c. Media coverage
d. Religion
ANSWER: b
REFERENCES: Technology
PREFACE NAME: Scientist
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
57. In which targeted environment would you suspect a thermobaric bomb to be a terrorist’s most desirable weapon of choice?
a. A small classroom
b. An underground tunnel
c. An open-air market
d. Middle of the ocean
ANSWER: c
REFERENCES: Technology
PREFACE NAME: Scientist
LEARNING OBJECTIVES: terrorism.
KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
Copyright Cengage Learning. Powered by Cognero. Page
15Brian Jenkins says that the six tactics of terrorism can be enhanced by force multipliers. In military terms, a force multiplier
increases striking power without increasing the strength of a unit. He labels four kinds of force multipliers: Transnational
support, Technology, Media coverage, and Religion. Terrorists routinely use force multipliers because they add to their
aura. All political terrorists want to give the illusion that they can fight on a higher, more powerful level.
58.A terrorist group receives a large sum of cash from a charity organization from another country that enables them
to purchase weapons. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion
ANSWER: a
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
59.A terrorist leader sends coded messages to members of the organization during a televised interview with a local
journalist. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion
ANSWER: c
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
60. Terrorists break through Homeland Security’s firewalls, and hijack and destroy several drones. This scenario is an example
of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion
ANSWER: b
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
Copyright Cengage Learning. Powered by Cognero. Page
1661.A suicide bomber explodes in a local supermarket. This scenario is an example of which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion
ANSWER: a
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
62. Terrorist cell members receive instructions from within the shelter of a local church. This scenario is an example of
which force multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion
ANSWER: a
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
63. Terrorists activate a dirty bomb, which explodes within a military outpost. This scenario is an example of which force
multiplier?
a. Transnational support
b. Technology
c. Media coverage
d. Religion
ANSWER: b
REFERENCES: Tactics and Force Multipliers
PREFACE NAME: Multiplier
LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
Copyright Cengage Learning. Powered by Cognero. Page
17Terrorism by WMD presents a potential strategic scenario and includes biological agents, or biological weapons, which have
been used for centuries. Modern arsenals contain bacterial weapons and viral weapons, with microbes cultured and
refined, or weaponized, to increase their ability to kill. Because bacterial agents are susceptible to antibiotics, nations with
bacterial weapons programs have created strains of bacterial microbes resistant to such drugs. Viral agents are produced
in the same manner, and they are usually more powerful than bacterial agents. Biological agents are difficult to control but
relatively easy to produce. Terrorists may find them to be effective weapons.
There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses;
(3) bacteria; and (4) plagues. The Centers for Disease Control and Prevention (CDC) classifies the most threatening
from the groups as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.
64. Smallpox is classified under which category?
a. Toxin
b. Virus
c. Bacteria
d. Plague
ANSWER: b
REFERENCES: Technology
PREFACE NAME: WMD
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
65. Hemorrhagic fever is classified under which category?
a. Toxin
b. Virus
c. Bacteria
d. Plague
ANSWER: b
REFERENCES: Technology
PREFACE NAME: WMD
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Analyze
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
66. is a phrase used by anarchists around 1848. It means that social order can only
be changed through violent upheaval.
ANSWER: Philosophy of the bomb
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
18, transnational support, media coverage, and religious fanaticism.
67. Jenkins says that there are six tactics of terrorism: and hostage taking.
, arson, assault, kidnapping, bombing,
ANSWER: hijacking
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
68. increase terrorists’ attacking power without increasing personnel.
ANSWER: Force multipliers
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
69. Force multipliers include ANSWER: technology
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.
KEYWORDS: BLOOM’S: Remember
70. present an attractive weapon for terrorists because they are easy to control and the users can avoid the
area they attack.
ANSWER: Chemicals
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
71. Nerve agents enter the body through ingestion, respiration, or ___________________.
ANSWER: contact
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
72. When people are victims of a bacterial attack, may be an effective treatment.
ANSWER: antibiotics
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
Copyright Cengage Learning. Powered by Cognero. Page
1973. There are four types of chemical agents: nerve agents, blood agents, choking agents, and
__________________________.
ANSWER: blistering agents
REFERENCES: Technology
LEARNING OBJECTIVES: weapons.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
74. The most fearful scenario related to WMD involves a(n) explosion.
ANSWER: nuclear
REFERENCES: Technology
LEARNING OBJECTIVES: terrorism.
KEYWORDS: BLOOM’S: Remember
TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
75. systems present a tempting economic target because they produce mass
casualties with minimal effort.
ANSWER: Transportation
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
76.
____________________
increases the ability of terrorist groups to move and hide across a nation.
ANSWER: Transnational support
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
77. Terrorism most frequently affects travelers.
ANSWER: international
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
78.
____________________
terrorism is terrorism that exists inside a political entity.
ANSWER: Endemic
REFERENCES: Economic Targeting and Transnational Attacks
LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
20industries are the most likely targets for a transnational attack.
79. Energy, shipping, and
__________________________
ANSWER: tourism
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Remember
80. suicide refers to the willingness of individuals to sacrifice their lives to benefit their primary reference group,
such as a family, military unit, ethnic group, or country.
ANSWER: Altruistic
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
81. The formal name of the terrorist group referred to as PKK is the _________________________.
ANSWER: Kurdistan Workers’ Party
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
82. Pape takes the study of a theory.
beyond a simple definition of how it happens and offers
ANSWER: suicide terrorism
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
83. The popular conception in Lebanon is that
causes suicide terrorism.
__________________________
ANSWER: militant Islamic theology
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Remember
84. have been involved in terrorist groups throughout the history of modern terrorism, but their role has
been ignored.
ANSWER: Women
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored
women in terrorism.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
2185. The Pakistani Taliban and
in Pakistan in 2010.
formed female suicide cells after the first female suicide bomber struck
______________
ANSWER: al Qaeda
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and
religious groups.
KEYWORDS: BLOOM’S: Remember
86. What is a force multiplier? List and explain force multipliers and how they are used.
ANSWER:• Force multipliers are a method of increasing striking power without increasing the
number of combat troops in a military unit.
Terrorists have four force multipliers: (1) technology to enhance weapons or attacks on
technological facilities, which allows a small group to launch a deadly attack; (2)
transnational support which increases the ability of terrorist groups to move and hide; (3)
media coverage, which can make a minor group appear to be politically important; and
(4) religious fanaticism, which transcends normative political and social boundaries,
increasing violence and decreasing opportunities for negotiation.
• Cyberterrorism and potential WMD attacks are examples of technological force
multipliers.
Media coverage and interpretation of terrorist events often serve as force multipliers –
one incident can be converted into a “campaign” as electronic media scrambles to break
the latest news.
•The triborder region in South America demonstrates that transnational support
networks multiply the striking power of terrorists.
•A new force multiplier has been the introduction of religious fanaticism in terrorist
activities.
•The introduction of religion has introduced suicide attacks into the arsenals of
terrorism.
REFERENCES: Tactics and Force Multipliers
LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.
TERR.WHIT.17.05.03 – List and describe four force multipliers.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
2287. Describe cyberterrorism and its targets; why is it attractive to terrorists? How can cyberterrorism be utilized by terrorists?
ANSWER: Cyberterrorism refers to the use of computers to attack technological targets or physical
attacks on computer networks; The National Conference of State Legislatures defines
cyber-terrorism as the use of information technology by terrorists to promote a political
agenda.
•Terrorists differ from hackers, the council argues, because their purpose is to launch a
systematic attack for political purposes.
•Cyber-terrorism is an attractive low-risk strategy.
•Computers allow terrorist groups to remain connected, providing a means for covert
discussions and anonymity.
•Computer networks are also much less expensive and work intensive than the
secretive infrastructures necessary to maintain terrorist groups.
•Modern Western society needs information and the flow of information to function, so
cyber-terrorists threaten to interrupt or confuse that flow of information.
• The most common tactic to date has been the defacement of websites.
•The targets for cyber-terrorism include: computers, computer networks, and
information storage and retrieval systems.
•Computer virus is implanted in an enemy’s computer.
“Logic bombs,” or snippets of program code that lie dormant for years until they are
instructed to overwhelm a computer system.
•Bogus computer chips sold to sabotage an enemy’s computer network.
•Trojan horses can contain malevolent code that can destroy a system, and “back
doors” in computer systems can allow terrorists to enter systems thought to be secured.
•Shahar believes that conventional attacks, such as overloading an electrical system,
threaten computer security.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
2388. Name and summarize the effects of the most threatening biological agents indicated by the Centers for Disease Control
and Prevention. Describe the two biological attacks on U.S. soil.
ANSWER:• The Centers for Disease Control and Prevention (CDC) classifies the most threatening
agents as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.
Smallpox is a deadly, contagious virus. Many people were vaccinated against smallpox
in their childhood, but these old vaccinations are no longer effective against the disease.
•Anthrax is a noncontagious bacterial infection, and plague is transmitted by insects.
•Botulism is a kind of food borne illness, and other bacteria can be modified to serve as
weapons.
• Hemorrhagic fevers are caused by viruses. One of the most widely known
hemorrhagic fevers is the Ebola virus.
•The first modern use of biological terrorism in the United States was engineered
in 1984 by followers of a religious group in Oregon.
•The group spread bacteria in area salad bars in attempt to sicken voters during a local
election.
•Their intent was to elect their religious followers to local office.
•Hundreds of people suffered food poisoning as a result.
•The second attack involved anthrax and came in the wake of 9/11.
•It began in Florida when two tabloid workers were infected by anthrax through the
mail. One of the victims died.
•In the following days anthrax appeared again as NBC Nightly News received spores
in the mail.
• Staffers at the office of former Senate majority leader Thomas Daschle noticed a
white powdery substance in a letter.
•The powder contained anthrax spores, and although there were no fatalities, legislative
offices were closed in Washington, D.C., for several weeks.
Mysteriously, other people died on the East Coast with no explanation of how the
anthrax was spreading.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
weapons.
KEYWORDS: BLOOM’S: Remember
Copyright Cengage Learning. Powered by Cognero. Page
2489. Describe the four types of chemical agents as well as the problems they present. When are chemical weapons
most effective?
ANSWER:• There are four types of chemical agents: nerve agents, blood agents, choking agents,
and blistering agents.
•Nerve agents enter the body through ingestion, respiration, or contact.
•Blood and choking agents are usually absorbed through the respiratory system.
•Blistering agents burn skin and internal tissue upon contact.
Chemicals present an attractive weapon for terrorists because they are easy to control
and, unlike biological weapons, the users can avoid the area they attack.
•Chemical weapons present four problems.
•First, terrorists must have a delivery mechanism; that is, they need some way to spread
the chemical.
•The second problem is related to the first. Bombing is a popular tactic, but the heat of
most explosives incinerates chemical agents.
• It takes a lot of chemicals to present a threat.
•Finally, weather patterns, air, and water can neutralize a chemical threat.
• Chemical weapons are most effective when used in a confined space, and they are
difficult to use effectively in large outdoor areas.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological
weapons.
KEYWORDS: BLOOM’S: Understand
Copyright Cengage Learning. Powered by Cognero. Page
2590. What are Michael Levi’s five goals for policy makers? How does Levi suggest the United States approach nuclear terrorism?
ANSWER: Support international efforts to stop the proliferation of nuclear weapons.
•Address nuclear terrorism in conjunction with all other terrorist threats.
•Mandate nuclear threat analysis based on the most probable dangers.
•Create a cooperative multiagency defense system.
•Audit the defense system and reward cooperation.
•Levi suggests that the United States should approach nuclear terrorism in two
manners.
•The first involves debunking popular myths about the subject.
•Policy makers and the public need to understand the basic aspects of nuclear security
and must realize that it is never 100% effective.
•Fear should be rationalized.
•Levi believes it is more logical to look at several realistic scenarios and aim preventive
measures at high probability targets.
•It is not enough to limit the focus on nuclear terrorism – Levi argues for a
comprehensive approach to a terrorist group and all its activities as this provides a better
threat analysis than limited attention to nuclear terrorism.
• The second response is to revamp defense systems.
•Protection against any form of terrorism does not involve a single agency
working against a single group.
•Defense involves a multitude of agencies and organizations at all levels of government
and liaison with private organizations.
• Levi argues that the current bureaucracy does not provide protection because agencies
protect turf, they do not share information, and administration is confused and
competitive.
•Oversight of defense systems needs to be clarified and streamlined, and agency
managers should be routinely evaluated on the ability to work with other agencies and to
share information.
REFERENCES: Technology
LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear
terrorism.
KEYWORDS: BLOOM’S: Analyze
Copyright Cengage Learning. Powered by Cognero. Page
2691. How does oil in the Niger Delta represent a different opportunity for economic attack?
ANSWER:• Oil in the Niger Delta represents a different opportunity for economic attack as it
simultaneously funds terrorists and other violent groups while serving as a target for
terrorism.
•Dilapidated storage facilities and pipelines have become an ecological disaster for the
impoverished local residents.
•The result is an environment that encourages sub-national violence and that might
serve as a base for international terrorism.
•The energy environment in Africa represents an interesting paradox.
•If poverty, endemic terrorism, and criminalized politics are not addressed by
the industrial world, areas like the Niger Delta will evolve in two directions.
•They will become the base for the emergence of new international terrorist groups,
providing excellent resources for training and eluding detection.
•At the same time, the energy resources in the delta provide a target-rich environment
for terrorists.
REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks
TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,
energy, and transportation industries.
KEYWORDS: BLOOM’S: Analyze
92. Explain Pape’s theory of suicide terrorism.
ANSWER: He believes three factors must be in place before a suicide terror campaign can take
place. First, a nationalistic or ethnic group must be resisting the occupation of a foreign
power. Second, the foreign power must have a democratic government whose voters
will not routinely allow the indiscriminate slaughter and total repression of the people
in the occupied area. Finally, there must be a difference in the religions of the
occupying power and the people living under occupation. This is a key point in the
theory. Such terrorism does not happen when the occupied and occupier share a single
religion; it is caused by differences between the two religions.
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand
Copyright Cengage Learning. Powered by Cognero. Page
2793. Explain Domenico Tosini’s beliefs regarding suicide, religion, and terrorism.
ANSWER:• Tosini believes the link between suicide and religion has been disproved given
that secular terrorist groups have employed the tactic.
•Tosini believes that rational choice and religion are secondary factors in suicide
attacks.
•The major factor is the social structure and culture of the group engaged in suicide
terrorism.
•Groups take actions inside social structures based on their understanding of reality –
this can create the group dynamics that lead to suicide terrorism.
•The dynamic agents involved in a suicide bombing are the armed terrorist group, the
group’s supporters, and the bombers.
• These three entities operate in a social network where decisions are made based on
the interpretations of situations.
•The decision to engage in suicide bombing is based on the interactions of terrorists,
supporters, and attackers within a surrounding social network.
•Moving beyond rational choice, Tosini argues that the social climate must readily
accept suicide bombings.
• Supporters of a terrorist group have to embrace the idea, and create social rewards for
bombers and their relatives.
•Beyond this, the entire community must accept violence as a normative response to
social grievances and believe that suicide bombing is an acceptable expression of
violence.
•Supporting groups need material and symbolic rewards, and attackers must have a
deep attachment to idealized representations of their communities.
When altruism enters the equation, it produces culture of martyrdom and this in turn,
combines with two common military approaches to war – dehumanization and
depersonalization of enemies.
•Tosini argues that suicide terrorism develops when a culture accepts it as an
expression of altruistic martyrdom and terrorist groups with the culture embrace the
tactic.
•Suicide bombing takes place through a social process that endorses self- sacrifice as a
legitimate expression of normal behavior.
REFERENCES: Suicide Attacks: Conflicting Opinions
LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.
KEYWORDS: BLOOM’S: Understand
Copyright Cengage Learning. Powered by Cognero. Page
2894. What is Laura Sjober’s view of the scholarly literature that covers women and terrorism? Do you agree with Sjober’s
view that the field would be enriched through feminist perspectives? Why or why not?
ANSWER:• Studies of women in terrorism are generally ignored, and when females are discussed
it is in gendered terms.
•They are not “terrorists,” they are “women involved in terrorism.”
•There are exceptions, but most scholars and analysts conclude that women play some
type of nebulous role in terrorism.
•They cannot define the role, and they do not seem to care to do so.
•Media presentations follow the same track – women are neither significant nor worthy
of analysis.
•Sjoberg vehemently disagrees with such characterizations.
•Women do have a special place in terrorism; women are terrorists just like men who
do the same thing.
• There are terrorists who happen to be women, and they have been around for quite
some time.
•There is also no feminist perspective of terrorism; there are feminists who study
terrorism in a variety of ways.
Sjoberg says that scholars and other researchers are reluctant to study political and
criminal violence among women because it violates idealized notions of womanhood.
•Their behavior should be studied from a variety of feminist perspectives, Sjoberg
concludes. Such literature would enrich the field.
•Views will vary.
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored
women in terrorism.
KEYWORDS: BLOOM’S: Understand
Copyright Cengage Learning. Powered by Cognero. Page
2995. Discuss why Margaret Gonzalez-Perez states that women are more attracted to domestic terrorist organizations
than international groups.
ANSWER: Domestic organizations are focused on revolution and social change –
• women are attracted to such groups because they have a chance to redefine their
roles, and males and females welcome them since they want the same
change.
Some groups have a feminist agenda.
•Women have opportunities for leadership in revolutionary groups.
International terrorists resist outside forces such as capitalism and imperialism–they try
to defend a traditional culture that limits the role of women.
•Women in domestic groups gravitate toward combat and leadership.
•Women in international groups are given more limited roles – international terrorists
tend to employ women as supporters, sympathizers, and spies, seldom receiving combat
or leadership positions.
•This pattern remains constant even in social systems that emphasize male dominance.
•For example, it is thought that the machismo influence in Central and South America
would blunt female leadership and combat roles, but the opposite is true.
•Most Central and South American groups have a left-wing revolutionary focus.
•Women move into active roles because the groups are seeking to restructure
their culture and political structure.
Every geographical area produced a common trend; domestic groups emphasized the
role of women even when they have no stated feminist agenda.
REFERENCES: Tactical Misunderstandings and Gender
LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and
religious groups.
KEYWORDS: BLOOM’S: Understand
Copyright Cengage Learning. Powered by Cognero. Page
30
There are no reviews yet.