Terrorism And Homeland Security 9th Edition by Jonathan R. White – Test Bank

$15.00

Pay And Download 

Complete Test Bank With Answers

 

 

Sample Questions Posted Below

 

1. While the term terrorism is difficult to define, the process of terrorism is not.

a. True

b. False

ANSWER: True

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

2. Although terrorist tactics change through time, the most common weapon of terrorism has been and remains the bomb.

a. True

b. False

ANSWER: True

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

3. The media can be used as a force multiplier.

a. True

b. False

ANSWER: True

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

4. Examples of force multipliers include technology and reserve units ‘at the ready’.

a. True

b. False

ANSWER: False

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.03 – List and describe four force multipliers.

KEYWORDS: BLOOM’S: Remember

5. Media coverage can make a minor group appear to be politically important.

a. True

b. False

ANSWER: True

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.03 – List and describe four force multipliers.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page 16. The most common tactic of cyberterrorism to date has been the defacement of Web sites.

a. True

b. False

ANSWER: True

REFERENCES: Technology

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

7. Terrorism is not influenced by technology.

a. True

b. False

ANSWER: False

REFERENCES: Technology

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

8. Cyberterrorism is an attractive, low-risk strategy.

a. True

b. False

ANSWER: True

REFERENCES: Technology

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

9. Radioactive poisoning is highly contagious.

a. True

b. False

ANSWER: False

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

10. Nuclear waste is a ready-made dirty bomb.

a. True

b. False

ANSWER: True

REFERENCES: Nuclear Terrorism

LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

terrorism.

KEYWORDS: BLOOM’S: Understand

Copyright Cengage Learning. Powered by Cognero. Page 211. Only the government and military have access to highly enriched uranium (HEU).

a. True

b. False

ANSWER: False

REFERENCES: Technology

LEARNING OBJECTIVES: terrorism.

KEYWORDS: BLOOM’S: Understand

TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

12. All researchers have determined that the frequency of violence is more important than the severity of terrorist attacks.

a. True

b. False

ANSWER: False

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Understand

13. Researchers have found no relationship between terrorism and tourism.

a. True

b. False

ANSWER: False

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Understand

14. The role of females in terrorist groups is decreasing around the globe.

a. True

b. False

ANSWER: False

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and

religious groups.

KEYWORDS: BLOOM’S: Understand

15. Women often receive combat or leadership positions in international terrorist organizations.

a. True

b. False

ANSWER: False

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and

religious groups.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page 316. Which of the following is not a tactic of terrorism as defined by Brian Jenkins?

a. bombing

b. larceny

c. arson

d. assault

ANSWER: b

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

17. Which of the following tactics is most often employed by terrorists?

a. bombing

b. kidnapping

c. hijacking

d. arson

ANSWER: a

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

18. In 1848, anarchists talked about to destroy it.

a. propaganda by the deed

b. media propaganda

c. public awareness campaigns

d. the philosophy of the bomb

, meaning that the only way to communicate with the social order was

ANSWER: d

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

19. Which type of explosive is designed to spread fuel in the air and then ignite it?

a. Thermobaric bomb

b. Double-sidedbomb

c. Traditional bomb

d. Radio-signaled bomb

ANSWER: a

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page 420. In 2004, New Scientist reported that Middle Eastern terrorist groups were working on a two-stage military-style

weapon called a(n) .

a. IED

b. mininuke

c. drone

d. dirty bomb

ANSWER: b

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

21. Terrorists use

a. force multipliers

b. tactics

c. large memberships

d. secrecy

__________________

to increase their attacking power.

ANSWER: a

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.

KEYWORDS: BLOOM’S: Remember

22. Which of the following is NOT considered a force multiplier?

a. Technology

b. Media

c. Military

d. Religious fanaticism

ANSWER: c

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.

KEYWORDS: BLOOM’S: Understand

23. The National Conference of State Legislature defines promote a political agenda.”

a. narcoterrorism

b. cyberterrorism

c. domestic terrorism

d. transnational terrorism

as “the use of information technology by terrorists to

ANSWER: b

REFERENCES: Technology

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

Copyright Cengage Learning. Powered by Cognero. Page 524. refers to the use of computers to attack technological targets or physical attacks on computer networks.

a. Narcoterrorism

b. Cyberterrorism

c. Domestic terrorism

d. Transnational terrorism

ANSWER: b

REFERENCES: Technology

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

25. Which of the following is NOT a target for cyberterrorism?

a. Computers

b. Freeways

c. Computer networks

d. Information storage and retrieval systems

ANSWER: b

REFERENCES: Technology

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

26. attacks are susceptible to antibiotics.

a. Bacterial

b. Chemical

c. Viral

d. Nuclear

ANSWER: a

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

27. There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses;

(3) bacteria; and (4) .

a. radiation

b. plagues

c. nerve gas

d. plutonium

ANSWER: b

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

Copyright Cengage Learning. Powered by Cognero. Page 628. Ebola virus is considered a .

a. bacterial infection

b. food borne illness

c. radiological weapon

d. hemorrhagic fever

ANSWER: d

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Understand

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

29. What biological agent infected citizens through the mail in the wake of the attacks on September 11, 2001?

a. Anthrax

b. Smallpox

c. Plague

d. Botulism

ANSWER: a

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

30. Anthrax is considered a .

a. vermin

b. virus

c. bacteria

d. chemical

ANSWER: c

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

31. enter the body through ingestion, respiration, or contact.

a. Blood agents

b. Blistering agents

c. Nerve agents

d. Choking agents

ANSWER: c

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

Copyright Cengage Learning. Powered by Cognero. Page 732. Most dirty-bomb scenarios are based on the premise that a a. bacterial

b. viral

c. chemical

d. radiological

agent will be used with a conventional explosive.

ANSWER: d

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

33. is considered a non-contagious bacterial infection.

a. Smallpox

b. MRSA

c. Hemorrhagic fever

d. Anthrax

ANSWER: d

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

34. The United States has experienced notable biological attacks since 1980.

a. zero

b. one

c. two

d. ten

ANSWER: c

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

35. Nerve agents, blood agents, choking agents, and blistering agents are all examples of agents.

a. bacterial

b. chemical

c. viral

d. radiological

ANSWER: b

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

Copyright Cengage Learning. Powered by Cognero. Page 8is the only group that has made an effort to obtain a nuclear device.

36. According to the text, a. LTTE Black Tigers

b. Hezbollah

c. Al Qaeda

d. Kurdistan Workers Party

ANSWER: c

REFERENCES: Technology

LEARNING OBJECTIVES: terrorism.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

37.HEU stands for

________

a. heavily elongated uranium

b. high evolution utilities

c. harsh environmental usage

d. highly enriched uranium

.

ANSWER: d

REFERENCES: Technology

LEARNING OBJECTIVES: terrorism.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

38. Congress mandates that all radioactive waste from America’s nuclear power plants be transported to a repository in

what state?

a. Nevada

b. Arizona

c. Alaska

d. Colorado

ANSWER: a

REFERENCES: Technology

LEARNING OBJECTIVES: terrorism.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

39. The type of nuclear bomb used at Hiroshima employed .

a. highly enriched uranium

b. plutonium

c. neptunium

d. deuterium

ANSWER: a

REFERENCES: Technology

LEARNING OBJECTIVES: terrorism.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

Copyright Cengage Learning. Powered by Cognero. Page 940.As the world moves closer to a global economy, terrorists have found that striking of operations.

a. economic targets

b. national targets

c. symbolic targets

d. security targets

increases the effectiveness

ANSWER: a

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

41. Which of the following is NOT a target of transnational attack?

a. Tourism

b. Energy

c. Transportation

d. Consumerism

ANSWER: d

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

42.J. Bowyer Bell refers to

terrorism, which is a form of violence that occurs in Africa

___________________

where arbitrary national boundaries have been drawn through ethnic and tribal divisions.

a. endemic

b. ethnic

c. epidemic

d. evident

ANSWER: a

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

1043. In 2003, Al Qaeda began targeting oil facilities in what country?

a. Iran

b. Saudi Arabia

c. Iraq

d. Kuwait

ANSWER: b

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

44. Daly says that the Taliban believes that the most effective way to destroy the Pakistan government is to attack

.

a. political targets

b. women and children

c. economic targets

d. allies of the Pakistani government

ANSWER: c

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

45. After the September 11 attacks, the federal government immediately budgeted $ 4.8 billion to protect the a. shipping

b. aviation

c. computer

d. banking

ANSWER: b

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

46.The in eastern Turkey conducted the least deadly attacks in the course of modern

suicide bombing, killing an average of two people per incident.

a. Black Tigers

b. Kurdistan Workers’ Party

c. Tamil Hindus

d. Russian Orthodox Christians

ANSWER: b

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. industry.

Page

11have conducted more suicide bombings than any other group.

47. According to the text, the a. Buddhist Sinhalese

b. Sunni Kurds

c. LTTE Black Tigers

d. Hezbollah

ANSWER: c

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

48. The major factor in deciding to employ suicide terrorists is the a. social structure and culture

b. religiousbeliefs

c. rational choice

d. economic strength

of the group.

ANSWER: a

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Understand

49. Rohan Gunaratna sees that suicide bombings have which three things in common?

a. Secrecy, reconnaissance, and rehearsal

b. Secrecy, religion, and political agendas

c. Political agendas, chance of success, and secrecy

d. Secrecy, rehearsal, and chance of success

ANSWER: a

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

50. Which of the following is not a major type of suicide attack?

a. Suicide in warfare

b. Suicide for a principle without killing others

c. Suicide by cop

d. Suicide terrorism

ANSWER: c

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

1251.More a. Catholics

b. Muslims

c. Jews

d. atheists

are targeted in suicide attacks than any other group.

ANSWER: b

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Understand

52. Margaret Gonzalez-Perez found that the role of women in terrorist groups is more closely determined by the

__________ orientation of an organization than its tactics.

a. gender

b. economic

c. religious

d. political

ANSWER: d

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored

women in terrorism.

KEYWORDS: BLOOM’S: Understand

53. Criminologists frequently complain that on victimization.

a. children

b. females

c. males

d. animals

are often ignored in the study of crime, unless the study focuses

ANSWER: b

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored

women in terrorism.

KEYWORDS: BLOOM’S: Understand

54. The first known female suicide bomber (employed against an Israeli convoy) occurred in which

decade? a. 1970s

b. 1980s

c. 1990s

d.

1960s

ANSWER: b

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and

religious groups.

Copyright Cengage Learning. Powered by Cognero. Page

13KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

1455. Gender impacts terrorist tactics and is often related mostly to the .

a. social standing of the terrorist organization

b. ideology of the terrorist organization

c. economics of the terrorist organization

d. media influence upon the terrorist organization

ANSWER: b

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and

religious groups.

KEYWORDS: BLOOM’S: Understand

Terrorists tend to increase their effectiveness in bombing by applying improved explosives technology to their weapons just

as conventional military forces constantly improve the killing power of their munitions. In 2004, New Scientist reported

that Middle Eastern terrorist groups were working on a two-stage military-style weapon called a mininuke. This type of

explosive is designed to spread fuel in the air and then ignite it. Known as a thermobaric bomb, it actually explodes the air

in the blast area. One analyst speculated that an attack on a Tunisian synagogue in 2002 used this technology (Hambling,

2004).

56.A thermobaric bomb is a force multiplier of what classification?

a. Transnational support

b. Technology

c. Media coverage

d. Religion

ANSWER: b

REFERENCES: Technology

PREFACE NAME: Scientist

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

57. In which targeted environment would you suspect a thermobaric bomb to be a terrorist’s most desirable weapon of choice?

a. A small classroom

b. An underground tunnel

c. An open-air market

d. Middle of the ocean

ANSWER: c

REFERENCES: Technology

PREFACE NAME: Scientist

LEARNING OBJECTIVES: terrorism.

KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

Copyright Cengage Learning. Powered by Cognero. Page

15Brian Jenkins says that the six tactics of terrorism can be enhanced by force multipliers. In military terms, a force multiplier

increases striking power without increasing the strength of a unit. He labels four kinds of force multipliers: Transnational

support, Technology, Media coverage, and Religion. Terrorists routinely use force multipliers because they add to their

aura. All political terrorists want to give the illusion that they can fight on a higher, more powerful level.

58.A terrorist group receives a large sum of cash from a charity organization from another country that enables them

to purchase weapons. This scenario is an example of which force multiplier?

a. Transnational support

b. Technology

c. Media coverage

d. Religion

ANSWER: a

REFERENCES: Tactics and Force Multipliers

PREFACE NAME: Multiplier

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

59.A terrorist leader sends coded messages to members of the organization during a televised interview with a local

journalist. This scenario is an example of which force multiplier?

a. Transnational support

b. Technology

c. Media coverage

d. Religion

ANSWER: c

REFERENCES: Tactics and Force Multipliers

PREFACE NAME: Multiplier

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

60. Terrorists break through Homeland Security’s firewalls, and hijack and destroy several drones. This scenario is an example

of which force multiplier?

a. Transnational support

b. Technology

c. Media coverage

d. Religion

ANSWER: b

REFERENCES: Tactics and Force Multipliers

PREFACE NAME: Multiplier

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

Copyright Cengage Learning. Powered by Cognero. Page

1661.A suicide bomber explodes in a local supermarket. This scenario is an example of which force multiplier?

a. Transnational support

b. Technology

c. Media coverage

d. Religion

ANSWER: a

REFERENCES: Tactics and Force Multipliers

PREFACE NAME: Multiplier

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

62. Terrorist cell members receive instructions from within the shelter of a local church. This scenario is an example of

which force multiplier?

a. Transnational support

b. Technology

c. Media coverage

d. Religion

ANSWER: a

REFERENCES: Tactics and Force Multipliers

PREFACE NAME: Multiplier

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

63. Terrorists activate a dirty bomb, which explodes within a military outpost. This scenario is an example of which force

multiplier?

a. Transnational support

b. Technology

c. Media coverage

d. Religion

ANSWER: b

REFERENCES: Tactics and Force Multipliers

PREFACE NAME: Multiplier

LEARNING OBJECTIVES: KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

Copyright Cengage Learning. Powered by Cognero. Page

17Terrorism by WMD presents a potential strategic scenario and includes biological agents, or biological weapons, which have

been used for centuries. Modern arsenals contain bacterial weapons and viral weapons, with microbes cultured and

refined, or weaponized, to increase their ability to kill. Because bacterial agents are susceptible to antibiotics, nations with

bacterial weapons programs have created strains of bacterial microbes resistant to such drugs. Viral agents are produced

in the same manner, and they are usually more powerful than bacterial agents. Biological agents are difficult to control but

relatively easy to produce. Terrorists may find them to be effective weapons.

There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses;

(3) bacteria; and (4) plagues. The Centers for Disease Control and Prevention (CDC) classifies the most threatening

from the groups as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.

64. Smallpox is classified under which category?

a. Toxin

b. Virus

c. Bacteria

d. Plague

ANSWER: b

REFERENCES: Technology

PREFACE NAME: WMD

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

65. Hemorrhagic fever is classified under which category?

a. Toxin

b. Virus

c. Bacteria

d. Plague

ANSWER: b

REFERENCES: Technology

PREFACE NAME: WMD

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Analyze

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

66. is a phrase used by anarchists around 1848. It means that social order can only

be changed through violent upheaval.

ANSWER: Philosophy of the bomb

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

18, transnational support, media coverage, and religious fanaticism.

67. Jenkins says that there are six tactics of terrorism: and hostage taking.

, arson, assault, kidnapping, bombing,

ANSWER: hijacking

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

68. increase terrorists’ attacking power without increasing personnel.

ANSWER: Force multipliers

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

69. Force multipliers include ANSWER: technology

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS: BLOOM’S: Remember

70. present an attractive weapon for terrorists because they are easy to control and the users can avoid the

area they attack.

ANSWER: Chemicals

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

71. Nerve agents enter the body through ingestion, respiration, or ___________________.

ANSWER: contact

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

72. When people are victims of a bacterial attack, may be an effective treatment.

ANSWER: antibiotics

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

Copyright Cengage Learning. Powered by Cognero. Page

1973. There are four types of chemical agents: nerve agents, blood agents, choking agents, and

__________________________.

ANSWER: blistering agents

REFERENCES: Technology

LEARNING OBJECTIVES: weapons.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

74. The most fearful scenario related to WMD involves a(n) explosion.

ANSWER: nuclear

REFERENCES: Technology

LEARNING OBJECTIVES: terrorism.

KEYWORDS: BLOOM’S: Remember

TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

75. systems present a tempting economic target because they produce mass

casualties with minimal effort.

ANSWER: Transportation

REFERENCES: Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

76.

____________________

increases the ability of terrorist groups to move and hide across a nation.

ANSWER: Transnational support

REFERENCES: Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

77. Terrorism most frequently affects travelers.

ANSWER: international

REFERENCES: Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

78.

____________________

terrorism is terrorism that exists inside a political entity.

ANSWER: Endemic

REFERENCES: Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES: TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

20industries are the most likely targets for a transnational attack.

79. Energy, shipping, and

__________________________

ANSWER: tourism

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Remember

80. suicide refers to the willingness of individuals to sacrifice their lives to benefit their primary reference group,

such as a family, military unit, ethnic group, or country.

ANSWER: Altruistic

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

81. The formal name of the terrorist group referred to as PKK is the _________________________.

ANSWER: Kurdistan Workers’ Party

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

82. Pape takes the study of a theory.

beyond a simple definition of how it happens and offers

ANSWER: suicide terrorism

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

83. The popular conception in Lebanon is that

causes suicide terrorism.

__________________________

ANSWER: militant Islamic theology

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Remember

84. have been involved in terrorist groups throughout the history of modern terrorism, but their role has

been ignored.

ANSWER: Women

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored

women in terrorism.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

2185. The Pakistani Taliban and

in Pakistan in 2010.

formed female suicide cells after the first female suicide bomber struck

______________

ANSWER: al Qaeda

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and

religious groups.

KEYWORDS: BLOOM’S: Remember

86. What is a force multiplier? List and explain force multipliers and how they are used.

ANSWER:• Force multipliers are a method of increasing striking power without increasing the

number of combat troops in a military unit.

Terrorists have four force multipliers: (1) technology to enhance weapons or attacks on

technological facilities, which allows a small group to launch a deadly attack; (2)

transnational support which increases the ability of terrorist groups to move and hide; (3)

media coverage, which can make a minor group appear to be politically important; and

(4) religious fanaticism, which transcends normative political and social boundaries,

increasing violence and decreasing opportunities for negotiation.

• Cyberterrorism and potential WMD attacks are examples of technological force

multipliers.

Media coverage and interpretation of terrorist events often serve as force multipliers –

one incident can be converted into a “campaign” as electronic media scrambles to break

the latest news.

•The triborder region in South America demonstrates that transnational support

networks multiply the striking power of terrorists.

•A new force multiplier has been the introduction of religious fanaticism in terrorist

activities.

•The introduction of religion has introduced suicide attacks into the arsenals of

terrorism.

REFERENCES: Tactics and Force Multipliers

LEARNING OBJECTIVES: TERR.WHIT.17.05.02 – Define force multipliers.

TERR.WHIT.17.05.03 – List and describe four force multipliers.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

2287. Describe cyberterrorism and its targets; why is it attractive to terrorists? How can cyberterrorism be utilized by terrorists?

ANSWER: Cyberterrorism refers to the use of computers to attack technological targets or physical

attacks on computer networks; The National Conference of State Legislatures defines

cyber-terrorism as the use of information technology by terrorists to promote a political

agenda.

•Terrorists differ from hackers, the council argues, because their purpose is to launch a

systematic attack for political purposes.

•Cyber-terrorism is an attractive low-risk strategy.

•Computers allow terrorist groups to remain connected, providing a means for covert

discussions and anonymity.

•Computer networks are also much less expensive and work intensive than the

secretive infrastructures necessary to maintain terrorist groups.

•Modern Western society needs information and the flow of information to function, so

cyber-terrorists threaten to interrupt or confuse that flow of information.

• The most common tactic to date has been the defacement of websites.

•The targets for cyber-terrorism include: computers, computer networks, and

information storage and retrieval systems.

•Computer virus is implanted in an enemy’s computer.

“Logic bombs,” or snippets of program code that lie dormant for years until they are

instructed to overwhelm a computer system.

•Bogus computer chips sold to sabotage an enemy’s computer network.

•Trojan horses can contain malevolent code that can destroy a system, and “back

doors” in computer systems can allow terrorists to enter systems thought to be secured.

•Shahar believes that conventional attacks, such as overloading an electrical system,

threaten computer security.

REFERENCES: Technology

LEARNING OBJECTIVES: TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

2388. Name and summarize the effects of the most threatening biological agents indicated by the Centers for Disease Control

and Prevention. Describe the two biological attacks on U.S. soil.

ANSWER:• The Centers for Disease Control and Prevention (CDC) classifies the most threatening

agents as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.

Smallpox is a deadly, contagious virus. Many people were vaccinated against smallpox

in their childhood, but these old vaccinations are no longer effective against the disease.

•Anthrax is a noncontagious bacterial infection, and plague is transmitted by insects.

•Botulism is a kind of food borne illness, and other bacteria can be modified to serve as

weapons.

• Hemorrhagic fevers are caused by viruses. One of the most widely known

hemorrhagic fevers is the Ebola virus.

•The first modern use of biological terrorism in the United States was engineered

in 1984 by followers of a religious group in Oregon.

•The group spread bacteria in area salad bars in attempt to sicken voters during a local

election.

•Their intent was to elect their religious followers to local office.

•Hundreds of people suffered food poisoning as a result.

•The second attack involved anthrax and came in the wake of 9/11.

•It began in Florida when two tabloid workers were infected by anthrax through the

mail. One of the victims died.

•In the following days anthrax appeared again as NBC Nightly News received spores

in the mail.

• Staffers at the office of former Senate majority leader Thomas Daschle noticed a

white powdery substance in a letter.

•The powder contained anthrax spores, and although there were no fatalities, legislative

offices were closed in Washington, D.C., for several weeks.

Mysteriously, other people died on the East Coast with no explanation of how the

anthrax was spreading.

REFERENCES: Technology

LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

weapons.

KEYWORDS: BLOOM’S: Remember

Copyright Cengage Learning. Powered by Cognero. Page

2489. Describe the four types of chemical agents as well as the problems they present. When are chemical weapons

most effective?

ANSWER:• There are four types of chemical agents: nerve agents, blood agents, choking agents,

and blistering agents.

•Nerve agents enter the body through ingestion, respiration, or contact.

•Blood and choking agents are usually absorbed through the respiratory system.

•Blistering agents burn skin and internal tissue upon contact.

Chemicals present an attractive weapon for terrorists because they are easy to control

and, unlike biological weapons, the users can avoid the area they attack.

•Chemical weapons present four problems.

•First, terrorists must have a delivery mechanism; that is, they need some way to spread

the chemical.

•The second problem is related to the first. Bombing is a popular tactic, but the heat of

most explosives incinerates chemical agents.

• It takes a lot of chemicals to present a threat.

•Finally, weather patterns, air, and water can neutralize a chemical threat.

• Chemical weapons are most effective when used in a confined space, and they are

difficult to use effectively in large outdoor areas.

REFERENCES: Technology

LEARNING OBJECTIVES: TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological

weapons.

KEYWORDS: BLOOM’S: Understand

Copyright Cengage Learning. Powered by Cognero. Page

2590. What are Michael Levi’s five goals for policy makers? How does Levi suggest the United States approach nuclear terrorism?

ANSWER: Support international efforts to stop the proliferation of nuclear weapons.

•Address nuclear terrorism in conjunction with all other terrorist threats.

•Mandate nuclear threat analysis based on the most probable dangers.

•Create a cooperative multiagency defense system.

•Audit the defense system and reward cooperation.

•Levi suggests that the United States should approach nuclear terrorism in two

manners.

•The first involves debunking popular myths about the subject.

•Policy makers and the public need to understand the basic aspects of nuclear security

and must realize that it is never 100% effective.

•Fear should be rationalized.

•Levi believes it is more logical to look at several realistic scenarios and aim preventive

measures at high probability targets.

•It is not enough to limit the focus on nuclear terrorism – Levi argues for a

comprehensive approach to a terrorist group and all its activities as this provides a better

threat analysis than limited attention to nuclear terrorism.

• The second response is to revamp defense systems.

•Protection against any form of terrorism does not involve a single agency

working against a single group.

•Defense involves a multitude of agencies and organizations at all levels of government

and liaison with private organizations.

• Levi argues that the current bureaucracy does not provide protection because agencies

protect turf, they do not share information, and administration is confused and

competitive.

•Oversight of defense systems needs to be clarified and streamlined, and agency

managers should be routinely evaluated on the ability to work with other agencies and to

share information.

REFERENCES: Technology

LEARNING OBJECTIVES: TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear

terrorism.

KEYWORDS: BLOOM’S: Analyze

Copyright Cengage Learning. Powered by Cognero. Page

2691. How does oil in the Niger Delta represent a different opportunity for economic attack?

ANSWER:• Oil in the Niger Delta represents a different opportunity for economic attack as it

simultaneously funds terrorists and other violent groups while serving as a target for

terrorism.

•Dilapidated storage facilities and pipelines have become an ecological disaster for the

impoverished local residents.

•The result is an environment that encourages sub-national violence and that might

serve as a base for international terrorism.

•The energy environment in Africa represents an interesting paradox.

•If poverty, endemic terrorism, and criminalized politics are not addressed by

the industrial world, areas like the Niger Delta will evolve in two directions.

•They will become the base for the emergence of new international terrorist groups,

providing excellent resources for training and eluding detection.

•At the same time, the energy resources in the delta provide a target-rich environment

for terrorists.

REFERENCES: LEARNING OBJECTIVES: Economic Targeting and Transnational Attacks

TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist,

energy, and transportation industries.

KEYWORDS: BLOOM’S: Analyze

92. Explain Pape’s theory of suicide terrorism.

ANSWER: He believes three factors must be in place before a suicide terror campaign can take

place. First, a nationalistic or ethnic group must be resisting the occupation of a foreign

power. Second, the foreign power must have a democratic government whose voters

will not routinely allow the indiscriminate slaughter and total repression of the people

in the occupied area. Finally, there must be a difference in the religions of the

occupying power and the people living under occupation. This is a key point in the

theory. Such terrorism does not happen when the occupied and occupier share a single

religion; it is caused by differences between the two religions.

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Understand

Copyright Cengage Learning. Powered by Cognero. Page

2793. Explain Domenico Tosini’s beliefs regarding suicide, religion, and terrorism.

ANSWER:• Tosini believes the link between suicide and religion has been disproved given

that secular terrorist groups have employed the tactic.

•Tosini believes that rational choice and religion are secondary factors in suicide

attacks.

•The major factor is the social structure and culture of the group engaged in suicide

terrorism.

•Groups take actions inside social structures based on their understanding of reality –

this can create the group dynamics that lead to suicide terrorism.

•The dynamic agents involved in a suicide bombing are the armed terrorist group, the

group’s supporters, and the bombers.

• These three entities operate in a social network where decisions are made based on

the interpretations of situations.

•The decision to engage in suicide bombing is based on the interactions of terrorists,

supporters, and attackers within a surrounding social network.

•Moving beyond rational choice, Tosini argues that the social climate must readily

accept suicide bombings.

• Supporters of a terrorist group have to embrace the idea, and create social rewards for

bombers and their relatives.

•Beyond this, the entire community must accept violence as a normative response to

social grievances and believe that suicide bombing is an acceptable expression of

violence.

•Supporting groups need material and symbolic rewards, and attackers must have a

deep attachment to idealized representations of their communities.

When altruism enters the equation, it produces culture of martyrdom and this in turn,

combines with two common military approaches to war – dehumanization and

depersonalization of enemies.

•Tosini argues that suicide terrorism develops when a culture accepts it as an

expression of altruistic martyrdom and terrorist groups with the culture embrace the

tactic.

•Suicide bombing takes place through a social process that endorses self- sacrifice as a

legitimate expression of normal behavior.

REFERENCES: Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES: TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS: BLOOM’S: Understand

Copyright Cengage Learning. Powered by Cognero. Page

2894. What is Laura Sjober’s view of the scholarly literature that covers women and terrorism? Do you agree with Sjober’s

view that the field would be enriched through feminist perspectives? Why or why not?

ANSWER:• Studies of women in terrorism are generally ignored, and when females are discussed

it is in gendered terms.

•They are not “terrorists,” they are “women involved in terrorism.”

•There are exceptions, but most scholars and analysts conclude that women play some

type of nebulous role in terrorism.

•They cannot define the role, and they do not seem to care to do so.

•Media presentations follow the same track – women are neither significant nor worthy

of analysis.

•Sjoberg vehemently disagrees with such characterizations.

•Women do have a special place in terrorism; women are terrorists just like men who

do the same thing.

• There are terrorists who happen to be women, and they have been around for quite

some time.

•There is also no feminist perspective of terrorism; there are feminists who study

terrorism in a variety of ways.

Sjoberg says that scholars and other researchers are reluctant to study political and

criminal violence among women because it violates idealized notions of womanhood.

•Their behavior should be studied from a variety of feminist perspectives, Sjoberg

concludes. Such literature would enrich the field.

•Views will vary.

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored

women in terrorism.

KEYWORDS: BLOOM’S: Understand

Copyright Cengage Learning. Powered by Cognero. Page

2995. Discuss why Margaret Gonzalez-Perez states that women are more attracted to domestic terrorist organizations

than international groups.

ANSWER: Domestic organizations are focused on revolution and social change –

• women are attracted to such groups because they have a chance to redefine their

roles, and males and females welcome them since they want the same

change.

Some groups have a feminist agenda.

•Women have opportunities for leadership in revolutionary groups.

International terrorists resist outside forces such as capitalism and imperialism–they try

to defend a traditional culture that limits the role of women.

•Women in domestic groups gravitate toward combat and leadership.

•Women in international groups are given more limited roles – international terrorists

tend to employ women as supporters, sympathizers, and spies, seldom receiving combat

or leadership positions.

•This pattern remains constant even in social systems that emphasize male dominance.

•For example, it is thought that the machismo influence in Central and South America

would blunt female leadership and combat roles, but the opposite is true.

•Most Central and South American groups have a left-wing revolutionary focus.

•Women move into active roles because the groups are seeking to restructure

their culture and political structure.

Every geographical area produced a common trend; domestic groups emphasized the

role of women even when they have no stated feminist agenda.

REFERENCES: Tactical Misunderstandings and Gender

LEARNING OBJECTIVES: TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and

religious groups.

KEYWORDS: BLOOM’S: Understand

Copyright Cengage Learning. Powered by Cognero. Page

30

There are no reviews yet.

Add a review

Be the first to review “Terrorism And Homeland Security 9th Edition by Jonathan R. White – Test Bank”

Your email address will not be published. Required fields are marked *

Category:
Updating…
  • No products in the cart.