Terrorism and Homeland Security.10th Edition by Jonathan R. White and Steven Chermak Test Bank

Page 1


Name:

Class:

Date:

Chap 01_10e Indicate whether the statement is true or false. 1. Edmund Burke used the term terrorism to describe the situation of revolutionary Paris in 1787. a. True b. False 2. The meaning of terrorism has changed with political tides in Western history. a. True b. False 3. The term terrorism is not loaded with politically explosive meanings. a. True b. False 4. Russia was the site of the Easter Rising of 1916. a. True b. False 5. Terrorists are treated differently from criminals and other enemies of the state. a. True b. False 6. Definitions of terrorism are important because they impact policies. a. True b. False 7. Guerrilla tactics were used throughout the Napoleonic Wars. a. True b. False 8. The social context surrounding the term terrorism influences how it is defined. a. True b. False 9. Guerrilla warfare originated in Spain. a. True b. False 10. Terrorism came into existence during the American Revolution. a. True b. False 11. European governments and capitalists came to fear class revolution as a series of uprisings swept across Europe in 1848. a. True b. False Page 1


Name:

Class:

Date:

Chap 01_10e 12. European capitalists of the 1800s opposed all forms of socialism and anarchy. a. True b. False 13. Terrorism is difficult to define because it is not a physical entity that has dimensions to be measured, weighed, and analyzed. a. True b. False 14. Modern terrorism surfaced with violent anarchists in the late 1800s. a. True b. False 15. One of the factors that influenced the adoption of violent action by anarchists was the invention of dynamite. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Modern terrorism, as defined in the text, surfaced with violent anarchists in the late a. 1900s b. 1700s c. 1600s d. 1800s

.

17. Karl Marx and Friedrich Engels immortalized their socialist ideals in their 1848 work __________________________. a. The Communist Manifesto b. The Minimanual of the Urban Guerrilla c. Catechism of the Revolutionary d. Revolution, Terrorism, Banditry 18. The Minimanual of the Urban Guerrilla was written by _______________________. a. Michael Collins b. Joseph Stalin c. Carlos Marighella d. Boaz Ganor 19. The primary targets of the IRB’s 1870 terrorist campaign were ___________________________. a. Republicans b. Unionists and British forces c. Protestants d. Catholics

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 01_10e 20. What is the name of the political party of Irish Republicans? a. Sinn Fein b. Supreme Counsel of the IRB c. Royal Irish Constabulary d. Irish Republican Army 21. After the Russian Revolution, anarchism spread to the United States in the form of _______________. a. religious extremism b. right-wing extremism c. nationalistic terrorism d. labor violence 22. Which of the following combines the common elements of the definitions of terrorism used by leading scholars in the field of terrorism? a. Academic consensus definition b. Social construct c. Social context d. Selective terrorism 23. In the nineteenth century, those who advocated the creation of cooperative societies without centralized governments were known as _____. a. republicans b. anarchists c. unionists d. socialists 24. Which of the following is an element of an ideal society, in communist thought? a. A strong centralized government b. The creation of cooperative societies without governments c. A decentralized economy d. The elimination of government control 25. Proudhon’s philosophy would most appropriately classify him as a(n): a. socialist. b. anarchist. c. communist. d. terrorist.

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 01_10e 26. Which of the following groups sought to bring democracy to all classes and demanded immediate and drastic change? a. Anarchists b. Communists c. Radical democrats d. Capitalist democrats 27. Which of the following is a feature of guerrilla warfare as practiced in Spain in the Napoleonic wars? a. Attacks on French civilians by Spanish partisans b. Small groups of partisans attacking French troops in unconventional ways c. Large groups of soldiers fighting the French on a battlefield d. Large groups of French soldiers attacking Spanish civilian populations 28. Which of the following terms changes with social and historical circumstances when defined? a. War b. Anarchism c. Terrorism d. Violence 29. In 1916, Patrick Pearse and James Connolly started the ___________________. a. Supreme Council of IRB b. Sinn Fein c. Easter Rising d. Black and Tan War 30. Who of the following believes that it is necessary to emphasize the criminal nature of terrorism and move the focus beyond the debates about politics? a. Ganor b. Laqueur c. Reitan d. Schbley 31. Who of the following solidified Communist control of Russia through a secret police organization? a. Lenin b. Putin c. Stalin d. Marx 32. In which of the following country was the Black and Tan War fought? a. England b. Ireland c. Wales d. Scotland Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 01_10e 33. Which of the following is a collection of particular people who are attacked by terrorists simply because they belong to a particular unit? a. Selective target b. Discriminatory target c. Class target d. Group target 34. On which of the following statement would socialists and communists agree on? a. Revolution justifies violence against people. b. The goal of the political system should be democracy. c. Government control over the economy should be restricted. d. Wealth is not a private entitlement and should be divided equally among all classes. 35. The domestic terror bombing in Oklahoma City occurred in: a. 2001. b. 2010. c. 1995. d. 1878. 36. On November 5, 2009, in which city did U.S. Army Major Nidal Malik Hasan go on a shooting spree and kill thirteen people? a. Tacoma, WA b. Fort Hood, TX c. Virginia Tech, VA d. Washington, DC 37. Which of the following was advocated by Narodnaya Volya (the People’s Will)? a. Anarchist terrorism b. Liberal democracy c. Violent socialist revolution d. Religious revival 38. To be included in the Extremist Crime Database, an incident must be _____. a. committed within the United States and tied to an extremist organization b. a crime that results in the death of an innocent person c. committed by a foreign national against United States citizens d. committed against a definite group or target 39. Who of the following authored The Communist Manifesto? a. Lenin b. Stalin c. Proudhon d. Marx and Engels Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 01_10e 40. Which instrument, according to Leon Trotsky, should be used for overthrowing middle-class, or bourgeois, governments? a. Terrorism b. Diplomacy c. Propaganda d. Negotiation 41. The centralized control of the economy is not supported by ___________. a. communists b. socialists c. anarchists d. collectivists 42. Of the following, who would most likely NOT agree with Proudhon’s endeavors? a. Marx b. Prokoptin c. Nechaev d. Heinzen 43. Collins viewed himself as a(n): a. terrorist. b. anarchist. c. nationalist. d. socialist. 44. Lenin and Leon Trotsky believed that terrorism should be used as an instrument for overthrowing _____. a. bourgeois governments b. anarchist governments c. socialist governments d. unelected governments 45. Which of the following statements would Proudhon likely disagree with? a. All classes should have equal authority. b. A centralized government is a necessary evil. c. Property should be commonly held. d. Anarchy would develop by the support of the masses. 46. Sinn Fein is the political party of Irish ________. a. republicanism b. unionism c. catholicism d. protestantism

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 01_10e 47. Anarchism is a philosophical concept that originated in: a. Greece. b. Spain. c. Russia. d. France. 48. A strong centralized government, the elimination of all classes except the working class, and a complete state monopoly over all forms of industrial and agricultural production were advocated by ________. a. socialists b. communists c. anarchists d. capitalists 49. Who of the following orchestrated October 1917 Russian revolution, and removed Russia from World War I? a. Joseph Stalin b. Vladimir Lenin c. Leon Trotsky d. Mikhail Bakunin 50. Who of the following led a second revolution in Russia, bringing the communists to power and set up a dictatorship to enforce Communist Party rule? a. Lenin b. Putin c. Stalin d. Marx 51. Historically, the violence in Ireland has been largely intertwined with conflict between which two religions? a. Anglicanism and Hinduism b. Protestantism and Catholicism c. Judaism and Paganism d. Islam and Catholicism 52. When was the Irish Republican Brotherhood (IRB) established? a. 1840s b. 1850s c. 1860s d. 1870s 53. Which of the following act is an example of Collin’s “selective terrorism”? a. Mass bombing in a public park b. A sniper shooting at officers leaving a police station c. Attacking the financial structure of a city d. Poisoning of a city’s water supply Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 01_10e 54. In which country did terrorism begin as government repression? a. The United States b. France c. Canada d. England 55. Which of the following, in its ideal form, means socialism with economic production and profits being owned and distributed by workers? a. Capitalism b. Democracy c. Communism d. Anarchy 56. The repressive period in France (1794–1795) during which the revolutionary government accused thousands of French nobles and clergy of plotting to restore the monarchy and executed them was known as the _____. a. Black and Tan war b. October Revolution c. Easter Rising d. Reign of Terror 57. Which of the following, according to Reitan, is the distinguishing feature of terrorism? a. Guerrilla warfare b. National liberation c. Group targeting d. Anarchism 58. Who is considered the father of communism? a. Karl Marx b. Friedrich Engels c. Joseph Stalin d. Leon Trotsky 59. During the invasion of which country did Napoleon’s army first encounter guerrilla tactics? a. Spain b. Russia c. England d. Austria

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 01_10e 60. Who of the following stated that terrorism is the use or threatened use of force against innocent victims for political purposes? a. Haviland Smith b. Michael Collins c. Eric Reitan d. Walter Laqueur 61. The term given to the newly formed Republic of Ireland after Irish independence was: a. Black and Tan. b. Free State. c. Free Ireland. d. Independent Ireland. 62. In “Revolution, Terrorism, Banditry,” Bakunin argues that the only way to break the state’s hold on power is _______________. a. revolt b. democracy c. peaceful protest d. terrorism 63. The Royal Irish Constabulary (RIC) was the police force established by ____________________ . a. the United Kingdom b. Sinn Fein c. the IRB d. the Fenian Brotherhood 64. From which revolutionary thought did the motivations behind the People’s Will evolve? a. French b. Russian c. Irish d. Spanish 65. The violence of the French Revolutionary period is colloquially known as ___________. a. Bloody Sunday b. the Reign of Terror c. The Rule d. Black October 66. Who wrote of principles of revolution in “Catechism of the Revolutionary”? a. Nechaev b. Rubenstein c. Marighella d. Bakunin Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 01_10e 67. In Ireland, the Unionists wanted to _____. a. remain in the United Kingdom b. create an independent Ireland c. provide financial relief to the suffering Irish d. support the IRA’s efforts from abroad 68. According to Schmid, terrorism is defined by different people within vacillating social and political realities. In other words, terrorism is a: a. military concept. b. social context. c. social construct. d. truth construct. 69. Soviet is the Russian word for “_____.” a. workers council b. freedom c. kingdom d. revolution 70. Which of the following were the lowest-level legislative body in the Soviet Union following the October Revolution? a. Communists b. Unions c. Nationalists d. Workers’ Councils 71. Who of the following was thrown out of the Communist Party for opposing Stalin and was assassinated by communist agents in Mexico City in 1940? a. Karl Marx b. Friedrich Engels c. Vladimir Lenin d. Leon Trotsky 72. The Fenian Brotherhood was created by Irish immigrants in New York for people in Ireland as a(n) __________. a. financial relief organization b. revolutionary organization c. pacifist organization d. artistic and cultural organization

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 01_10e 73. The Russian Revolution of 1917 began after a general strike in _______________. a. St. Petersburg b. Moscow c. Kiev d. Novgorod 74. Who of the following sees attacks on civilians as the key element differentiating terrorists from legitimate revolutionaries? a. Ganor b. Schmidt c. Jongman d. Reitan 75. In which country did the People’s Will advocate for a violent socialist revolution? a. France b. England c. Russia d. Spain 76. Which group was responsible for the assassination of Czar Alexander II? a. The IRA b. The People’s Will c. Mensheviks d. Hohenzollerns 77. During the Irish War of Independence, Michael Collins did not launch indiscriminate terror attacks, but targeted the British military, the police force it sponsored, and the people who supported the United Kingdom. This is known as_____________. a. extremist crime b. selective terrorism c. the reign of terror d. radical democracy 78. From 1794 to 1795, how many legal executions were conducted by the French government? a. 1,700 b. 17,000 c. 700 d. 170,000

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 01_10e 79. A simple definition of terrorism involves all of the following EXCEPT: a. use of force. b. innocent people. c. political purposes. d. religion. 80. Anarchism is a philosophical concept that originated in ancient _______________. a. Rome b. Greece c. Egypt d. Mesopotamia 81. The main objective of most European middle-class democrats from approximately 1815 to 1848 was to obtain constitutions to ensure ____________ . a. liberty b. strong government c. socialism d. nationalism 82. Which of the following would NOT be a likely target for Collins? a. English politician b. Police officer c. Irish national d. Government worker 83. Which aspect of terrorism, according to Ayla Schbley (2003), needs to be emphasized? a. Personal agenda b. Social aspect c. Political agenda d. Criminal nature 84. Which of the following ideologies gave rise to the Irish Republican Army (IRA)? a. Nationalism b. Socialism c. Communism d. Capitalism 85. According to Schmid, most definitions of the term terrorism have two characteristics: (1) someone is terrorized and (2) the meaning of the term is derived from the terrorists’ __________. a. aims b. religion c. targets and victims d. politics Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 01_10e 86. Why was a civil war in Ireland inevitable despite the British promise of home rule after the first World War? a. Republicans were willing to wait for home rule. b. Unionists were trying to conquer foreign territory. c. The common people in Ireland did not believe the British. d. Both unionists and republicans were vying for power in the independent government. 87. Who of the following claims terrorism constitutes the use or threatened use of force against innocent victims for political purposes? a. Brian Jenkins b. Walter Laqueur c. David Rapoport d. Edward Herman 88. Nationalistic terrorists adopted the tactics, but not the ideology of: a. socialists. b. communists. c. capitalists. d. anarchists. 89. The division of which of the following country by Spanish and French forces sparked the beginning of the Peninsula War (1808–1814)? a. Portugal b. Andorra c. Paris d. Prussia 90. During which revolution did modern terrorism originate? a. Russian b. American c. French d. Industrial 91. Modern terrorism developed out of the a. French Revolution b. Civil War c. American Revolution d. World War II

.

92. The police force established by the United Kingdom in Ireland was known as __________. a. Royal Irish Constabulary b. Sinn Fein c. Irish Republican Army d. Irish Republican Brotherhood Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 01_10e 93. “Selective terrorism” as a strategy was developed by _____________. a. Michael Collins b. Karl Marx c. Karl Heinzen d. Peter Prokoptin 94. Which of the following was an advantage of Irish Republican Brotherhood (IRB)? a. Willingness to be martyred for the cause b. Violent approach to protest c. British support d. Link with Orange Lodges 95. The way that people view reality is known as a(n): a. social construct. b. academic consensus. c. social context. d. social consensus.

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 01_10e Answer Key 1. True 2. True 3. False 4. False 5. True 6. True 7. True 8. True 9. False 10. False 11. True 12. True 13. True 14. True 15. True 16. d 17. a 18. c 19. b 20. a 21. d 22. a 23. b 24. a 25. b 26. c

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 01_10e 27. c 28. c 29. c 30. d 31. c 32. b 33. d 34. d 35. c 36. b 37. c 38. a 39. d 40. a 41. c 42. a 43. c 44. a 45. b 46. a 47. a 48. b 49. b 50. a 51. b 52. b 53. b 54. b Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 01_10e 55. c 56. d 57. c 58. a 59. a 60. d 61. b 62. a 63. a 64. b 65. b 66. a 67. a 68. c 69. a 70. d 71. d 72. a 73. a 74. a 75. c 76. b 77. b 78. b 79. d 80. b 81. a 82. c Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 01_10e 83. d 84. a 85. c 86. d 87. b 88. d 89. a 90. c 91. a 92. a 93. a 94. a 95. a

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 02_10e Indicate whether the statement is true or false. 1. Radicalization is the process that changes a person’s socially acceptable behavior into terrorism. a. True b. False 2. Marighella believed the basis of revolution was gradual democratic change. a. True b. False 3. In terms of terrorism, law enforcement agencies, intelligence organizations, and military forces need to take a practical criminological approach to terrorism. a. True b. False 4. Organized groups are more susceptible to informants and undercover infiltration, but identifying and responding to a lone wolf is much more difficult. a. True b. False 5. Terrorist investigations follow the pattern of most criminal investigations because terrorists behave like normative street criminals. a. True b. False 6. Lone wolves are small groups using terrorism as a strategy. a. True b. False 7. Militancy is a result of alienation. a. True b. False 8. The process of radicalization in prison usually involves a charismatic leader who gathers a number of individuals in an entourage. a. True b. False 9. According to Johnny Ryan, the “Four Ps” concept presents a single interpretive framework that can be used to understand militant rhetoric and violent behavior. a. True b. False 10. Small terrorist groups tend to be weak, while larger groups have more staying power. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 02_10e 11. Unlike the model for urban terrorism, the guerrilla model began with a successful structure and then moved toward a theory. a. True b. False 12. Radicalization is a process that is not specifically applicable to any national, political, religious, or ideological group. a. True b. False 13. Criminals become involved in gangs for economic gain, and they have a low level of commitment to a cause. a. True b. False 14. The motivations of criminals and terrorists are the same. a. True b. False 15. The Weather Underground was a left-wing domestic terrorist group. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Practitioners of which of the following fields believe that research in radicalization and alienation will produce valuable knowledge? a. Practical criminology b. Critical criminology c. Social criminology d. Traditional criminology 17. According to Mark Hamm’s research for the National Institute of Justice, people who join a radical group as a result of a personal problem or difficulty are known as _____. a. protection-seeking converts b. searching converts c. crisis converts d. manipulating converts 18. Which of the following aspects of criminal behavior should police officers be concerned about? a. Theoretical b. Economic c. Psychological d. Practical

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 02_10e 19. Which of the following is true of Marighella’s approach to revolution? a. Violence created a situation in which revolution could flourish. b. Revolutionary violence should be structured and coordinated. c. All violence should be based in rural areas and not in the cities. d. Only specific type of violence was acceptable. 20. Which of the following is not a component of the United Kingdom’s Prison Service program to prevent inmate radicalization? a. Monitoring the behavior of outside chaplains b. Monitoring the items received by inmates c. Isolating inmates who have radical ideas d. Searching for the presence of radicalization 21. In the field of criminology, what do theoretically oriented social scientists focus on? a. Applying scientific findings to criminal behavior b. Identifying solutions to criminal activity c. Increasing the body of scientific knowledge d. Studying the activity patterns of individual criminals 22. Which of the following is a federal agency created in 2004 to integrate all information gathered on international terrorism? a. Department of Homeland Security b. Federation of Law Enforcement c. National Counterterrorism Center d. Joint Terrorism Task Forces 23. According to Mark Hamm, which of the following types of prison inmate is not easily recruited and radicalized? a. Inmates in a state of crisis b. Inmates who have no interest in religion c. Inmates seeking protection in prison d. Inmates who manipulate for personal gain 24. Fear of which of the following religions do prison officials often equate radicalization with, thereby treating specific followers of the religion poorly? a. Islam b. Christianity c. Buddhism d. Judaism

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 02_10e 25. According to D. Douglas Bodrero, which of the following is true of criminals but not of terrorists? a. They use crime for symbolic statement. b. They are dedicated to a particular cause. c. They run when confronted with force. d. They rehearse and prepare for action. 26. In the following list, who was an American white supremacist and antisemite, and responsible for entering the Holocaust Museum and shooting, eventually killing a security officer? a. Frantz Fanon b. Timothy McVeigh c. Bill Ayers d. James W. von Brunn 27. According to Johnny Ryan, which of the following concepts does not result in radicalization? a. Persecution b. Precedent c. Piety d. Practicality 28. According to King and Taylor, which of the following takes place in the initial steps of any model of radicalization? a. Political oppression b. Long-term learning c. Psychological or physical abuse d. Deprivation or alienation 29. Which of the following is NOT one of the three major groups of prison radicalization “converts,” according to Mark Hamm’s theory? a. Islamic extremists b. Christian extremists who use selected biblical passages to justify their views c. White supremacists who have adopted the Norse pantheon d. Left-wing extremists 30. According to Carlos Marighella, which of the following forms the basis of revolution? a. Alienation b. Violence c. Democracy d. Deprivation

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 02_10e 31. Which of the following refers to the psychological process of adopting extremist positions? a. Radicalization b. Socialization c. Alienation d. Communism 32. Out of the following who was a Communist leader, popularizing urban terrorism as a method for ending repression and eliminating U.S. domination of Latin America? a. Guevara b. Fanon c. Marighella d. Marx 33. Which of the following tactics does not work in catching a regular criminal? a. Analyzing the behavior pattern of criminal b. Questioning known associates c. Keeping family and friends under surveillance d. Observing the criminal for long term 34. In Revolution in the Revolution?, which of the following is described by Régis Debray as the dominating issue in the Latin American region? a. Pollution b. Racism c. Socialism d. Poverty 35. According to Mark Hamm, a prison inmate joining a radical terrorist group out of fear is referred to as a a. crisis convert b. protection-seeking convert c. free-world convert d. searching convert

.

36. Johnny Ryan developed the theory of four Ps that result in radicalization by _______________. a. comparing militant Islamic groups with Irish republican militancy b. studying guerrilla warfare in Latin America c. analyzing the triggers and behavior patterns of lone wolf terrorists d. observing domestic terrorist organizations in the United States

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 02_10e 37. Out of the following who advocated guerrilla revolutions throughout Latin America after success in the Cuban Revolution? a. Guevara b. Fanon c. Marighella d. Marx 38. Which of the following terms refers to an individual or group becoming lost in the dominant social world? a. Radicalization b. Alienation c. Militarization d. Anti-socialization 39. Out of the following, who is considered the founding father of criminology? a. Max Weber b. Bruce Hoffman c. Cesare Beccaria d. Karl Marx 40. In the field of criminology, out of the following who focuses on criminological findings that will result in crime fighting and solutions for community problems? a. Social scientists b. Professionals c. Professionally oriented social scientists d. Theoretically oriented social scientists 41. According to a federal indictment, Umar Farouk Abdulmutallab committed which terrorist offense? a. Oklahoma City Bombing b. Attempted to detonate explosives hidden in his underwear on a Northwest Airliner c. Shooting at the U.S. Holocaust Memorial Museum in Washington, D.C. d. Boston Marathon bombing 42. Which of the following is a mode of problem solving based on consensus, and occurs when members of a group value agreement about the way a problem will be solved rather than solving the problem? a. Groupthink b. Alienation c. Socialization d. Imperialism

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 02_10e 43. In the three-step process for the Cuban guerrilla war described by “Che” Guevara, the first step is that _____. a. small forces form columns and control rural areas b. columns unite for an offensive to overthrow government c. revolutionaries join the indigenous population d. forces gather to conduct urban violence 44. Out of the following whose theory originally popularized the concept of alienation? a. Fidel Castro b. Mao Zedong c. Che Guevara d. Karl Marx 45. According to Mark Hamm’s research for the National Institute of Justice, those who have been exposed to religion but seek deeper meaning while in prison are referred to as __________. a. free-world converters b. searching converts c. manipulating converts d. crisis converts 46. Which of the following methods is not used by police officers to suppress ordinary street crimes like burglary? a. Protecting targets b. Denying opportunity to criminals c. Sharing information d. Conducting aggressive patrols 47. Lone wolves are best countered by ________. a. routine law enforcement b. intelligence agencies c. regional task forces d. military forces

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 02_10e 48. George is a young African-American inmate serving time in Folsom after living a difficult life moving from one foster home to another, never really connecting or bonding with another individual. Having just returned from serving extended periods of time in administrative segregation, George is feeling angry and wants revenge. He is approached by another inmate who suggests that he seek the counsel of Raffi, an in-house Imam of sorts. Raffi spends hours with George and sensing George’s vulnerability to suggestion channels George’s anger, convincing him that he (George) is a victim of “the evils of West” and can do something about it. Raffi says he will show George the path if George is willing to prove himself worthy. George begins to spend more time reading militant Islamic writings and meeting with other converted inmates. He believes that he has now “found his way” and “is worthy” and seeks out Raffi for guidance on “how.” Raffi then introduces him to others in the group and assigns him a “very important job.” This is an example of ____________. a. communism b. alienation c. violent radicalization d. prison radicalization 49. People being radicalized in Islam, who accept the idea of the clash of civilizations, believe that _____. a. the West is at war with Islam b. multiple interpretations of religion are valid c. the West and Islamic values can coexist d. Islam is the only supreme virtue 50. Out of the following, who stated that behavior of terrorists differs from that of normative street criminals because ordinary criminals are opportunistic? a. Cesare Beccaria b. Karl Marx c. Cesare Lombroso d. D. Douglas Bodrero 51. Which of the following is not a concern of law enforcement and related security operations? a. Individuals using terrorist tactics b. Small groups using terrorism as a strategy c. Terrorist tactics used to support guerrilla warfare d. Individuals silently protesting for a cause 52. If John Horgan’s theory is accurate, the most effective way to prevent terrorist violence is by _____. a. preventing the radicals’ desire to join or remain in a group b. eliminating extremist ideologies and people who promote them c. identifying the definitive profile of terrorist behavior d. making it a crime to harbor extremist views

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 02_10e 53. Mark Hamm has uncovered processes and stages for conversion to, immersion in, and acceptance of violent radical philosophies or religions within _________. a. prison walls b. commercial organizations c. the media d. the school system 54. Which of the following factors are the primary influences upon single-event terrorists, such as suicide bombers? a. Politics and culture b. Religion and politics c. Culture and ideology d. Ideology and religion 55. Terrorism analysts who began looking at radicalization and alienation in the first part of the twenty-first century focused their attention on individuals attracted to _________. a. Islamic extremism b. Christian extremism c. Jewish extremism d. Hindu extremism 56. Which of the following is not a distinctive form of behavior with regards to religious radicalization? a. Literalist interpretation of religion b. Passivism with regard to religious teachings c. Trusting only selected radical sources of theological information d. Tolerating no deviance from their interpretation 57. The process of adopting extremist positions and engaging in aggressive behavior based on a new set of beliefs is referred to as ___________. a. alienation b. extremism c. violent radicalization d. militant radicalization 58. According to John Horgan, which of the following is the problem of terrorism? a. Violent radicalization b. Radicalization c. Economic deprivation d. Alienation

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 02_10e 59. What is true of Guevara’s guerrilla framework? a. It focuses on rural terrorist groups. b. Terrorism plays a limited role. c. The urban areas have no part to play. d. They prefer indiscriminate violence. 60. According to Gerald Post’s (2007) research, which of the following create(s) the framework for interpreting reality for individuals? a. Education and indoctrination b. Individual psychology c. Religious doctrine d. Political groups 61. Which of the following is true of lone wolf terrorists? a. Their victims are not the audience they are seeking. b. They are either criminals or suffer from mental illness. c. They engage in purposeless violence. d. They do not believe in any particular ideology. 62. According to D. Douglas Bodrero, which of the following is true of terrorists but not of criminals? a. They are opportunistic and untrained. b. They plan their schemes extensively. c. They are not committed to a cause. d. They are unfocused and impulsive. 63. After conferring with several like-minded extremists, a suspect places a bomb under the seat of local politician. The suspect would most accurately be classified as a(n) . a. criminal b. terrorist c. lone wolf d. anarchist 64. Which of the following is not a characteristic feature of radicalized individuals in the United States, according to Mackey and Post? a. Middle-class background b. Anger c. Alienation d. Conformity

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 02_10e 65. Classic criminology focuses on _____. a. theories of group and individual behavior b. what criminals do and the activities they perform c. patterns of criminal action d. preventing criminals from committing crimes 66. According to Hussein Solomon, the sources of radicalization in Africa are to be found in militants who misinterpret ______________. a. science b. religion c. economics d. education 67. According to Marc Sageman’s six-step framework, what is the first step in radicalization? a. Alienation of a young male b. Meeting of similar other males c. Gravitation toward religion d. Meeting a terrorist contact 68. A group of armed and dangerous teenagers are returning home late at night and come across several seemingly unoccupied homes. They enter one home and before taking numerous valuables, spray paint racial slurs on the walls. The suspects would most accurately be classified as _____________. a. criminals b. terrorists c. lone wolves d. anarchists 69. In Sageman’s six-step radicalization model, what is the next step after an alienated youth joins other alienated youths? a. They seek orientation in religion. b. They interpret religion in militant terms. c. They stop at this point. d. They meet a sponsor who knows terrorists. 70. Buford Furrow who entered a Jewish day care center in August 1999 and began shooting people would most accurately be classified as a(n) ________________. a. criminal b. terrorist c. lone wolf d. anarchist

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 02_10e 71. A reclusive individual leaves home following a television documentary on the biblical sins of man over the ages. He decides to shoot randomly at persons in his neighborhood as he claims he was inspired by the show to “cleanse the area.” The suspect would most accurately be classified as a(n) . a. criminal b. terrorist c. lone wolf d. anarchist 72. According to Richard Pickering, which of the following is the best preventative approach to inmate radicalization? a. Monitor behavior of outside chaplains b. Standard monitoring of inmates c. Isolate inmates having radical ideas d. Search for the presence of radicalization 73. Which of the following processes is not involved in terrorism investigations? a. Long-term observation b. Informant development c. Arresting anyone suspicious d. Evidence collection 74. “Che” Guevara believed that the only means of challenging authority was _____________. a. revolution b. capitalism c. religion d. education 75. Dzhokhar Tsarnaev and Tamerlan Tsarnaev are responsible for which of the following terrorist attacks? a. Oklahoma City Bombing b. Colorado Planned Parenthood shooting c. San Bernardino shooting d. Boston Marathon bombing 76. The New York Times reports that most international attacks against the United States in the twenty-first century have come from _____________________. a. well-educated terrorists from the middle class b. immigrants from outside the United States c. political radicals from the upper class d. underprivileged citizens from the lower class

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 02_10e 77. According to Wolfowicz et al.’s (2020) review of risk and protective factors related to religious radicalization, which of the following is one of the most important factors leading to radicalization? a. Religious group identify b. Religious practices c. Religious adherence d. Religious beliefs 78. In September 2014, Eric Matthew Frein attacked a rural Pennsylvania State Police post, shooting two troopers of which one died. Eric Frein can be considered a(n) ___________. a. lone wolf b. terrorist c. criminal d. anarchist 79. According to McCauley and Moskalenko, important life events that alter a person’s social connections leading them to embrace new social ties are another mechanism of radicalization. This is known as _____. a. deprivation b. alienation c. groupthink d. unfreezing 80. Eli Berman suggested that the key to counterterrorism is to focus on _____. a. the point at which individuals adopt radical views b. eliminating the sources of radicalized thought c. radicalized individuals when they try to join the militant group d. controlling all the factors that may radicalize a person 81. Which of the following is not one of the three distinct phases of becoming a terrorist? a. Deciding to study terrorist groups b. Deciding to become a terrorist c. Deciding to remain in a terrorist group d. Deciding to abandon terrorism 82. Which of the following criminology focuses on the common actions of lawbreakers? a. Practical b. Political c. Comparative d. Historical

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 02_10e 83. Which of the following terrorist organizations was a violent domestic extremist group that conducted a number of bomb attacks from 1969 to 1975? a. The Weather Underground b. Kurdistan Workers’ Party c. Ku Klux Klan d. Irish Republican Army 84. Which of the following modes of terrorism involves an individual taking violent action on their own initiative to make a statement? a. State b. Guerrilla c. Lone wolf d. Urban 85. Terrorists may select targets of opportunity, but the target has a a. financial value b. practical value c. symbolic value d. military value

.

86. On Crimes and Punishment is the classic Enlightenment study of criminology by _____. a. Cesare Beccaria b. Umar Farouk Abdulmutallab c. Carlos Marighella d. James W. von Brunn 87. In the book The Wretched of the Earth, out of the following who indicts colonial powers and calls on all the colonized to practice terrorism? a. Che Guevara b. Frantz Fanon c. Carlos Marighella d. Karl Marx 88. According to Mark Hamm’s research for the National Institute of Justice, chaplains outside of the prison system who spread literature and preach radicalization are referred to as ____________________________. a. free-world converters b. searching converts c. protection-seeking converts d. crisis converts

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 02_10e 89. Chetan Bhatt (2010) believes radicalization is associated with _____. a. deprivation b. psychological issues c. cultural assimilation d. alienation 90. Ellen, student council president, leaves her gymnastics class that she has attended with her best friend since childhood to spend some time by herself in the library researching Buddhism. She meets Karen, a loner and terrorist (unbeknownst to Ellen), who suggests that she extend her research to include Islam. Ellen does and over time the two become friends. How many indicators of Sageman’s model exist in this scenario? a. Four b. One c. Five d. Six 91. Mark Hamm argues that for groups being radicalized in prison, the recruitment process is similar to the procedures used by _____________. a. fraternities b. sport teams c. street gangs d. social clubs 92. Which of the following statement is true regarding guerrillas and insurgents? a. They employ indiscriminate violence. b. They select their targets with care. c. They do not target specific people. d. They do not use tactical operations. 93. Why does Brian Jenkins believe that it is possible to identify individuals that are inclined toward violent radicalization? a. Radicals are vocal about their belief and opinions. b. The family and friends of radicals can spot changes in their behavior. c. Radicals exhibit behavioral patterns similar to anarchists. d. Radicals stop socializing with other people and leave their school or job. 94. Which of the following terms was used by John Horgan and refers to the psychological and social factors that motivate people to join and remain in terrorist groups? a. Practical criminology b. Routes to terrorism c. Organizational framework d. Absolute terrorist strategy

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 02_10e 95. In Guevara’s guerrilla framework, the secondary purpose of terrorism is _____. a. to demoralize the government b. to demoralize the people of the country c. to gain monetary wealth d. to promote a political agenda

Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 02_10e Answer Key 1. True 2. False 3. True 4. True 5. False 6. False 7. False 8. True 9. True 10. True 11. True 12. True 13. True 14. False 15. True 16. a 17. c 18. d 19. a 20. b 21. c 22. c 23. b 24. a 25. c 26. d

Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 02_10e 27. d 28. d 29. d 30. b 31. a 32. c 33. d 34. d 35. b 36. a 37. a 38. b 39. c 40. b 41. b 42. a 43. c 44. d 45. b 46. c 47. a 48. d 49. a 50. d 51. d 52. a 53. a 54. d Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 02_10e 55. a 56. b 57. c 58. a 59. b 60. b 61. a 62. b 63. b 64. d 65. a 66. b 67. a 68. a 69. a 70. c 71. c 72. b 73. c 74. a 75. d 76. a 77. a 78. a 79. d 80. c 81. a 82. a Copyright Cengage Learning. Powered by Cognero.

Page 19


Name:

Class:

Date:

Chap 02_10e 83. a 84. c 85. c 86. a 87. b 88. a 89. d 90. a 91. c 92. b 93. a 94. b 95. a

Copyright Cengage Learning. Powered by Cognero.

Page 20


Name:

Class:

Date:

Chap 03_10e Indicate whether the statement is true or false. 1. Terrorist operations are extremely expensive. a. True b. False 2. Many international terrorist groups move money through an ancient trading network called the Hawala system. a. True b. False 3. All countries have prospered through globalization. a. True b. False 4. The first talk of anti-money laundering statutes began to appear in the 1970s, and it was finally outlawed in 1986. a. True b. False 5. Many scholars agree that the narcotics trade is a primary source of money for terrorist organizations. a. True b. False 6. The importance of financing terrorist groups depends on the size of the group, its type of operations, and its purpose. a. True b. False 7. When terrorists move goods, people, weapons, money, or contraband they must never do so through underground networks. a. True b. False 8. Hezbollah and Hamas use the Latin American drug trade to raise funds. a. True b. False 9. Terrorist groups move in different circles than organized criminals, smugglers, and drug dealers. a. True b. False 10. It is hard to trace some money because it is hidden in underground networks. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 03_10e 11. When terrorists raise money, they usually commit the crime after they get the funds. a. True b. False 12. Globalization has facilitated the growth of global underground economy—providing illegal trade routes for drugs, arms smugglers, contraband dealers, and human traffickers. a. True b. False 13. It is popularly believed that the term money laundering first appeared in the 1930s. a. True b. False 14. Organized crime and terrorism are identical. a. True b. False 15. Economic support for terrorism always involves money. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Which of the following are the legal activities used by terrorists to fund their operations? a. For-profit education facilities b. Stock tradings c. Charities and business operations d. Real estate investments 17. According to the FBI, how much does the underground economy produce per year? a. $500 billion b. $500 million c. $1000 billion d. $1000 million 18. According to Giraldo and Trinkunas, which type of autonomy allows terrorists to operate without the constraints of a sponsor? a. Social autonomy b. Financial autonomy c. Religious autonomy d. Cultural autonomy

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 03_10e 19. Which of the following terms describes terrorist organizations using money generated through legitimate means for financing criminal activities? a. Hawala system b. Money laundering c. Money dirtying d. Barter system 20. The British Parliament passed four specific laws against terrorist fundraising before the start of the twenty-first century. Which of the following is one of those laws? a. The possession of terrorist funds would result in a prison term. b. Any assistance to terrorist groups in fundraising was prohibited. c. The concealment of funds, if money was connected to terrorism, would be considered high treason. d. If any funds could be connected to a terrorist group, the government could inflict capital punishment. 21. The political instability of which region in South America is taken advantage of by both terrorists and criminals? a. Brazilian Northeast b. Triborder region c. Trifecta region d. Chilean countryside 22. According to Hamed Tofangsaz, credit cards and checks are types of __________. a. cryptocurrency b. intangible income c. tangible income d. entities used as cash 23. Today, in which of the following countries is the Hawala system used? a. Pakistan b. China c. Afghanistan d. Kyrgyzstan 24. According to Marighella, what is the term used for armed robbery? a. Excavation b. Extermination c. Elimination d. Expropriation

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 03_10e 25. Which of the following terms is used to refer to groups using either terrorist tactics to support drug operations or drug-trade profits to finance terrorism? a. Narcoterrorism b. Narcotactics c. Narcotic terror d. Narcotrafficking 26. Which of the following is a reason for terrorists and criminals using cryptocurrency? a. The location of the money received is difficult to trace. b. These currencies are subject to financial recordkeeping. c. It is difficult to transfer and therefore more secure. d. It is easily exchanged for goods and services. 27. According to David Kaplan, which of the following is responsible for the bulk of terrorist financing? a. Charities b. Drugs c. Crimes d. Prostitution 28. According to Napoleoni, modern terrorism is supported by illegitimate groups that continually change both their organizational structures and political goals to maintain income from an international underground economy. What are these groups called? a. Weak states b. Failed states c. Shell states d. Anarchic states 29. John Cassara argues that it is not possible to track terrorists’ _____. a. cash purchases b. banking accounts c. personal activities d. money laundering 30. Which of the following terrorist organizations ran cigarettes from North Carolina to Michigan and used some of the profits to fund operations in Lebanon? a. Hezbollah b. Hamas c. Abu Nidal d. al Qaeda

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 03_10e 31. Placing criminal proceeds in the legitimate financial system is known as ________ a. placement. b. layering. c. integration. d. exchange. 32. Initially, organized crime families earned money through prostitution, distribution of illegal goods and robberies, which created a problem. What was the problem they faced? a. The police started shutting down their activities and seizing all of their financial assets. b. The profits earned were not substantial enough, thus they were not being able to fund most of their activities. c. They had to account for their assets without linking the source of the money to the crimes they committed. d. They found it difficult to get the manpower for the activities. 33. According to Global Witness, al Qaeda spent 10 years in West Africa, moving into unregulated trading of ______. a. prostitution b. diamond c. drug d. weapons 34. The underground economy and its ties to crime are so important to terrorists because all of the transactions remain_____. a. conspicuous b. legal c. contraband d. hidden 35. Which of the following theories suggests that counterterrorism policies should be aimed at providing the world’s people with economic stability, opportunity, and participation in the mainstream economy? a. Microeconomic theory b. Globalization theory c. Macroeconomic theory d. Global economic theory 36. The process of exchanging money based on trust relationships between money dealers is called ___________ a. money laundering. b. the Hawala system. c. the charitable fronts. d. expropriation.

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 03_10e 37. Globalization is a common global economic network that ideally unites the world through _____. a. economic loans and production b. internal trade and economic loans c. production and international trade d. outsourcing and production 38. According to Freeman, which of the following is NOT needed in an economic theory that accounts for the financing of terrorist organizations and operations? a. Need for money b. Amount of money needed c. System of credit d. Source of income 39. According to Tofangsaz, terrorists need intangible income. Which of the following is an example of such intangible income? a. Faith b. Emotional support c. Propaganda d. Psychological support 40. Presenting illegally gained money in the formal economic system as if it were the result of a legal activity is known as _______ a. placement. b. layering. c. integration. d. exchange. 41. Which of the following is NOT one of the four steps in black market peso exchange? a. Drug traders in the U.S. give U.S. currency to Colombian money brokers for Colombian pesos. b. Brokers sell illegal dollars to Colombian businesses. c. Businesses buy Colombian products. d. Products are exported and sold. 42. Which of the following is the process of converting the proceeds of crime into assets that can be used in the formal economy? a. Layering b. Money dirtying c. Money laundering d. Integration

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 03_10e 43. The political economy of terrorism involves groups that have the ability to act autonomously in _______ a. legitimate and illegitimate states. b. active and inactive states. c. shell and failed states. d. passive and active states. 44. According to Loretta Napoleoni, which of the following terms describes the evolution of terrorist financing from the beginning strategies of the Cold War to the present? a. The new economy of terrorism b. Globalization c. Financial terrorism d. The global industry 45. Ciudad del Este is the major city in _______. a. Brazil b. Paraguay c. the Triborder region d. Argentina 46. According to Rachel Ehrenfeld, terrorists are involved in the international production and distribution of ________ a. tobacco. b. counterfeit goods. c. drugs. d. weapons. 47. Asadullah is an operative for the Lashkar-e-Taiba, a Kashmiri terrorist group. Asif, Asadullah’s contact in Peshawar, needs $500 to buy AK-47s. After raising funds in the United States, Asadullah visits a special shop owner, hands over $500, and asks him to get the money to Asif. The Peshawar shop owner gives Asif the money, not knowing its use. Asif buys the weapons and delivers them to contacts in the Lashkar-e-Taiba. There is no record of the transaction. This financial transaction is an example of: a. Debit system b. Hawala system c. Credit system d. Banking system 48. According to Mario Ferrero, what do modern radical Islamic groups use as a means of providing economic stability? a. Violent activity b. Unregulated diamond trading c. Drug trading d. Document fraud

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 03_10e 49. At the urging of the United States and the United Kingdom, the UN General Assembly adopted the International Convention for which of the following in December, 1999? a. Financial Action Task Force on Money Laundering b. Suppression of the Financing of Terrorism c. Peaceful End of Financing Terrorism d. United Anti-Financing and Money Laundering Agenda 50. Which of the following terms describes a political situation where a government nominally controls its own state but where large regions are either anarchic or under the control of others? a. Monarchical state b. Shell state c. Weak state d. Failed state 51. Which of the following concepts is NOT true? a. Organized criminals are in business to make money. b. Terrorists fight for a cause and use profits to enjoy benefits c. Organized criminals launder illegal profits to enjoy benefits. d. Both organized crime and terrorism are based on money. 52. According to the opponents of narcoterrorism, governments use the term to increase their own power by defining which of the following as terrorists? a. Common criminals b. Muslims c. Mexicans d. Diplomats 53. An area outside a government’s control is known as a(n) _________ a. weak state. b. failed state. c. shell state. d. anarchic state. 54. Which of the following is an investigative tool used to track money used in illegal activities? a. Criminological accounting b. Investigative accounting c. Forensic accounting d. Layering accounting

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 03_10e 55. Which of the following is NOT a step in money laundering? a. Placement b. Layering c. Integration d. Exchange 56. Which of the following is the correct sequence of stages of terrorist financing? a. Acquiring – Securing – Disbursing b. Disbursing – Securing – Utilizing c. Acquiring – Disbursing – Securing d. Securing – Disbursing – Utilizing 57. What does The Economist report terrorism as in terms of the causalities and destruction terrorist events cause? a. Cost-neutral b. Cost-loss c. Cost-effective d. Cost-control 58. Which of the following is based on the belief that international trade barriers should be removed so that commerce and industry can develop in an international free market? a. The new economy b. Globalization c. Financial terrorism d. Global industry 59. Carlos Marighella was_____. a. a terrorist b. a criminal c. a terrorist-philosopher d. a teacher 60. By 2012, the Islamic Maghreb had become the primary source of income for al Qaeda by smuggling _______ a. cocaine. b. opium. c. tobacco. d. alcohol. 61. Which of the following terrorist organizations is most likely to use the black market peso exchange? a. FARC b. PKK c. IRA d. al Qaeda

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 03_10e 62. Which of the following is the correct sequence of operations in the money laundering process? a. integration – layering – placement b. layering – integration – placement c. integration – placement – layering d. placement – layering – integration 63. Which of the following declared that drugs were not linked to al Qaeda’s attack on New York and Washington D.C.? a. Bush Administration b. Obama Administration c. 9/11 Commission d. United Nations 64. Inside Lebanon, an extensive protection racket charges legitimate businesses to ensure that their property will not be damaged and that their personnel are not harmed. The charges are collectively known as the _____. a. Hamas tax b. Hezbollah tax c. protection tax d. income tax 65. Which of the following is NOT an activity terrorists engage in to finance their organization and operations? a. Murder b. Petty theft c. Robbery d. Kidnapping 66. Which of the following militant groups is also a social welfare organization and a political party, using all types of sources for funding? a. Hezbollah b. Hamas c. ISIS d. al-Qaeda 67. Why does Hawala system present challenges for counterterrorism efforts? a. There is no way to trace the flow of funds. b. The system gives terrorists unlimited funds. c. Governments are not able to impose taxes on the transactions. d. No challenge exists—such transactions are common in international banking.

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 03_10e 68. Which of the following is NOT an advantage of the Hawala system? a. A record of the money is kept b. Money crosses international borders with ease c. It is based on trust d. No tax records exist 69. The method for converting illegal profits in U.S. currency to Colombian pesos in an effort to hide the illegal funds is called the _____. a. black market dollar exchange b. black market peso exchange c. black market dollar-peso exchange d. black market exchange 70. Which of the following countries is NOT a part of the Triborder region in South America? a. Brazil. b. Paraguay. c. Argentina. d. Chile 71. Carlos Marighella argued that “urban warfare” begins with a campaign of a. expropriation b. initiation c. money laundering d. investment

.

72. To finance its operations, the IRA developed an organized crime network known as a __________ a. mafia discovery. b. laundering discovery. c. Capone discovery. d. Dillinger discovery. 73. Most of Hezbollah’s funds come from state funding, with Iran as_____. a. a front organization b. a distributor c. a supporter d. the principal sponsor 74. Which country is the primary source of heroin in Europe? a. Afghanistan b. Iraq c. Saudi Arabia d. China

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 03_10e 75. Which of the following is NOT an economic policy to counter terrorism? a. Supporting states in danger of failure b. Increasing loans to Third World Nations c. Providing opportunities for people to participate/benefit from economic systems d. Eliminating underground economic networks 76. For which of the following activities is cash NOT needed in terrorist organizations? a. background research b. bribery c. training d. security 77. In Central Asia, terrorist organizations do NOT engage in which of the following activities? a. Trading of illegal arms b. Money laundering c. Distribution of drugs d. Document fraud 78. Which of the following is NOT an example of layering money by terrorists? a. Converting cash into a money order b. Converting cash into a demand draft c. Buying prepaid charge cards d. Wiring cash to a financer 79. Which of the following refers to the methods used by terrorist groups to raise monetary support for their operations and organizations? a. Money laundering b. Terrorist financing c. Narcoterrorism d. Terrorist funding 80. Which of the following extremist groups uses counterfeiting and fraud as common weapons? a. Asian extremists b. South American extremists c. American extremist right d. Eastern Europe extremists 81. Which of the following terrorist organizations changed the structure of terrorist financing by trying to gain control of the economy? a. FARC b. ETA c. IRA d. PKK Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 03_10e 82. Some analysts believe the primary reason that officials do not understand the financing process is that they lack a ______ a. political framework. b. theoretical framework. c. psychological framework. d. social framework. 83. Concealing the source of illegal income in confusing, sometimes multiple financial actions is known as _______ a. placement. b. layering. c. integration. d. exchange. 84. Illegitimate groups form organizations that act like a government in a place where the government is not strong enough to act. These groups are called _____. a. sovereign states b. failed states c. anarchic states d. shell states 85. According to David Carter, which of the following is used by terrorists for logistics, including financing activities? a. Existing criminal networks b. Newly created criminal networks c. Charities d. Banks 86. Which of the following is a resolution passed by the United Nations in 1990 (strengthened from 2001 to 2006) urging member states to adopt measures to hamper money laundering? a. Financial Action Task Force on Money Laundering b. Suppression of the Financing of Terrorism c. Peaceful End of Financing Terrorism d. United Anti-Financing and Money Laundering Agenda 87. After its long experience with the Irish Republican Army, which of the following was one of the first nations to address terrorist financing? a. The United Kingdom b. Ireland c. The United States d. Italy

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 03_10e 88. According to Jones and Libicki, most terrorist organizations do not survive for a long time. How long do majority of them last for? a. less than a year b. over two years c. five years or more d. approximately ten years 89. Which of the following is NOT one of the three steps to launder money? a. Assimilating illegally obtained money in the formal economy b. Putting criminal proceeds in the legitimate financial system c. Organizing money from legitimate sources d. Multiple transactions to conceal the source 90. According to critics and terrorism analysts, which of the following is a weakness in FATF? a. There is an absence of laws allowing the seizure of assets used to support terrorism. b. The definition of terrorism used is too rigid and does not allow for multiple interpretations. c. Enforcement efforts aimed at underground networks are counterproductive in developed countries. d. Its activities are hampered by stringent requirements for due process. 91. The Hawala system originated under the name of _____ a. “flying money.” b. “hidden money.” c. “record money.” d. “transaction money.” 92. Which of the following is NOT true about narcoterrorism? a. Governments use the term to increase their own power. b. Terrorists use drugs to finance operations. c. There is no relation between drug trade and terrorism. d. Terrorists’ tactics are used to support drug operations. 93. According to Loretta Napoleoni, which of the following profits did the French government take over to finance the war against the Vietminh? a. Fishing profits b. Alcohol profits c. Opium profits d. Textile profits

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 03_10e 94. Which of the following aspects of terrorism has had a great influence upon the changing nature of the international economy? a. Religious b. Financial c. Political d. Social 95. The group ETA changed the structure of terrorist financing by taking certain steps. Which of the following is NOT one of the steps? a. They gained control of the economy. b. They forced Spanish businesses out of the Basque areas and weakened the entire state. c. They established an illegitimate economy in a shell state. d. They paid salaries to all the Spanish citizens.

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 03_10e Answer Key 1. False 2. True 3. False 4. True 5. True 6. True 7. False 8. True 9. False 10. True 11. True 12. True 13. False 14. False 15. False 16. c 17. a 18. b 19. c 20. b 21. b 22. d 23. a 24. d 25. a 26. a

Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 03_10e 27. a 28. c 29. c 30. a 31. a 32. c 33. b 34. d 35. c 36. b 37. c 38. c 39. c 40. c 41. c 42. c 43. c 44. a 45. c 46. c 47. b 48. a 49. b 50. b 51. b 52. a 53. b 54. c Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 03_10e 55. d 56. a 57. c 58. b 59. c 60. c 61. a 62. d 63. c 64. b 65. a 66. a 67. a 68. a 69. b 70. d 71. a 72. c 73. d 74. a 75. b 76. a 77. d 78. b 79. b 80. c 81. b 82. b Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 03_10e 83. b 84. d 85. a 86. a 87. a 88. a 89. c 90. a 91. a 92. b 93. c 94. b 95. d

Copyright Cengage Learning. Powered by Cognero.

Page 19


Name:

Class:

Date:

Chap 04_10e Indicate whether the statement is true or false. 1. Terrorist groups have a special relationship with the news media. a. True b. False 2. While the media enhances the power of terrorism, it does not cause it. a. True b. False 3. Steganography is frequently said to be one of the Internet’s greatest vulnerabilities in light of criminal and terrorist communication. a. True b. False 4. Gender-biased reports do not weaken our ability to respond to terrorism. a. True b. False 5. Sending unsecure email is the most common usage of the Internet by terrorists. a. True b. False 6. New media is any virtual network that allows communication, including blogs, Internet postings, and social networks. a. True b. False 7. Luckily for counterterrorist forces, terrorists do not comprehend the power of the Internet. a. True b. False 8. The Internet has no real impact on news coverage, and generally does not offer any more information than that of the established media in reporting an event. a. True b. False 9. According to Vergani, narratives evolve into hybrid stories more quickly than in the past due to the number of Internet platforms and their instant availability. a. True b. False 10. Television does not impact the way women are viewed in terrorist organizations. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 04_10e 11. Terrorists rarely use the Internet for propaganda. a. True b. False 12. Television and the Internet give terrorists an immediate international audience. a. True b. False 13. The Salafi movement refers to those people who impose Islam with force and violence. a. True b. False 14. Television generates the same stereotypes for female terrorists and politicians. a. True b. False 15. The classic approach in television is the reporting frame. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Which of the following is NOT true of the drama pattern of television news coverage? a. There are actors involved. b. It is a constant in unfolding of events. c. There are on-the-scene reporters. d. There is an anchor in the studio. 17. Which of the following key roles is NOT played by women in terrorist organizations? a. Bolster strength b. Perform crucial work c. Assist in communications d. Create strategies 18. Which of the following is true about Edward Herman’s views on the social construction of reality and political bias when examining the media? a. The political bias is liberal and anti-American. b. The bias is not dominated by multinational corporations. c. The American media is part of a vast propaganda machine. d. Stories affecting corporate profits are never manipulated.

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 04_10e 19. According to Jytte Klausen, which of the following platforms was the most popular form of electronic communication during the Syrian Civil War? a. Facebook b. WhatsApp c. Twitter d. YouTube 20. According to Graber, which of the following did journalists NOT do? a. Presented the anticensorship view b. Cited many governmental mistakes c. Claimed that terrorism was a war of information d. Praised media outlets that self-censored 21. Which of the following statements in NOT true regarding Paul Wilkinson’s theory about the relationship between the media and terrorists? a. Terrorists and the media have an interdependent relationship. b. Terrorist groups need the mainstream media to spread their messages. c. Mass media serve as the terrorists’ social weapon. d. Terrorists may trap the media into spreading their message. 22. Which of the following is NOT a part of preparation and planning required in terrorist activities? a. Collection of material b. Training of the members c. Checking the identification of the members d. Acquiring finance to support the activities 23. According to Judith Harik, which kind of news frames was al Manar television showing about Hezbollah? a. Mythic tales b. Community service c. Reportage d. Investigative 24. Which of the following characteristics is NOT present in a reporting frame? a. It is quick. b. It is fact-driven. c. It requires a beginning. d. It has the latest information. 25. Which of the following does the mass media NOT consist of? a. Pamphlets b. Radio c. Television d. Newspapers Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 04_10e 26. Al Manar is the television network of ________. a. Hezbollah b. Hamas c. Afghanistan d. Iraq 27. Which of the following is NOT a way that terrorists use the Internet? a. Security b. Communication c. Training d. Recruiting 28. Which of the following is NOT a type of TV drama pattern? a. Transformation b. Expertise c. Participation d. Money 29. Who needs to develop analytical skills to examine issues beyond news frames? a. Terrorists b. Consumers c. Politicians d. News anchors 30. A news network breaks into regular programming to report that the President has been shot and more information will be provided as it is learned. Such a report is an example of which type of news frame? a. Dominant b. Reporting c. Reportage d. Investigative 31. What kind of research does terrorism require because it involves so many aspects of the human experience? a. Single stage b. Counterdisciplinary c. Interdisciplinary d. Intradisciplinary 32. According to Nacos, which television news frame creates the appearance of a typical housewife? a. Physical appearance b. Family connection c. Women’s lib d. Terrorist for the sake of love

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 04_10e 33. Which of the following is NOT true about the positions on the steganographic threat to the United States? a. It is used by terrorist groups to communicate. b. No programs are available to detect hidden messages. c. Fear of steganography is the stuff of urban legends. d. It is used by terrorist groups to launch cyberattacks. 34. A news report displays a TV anchor trying to mediate between two criminologists debating the legitimacy of the U.S. government utilizing Guantanamo Bay for housing suspected terrorists. The broadcast is an example of which type of news frame? a. Conflict b. Reporting c. Contention d. Investigative 35. Which of the following processes includes embedding hidden information in a picture, message, or other piece of information? a. Steganography b. Encryption c. Spyware d. Norton 36. Which of the following methods is used by terrorists in selecting targets? a. Internet searches b. Political connections c. Religious tenets d. Economic factors 37. Which is NOT true when security forces respond to a terrorist attack? a. It is projected as a positive image of law enforcement efforts. b. It shows security officials on the scene restoring order and helping victims. c. These efforts work against terrorism. d. These efforts work against the law enforcement agencies. 38. Which communication frame presents two views, each side having experts to support a position? a. Reportage frame b. Dominant frame c. Conflict frame d. Contention frame

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 04_10e 39. The importance of the Internet increased with the increase in joining numbers of which of the following groups to the Salafi movement? a. Males b. Females c. Children d. Missionaries 40. According to Paul Wilkinson, which of the following is NOT a governmental choice while maintaining freedom of press and combating terrorism? a. Public regulation of press b. Laissez-faire attitude c. Complete censorship d. Self-regulation by press 41. Which of the following is NOT an advantage of new media? a. Innovative b. One-way communication c. Fewer controls on the content d. Grows at a faster rate 42. Which system’s law enforcement networks have the ability to share criminal investigative information? a. Rational Ideological Support System b. Regional Information Support System c. Regional Information Sharing System d. Rational Ideological Sharing System 43. Which of the following statements is NOT true about critical media consciousness? a. It helps look for hidden details. b. It helps look for the motives for telling the story. c. It helps look at how the story affected social constructs. d. It helps look for obvious details. 44. Which type of communication frame draws largely upon the broadcaster’s opinion? a. An investigative frame b. A campaigning frame c. A dominant frame d. A reporting frame 45. Ambiguity destroys the ability to create _____________. a. a sustainable news frame b. an informative news frame c. a sponsored news frame d. a valid news frame Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 04_10e 46. Which of the following networks have challenged the West’s hold on international news? a. al Manar and al Jazeera b. al Aqsa Intifada and al Manar c. al Jazeera and al Arabia d. al Arabia and al Aqsa Intifada 47. Who do news personnel NOT rely on when creating stories? a. Individuals that can share the first-hand knowledge b. Individuals that can give opinion c. Individuals that can analyze an event d. Individuals that can report for them 48. Which of the following does NOT threaten the basis of democracy? a. Censorship b. Regulation c. Freedom of speech d. Gathering data from communication 49. The television does NOT portray women politicians in which of the following roles? a. Supportive b. Demanding c. Without personality d. Nurturing 50. How has the media historically dealt with domestic security issues? a. Highlighted the issues b. Covered up the issues c. Actively reported the issues d. Ignored the issues 51. Which of the following is an example of a television network’s drama pattern? a. “Stay tuned” b. “Stay grounded” c. “Stay focused” d. “Stay local” 52. According to Karim Karim, which of the following does NOT happen in a news frame narrative? a. Pamphlets are distributed for awareness. b. Characters are introduced. c. Heroes and villains are defined. d. Producer’s interpretation of the story is presented.

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 04_10e 53. According to studies, which of the following has a strong liberal bias? a. Persian news media b. American news media c. Iranian news media d. Arabic news media 54. Which terrorist group created the underground video network known as As Sahaab? a. Al Qaeda b. Hezbollah c. LTTE d. Taliban 55. Which of the following communication frames is usually short and designed to provide the latest facts? a. Dominant frame b. Reporting frame c. Collective interest frame d. Conflict frame 56. According to Cottle, which communication frame of television news reinforces common values? a. Contention b. Dominant c. Collective interest d. Cultural recognition 57. Freedom of Information (FOI) Act is a law ensuring access to ________. a. personal information of an individual b. private records of any private organization c. public records of any government agency d. defense records of the country 58. A news network broadcasts a bulletin regarding the latest breaking news about an event. This bulletin is an example of which television drama pattern? a. Expertise b. Information c. Control d. Participation 59. What is the name given to female holy warriors? a. Mujahideen b. Mujahidat c. Salafi d. Jihadi

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 04_10e 60. Which of the following was an uprising sparked by Ariel Sharon’s visit to the Temple Mount with a group of armed escorts in September 2000? a. al Manar b. As Sahaab c. al Aqsa Intifada d. Syrian Civil War 61. Which of the following is NOT an argument favoring censorship? a. National security b. The public wants information withheld c. The truth makes the government look bad d. Limited censorship under patriotism 62. The reporters are expected to reflect which of the following in their news frames? a. Fair reporting b. Balanced reporting c. Their outlet’s orientation d. A sense of drama 63. According to Frank Durham, when does a news frame work? a. When a report is based on imagination of individuals involved. b. When a report is based on definitive explanations of an event. c. When a report is based on ambiguity of the event. d. When a report is based on interviews of specific individuals. 64. Which of the following does the infotainment telesector NOT do? a. Telecast serious reports b. Discusses issues systematically c. Present stories under the guise of presenting objective information d. Entertain audiences 65. What type of media network is Al Jazeera? a. A national television network. b. An international television network c. A local television network d. A regional television network 66. Whether in the new or old media, superficial narratives and constant flows of differing stories do not lend themselves to______________. a. the truth b. positive imagery c. political freedom d. critical thinking Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 04_10e 67. The IDF interpretation of the events that occurred in West Bank village compared to al Manar’s presentation is considered which type of communication frame? a. Mythic tales b. Reporting c. Conflict d. Reportage 68. Critics believe National Public Radio (NPR) reporting a. has a conservative bias b. has a liberal bias c. fails to address terrorism d. is objective about terrorism

.

69. Which of the following is NOT a part of new media? a. Communication b. Blogs c. Multiple Internet postings d. Letters 70. What is the infotainment telesector designed to create? a. Revenue b. Awareness c. Content d. Movies 71. A television network provides coverage of the political primaries, followed by a 30-second clip of the network’s anchor providing their personal thoughts on who the front runner is and why. The 30-second clip is an example of which type of news frame? a. Dominant b. Investigative c. Campaigning d. Collective interest 72. The public’s understanding of the media and the way stories are presented is called ___________. a. infotainment telesector b. media bias c. social construction d. critical media consciousness

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 04_10e 73. Alex Schmid and Jany deGraaf report that the relationship between terrorism and the media is so powerful that Western democracies may need to ___________. a. take drastic actions b. take off censorship c. take a stand d. take off media scrutiny 74. A news network provides a bulletin notice providing the public with information about local hospitals offering free vaccines. The bulletin would be an example of which type of news frame? a. Dominant b. Investigative c. Community service d. Collective interest 75. According to David Levin, what is the purpose of television news coverage? a. Keep the audience primed with emotion and excitement b. Keep the sponsors happy c. Keep the reporters engaged d. Keep the producer primed with satisfaction 76. In social science, studies that involve examinations of the same subject over long periods of time are known as _____. a. longitudinal studies b. latitudinal studies c. content analysis d. horizontal studies 77. A television news network airs a 10-minute segment demonstrating a U.S. customs official taking bribes from a Mexican cartel. This segment is an example of which type of news frame? a. Dominant b. Investigative c. Conflict d. Community service 78. According to Barber, what is the largest overriding factor through which the media flourishes? a. Entertainment b. Debate c. Money d. Information

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 04_10e 79. According to Nacos, which of the following groups is able to use their television-generated images to avoid detection? a. Men b. Young adults c. Women d. Older adults 80. A local radio station airs a 10-minute segment where a think tank member gives their analysis of al Qaeda’s future plans. This segment is an example of which type of news frame? a. Dominant b. Investigative c. Conflict d. Community service 81. What kind of image has the Hezbollah learned to project on Lebanese national television? a. Neutral b. Positive c. Negative d. Mysterious 82. When did terrorism evolve into an ideological phase and become a drama made for television? a. 1920s and 1930s b. 1940s and 1950s c. 1960s and 1970s d. 1980s and 1990s 83. Which of the following is NOT a communication frame? a. Reporting frame b. Dominant frame c. Expanding frame d. Investigative frame 84. According to Simon Cottle, how does relying on certain sources help? a. It gives individuals an opportunity to define the nature of an act. b. It helps cover the act in a biased way. c. It helps emphasize some views. d. It gives everyone an opportunity to contribute.

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 04_10e 85. The growth of non-Western media influenced interpretations of terrorism through various methods. Which of the following is NOT one of those methods? a. New networks challenged the West’s dominance of news. b. New national perspectives influenced particular interpretation. c. Other nationalities added to the viewership. d. Localized networks presented other perspectives of terrorism. 86. Tim Groseclose and Jeffrey Milyo selected various kinds of media outlets to study bias showed by West media. Which of the following is Not one of these outlets? a. Books b. Newspapers c. Magazines d. Television shows 87. Which of the following facts is not true about Steganography? a. It can be sent via a covert channel. b. It cannot be placed in plain text in hidden file. c. It is the greatest weakness in terrorist communication. d. It is not a new idea. 88. Which of the following forms the basis for communicating symbols? a. Drama frames b. News frames c. Movie frames d. Social frames 89. Debates over which of the following concepts arise because many people assume that acts of terrorism are induced due to media outlets providing terrorists with information? a. Censorship b. Security c. Bias d. Communication 90. Censorship already occurs regularly. Which of the following is NOT an example of censorship? a. When terrorist organizations open websites, and intelligence agencies block them. b. When terrorists release propaganda videos, and the offending items are removed. c. Intelligence agencies distribute copies of terrorist propaganda for exclusive use of security forces. d. Intelligence agencies monitor the activities of various terrorist groups covertly.

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 04_10e 91. According to Fouzi Slisli, what do adjectives introduce into the news? a. Bias b. Myths c. Understanding d. Truth 92. The infotainment telesector negatively affects homeland security because _____________. a. documents are encrypted b. confidential plans are digitized c. vulnerabilities are hidden d. terrorism becomes more horrific 93. Nacos, Bloch-Elkon, and Shapiro suggest some pointers about domestic terrorism. Which of the following is NOT a part of those pointers? a. Focus is improperly centered on overseas actions. b. Domestic terrorism is just as crucial as overseas terrorism. c. Media has historically ignored domestic security issues. d. Domestic terrorism is less crucial than overseas terrorism. 94. Which of the following core issues does the arguments about censorship deal with? a. Privacy b. Freedom c. Security d. Democracy 95. Mainstream media claims that their reports on terrorism are highly _____________. a. subjective b. opinionated c. objective d. counterproductive

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 04_10e Answer Key 1. True 2. True 3. True 4. False 5. True 6. True 7. False 8. False 9. True 10. False 11. False 12. True 13. True 14. True 15. True 16. a 17. d 18. c 19. c 20. d 21. c 22. c 23. b 24. c 25. a 26. a

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 04_10e 27. a 28. a 29. b 30. b 31. c 32. b 33. b 34. a 35. a 36. a 37. d 38. c 39. b 40. a 41. b 42. c 43. d 44. b 45. a 46. c 47. d 48. c 49. b 50. d 51. a 52. a 53. b 54. a Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 04_10e 55. b 56. c 57. c 58. b 59. b 60. c 61. c 62. c 63. b 64. a 65. a 66. d 67. c 68. b 69. d 70. a 71. c 72. d 73. a 74. c 75. a 76. a 77. b 78. a 79. c 80. a 81. b 82. c Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 04_10e 83. c 84. d 85. c 86. a 87. b 88. b 89. a 90. d 91. a 92. d 93. d 94. d 95. c

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 05_10e Indicate whether the statement is true or false. 1. In Central Asia, women have even developed their own paths to terrorism, and they sustain them without assistance from groups dominated by men. a. True b. False 2. Terrorism is not influenced by technology. a. True b. False 3. Although terrorist tactics change through time, the most common weapon of terrorism has been and remains the bomb. a. True b. False 4. Radioactive poisoning is highly contagious. a. True b. False 5. Nuclear waste is a ready-made dirty bomb. a. True b. False 6. The media can be used as a force multiplier. a. True b. False 7. Women often receive combat or leadership positions in international terrorist organizations. a. True b. False 8. While the term terrorism is difficult to define, the process of terrorism is not. a. True b. False 9. Cyberterrorism is an attractive, low-risk strategy. a. True b. False 10. Researchers have found no relationship between terrorism and tourism. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 05_10e 11. Only the government and military have access to highly enriched uranium (HEU). a. True b. False 12. Some researchers have determined that the frequency of violence is more important than the severity of terrorist attacks. a. True b. False 13. The most common tactic of cyberterrorism to date has been the defacement of websites. a. True b. False 14. Media coverage can make a minor group appear to be politically important. a. True b. False 15. Women have been used as suicide bombers by different terrorist organizations, and the number of women suicide bombers has increased. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Chemical weapons have four limitations. Which of the following is NOT one of the limitations? a. There should be a delivery mechanism. b. Heat of most explosives incinerates the chemical agents. c. Even small amount of chemical presents a threat. d. Weather patterns, air, and water can neutralize a chemical threat. 17. Which of the following can increase the attacking power of terrorists? a. Force multipliers b. Tactics c. Large memberships d. Secrecy 18. Force multipliers enhance destructive power, whereas innovation is used to achieve _____________. a. political agendas b. awards and grants c. shock and surprise d. accolades

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 05_10e 19. Congress mandates that all radioactive waste from America’s nuclear power plants be transported to a repository in which state? a. Nevada b. Arizona c. Alaska d. Colorado 20. Anthrax is caused by ________. a. vermin b. virus c. bacteria d. chemical 21. Which of the following features is NOT an advantage of computer technology for terrorists? a. Allows covert discussions b. Increased number of attacks on physical targets c. Cheaper than other methods available d. Allows the terrorists groups to remain connected 22. The most fearful scenario related to WMD involves _____________. a. a biological attack b. serial bombings c. a chemical attack d. a nuclear explosion 23. How many biological attacks has the United States experienced since 1980? a. Zero b. One c. Two d. Ten 24. Terrorists break through Homeland Security’s firewalls, and hijack and destroy several drones. This scenario is an example of which force multiplier? a. Transnational support b. Technology c. Media coverage d. Religion

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 05_10e 25. Out of the following, who was a member of the Popular Front for the Liberation of Palestine and was involved in hijacking four aircrafts in 1969? a. Laura Sjoberg b. Leila Khalid c. Cindy Ness d. Ulricke Meinhof 26. A terrorist leader sends coded messages to members of the organization during a televised interview with a local journalist. This scenario is an example of which force multiplier? a. Transnational support b. Technology c. Media coverage d. Religion 27. Which of the following groups, according to criminologists, is often ignored in the study of crime, unless the study focuses on victimization? a. Children b. Women c. Men d. Older adults 28. Which of the following roles are played by women in international terrorist groups? a. Spies b. Financers c. Soldiers d. Leaders 29. Ulricke Meinhof and Andreas Baader were the co-creators of the _____. a. Chechen Black Widows b. German Red Army Faction c. Kurdistan Workers’ Party d. Popular Front for the Liberation of Palestine 30. According to Daly, which of the following do the Taliban believe is the most effective way to destroy the Pakistan government? a. Attack political targets. b. Attack women and children. c. Attack economic targets. d. Attack allies of the Pakistani government.

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 05_10e 31. On October 12, 2002, a firebomb went off inside a bar in Bali, Indonesia. Which of the following statements is NOT true about the incident? a. Indonesians were quietly advised to leave. b. More than 1000 people were killed. c. The perpetrators called themselves Jamaat Islamiyya. d. The terrorists resented the presence of outsiders in Muslim lands. 32. Which of the following best reflects Laura Sjoberg’s views of women terrorists? a. Studies on women in terrorism should discuss women in gendered terms—not “terrorists,” but “women involved in terrorism.” b. There is a definite feminist perspective on terrorism. c. Researchers are reluctant to study violence among women because this violates idealized notions of womanhood. d. Women are not terrorists in the same way that men are terrorists and have not been involved in terrorism for long. 33. In 2004, New Scientist reported that Middle Eastern terrorist groups were working on a two-stage military-style weapon called a(n) . a. IED b. mininuke c. drone d. dirty bomb 34. As the world moves closer to a global economy, striking what kind of targets have terrorists found most effective? a. Economic targets b. National targets c. Symbolic targets d. Security targets 35. According to J. Bowyer Bell, terrorism that exists inside a political entity is called ____________. a. endemic terrorism b. ethnic terrorism c. epidemic terrorism d. evident terrorism 36. Terrorists activate a dirty bomb, which explodes within a military outpost. This scenario is an example of which force multiplier? a. Transnational support b. Technology c. Media coverage d. Religion

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 05_10e 37. In a dirty-bomb, which of the following agents is usually used with a conventional explosive? a. Bacterial b. Viral c. Chemical d. Radiological 38. Which of the following is one of Brian Jenkins’s original six tactics of terrorism? a. Computer hacking b. Hijacking c. Phishing d. Embezzlement 39. Which biological agent infected citizens through the mail in the wake of the attacks on September 11, 2001? a. Anthrax b. Smallpox c. Plague d. Botulism 40. Cindy Ness analyzed terrorist activity by examining the behavior of women in ____________. a. violent and nonviolent terrorist groups b. domestic and international terrorist groups c. ethnic and nationalist terrorist groups d. secular and religious terrorist groups 41. In 2005, Diego Gambetta tracked and studied suicide tactics and attacks during which of the following wars? a. World War I b. World War II c. French Revolution d. American Revolution 42. W hich of the following statements would Max Boot disagree with? a. Guerrilla warfare and terrorism dominate the history of warfare. b. Conventional war is the normative method of fighting. c. Terrorists fight in the shadows. d. Security forces must be prepared to operate in that environment. 43. A terrorist group remotely activates a bomb in a local supermarket. This scenario is an example of which force multiplier? a. Transnational support b. Technology c. Media coverage d. Religion

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 05_10e 44. After the September 11 attacks, the federal government immediately budgeted $4.8 billion to protect which industry? a. Shipping b. Aviation c. Computer d. Banking 45. Which of the following is considered a biological agent? a. Radiation b. Plagues c. Nerve gas d. Plutonium 46. Which of the following is the only group that has made an effort to obtain a nuclear device? a. LTTE Black Tigers b. Hezbollah c. Al Qaeda d. Kurdistan Workers Party 47. Which of the following is the Ebola virus considered to be? a. Bacterial infection b. Food borne illness c. Radiological weapon d. Hemorrhagic fever 48. Which of the following tactics is most often employed by terrorists? a. Bombing b. Kidnapping c. Hijacking d. Arson 49. Which of the following systems presents a tempting economic target because they produce mass casualties with minimal effort? a. Transportation b. Energy c. Tourism d. School

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 05_10e 50. Members of a terrorist group were able to avoid the security forces by the help and support received from a local church. This scenario is an example of which force multiplier? a. Transnational support b. Technology c. Media coverage d. Religion 51. Pape’s theory of suicide terrorism suggests that three factors must be in place before a suicide terror campaign can take place. Which of the following is NOT one of these factors? a. A nationalistic or ethnic group must be resisting the occupation of a foreign power. b. The foreign power must have a democratic government. c. The foreign power must coerce the occupants into converting to their religion. d. The foreign power and the people under occupation must have different religions. 52. The strike involving the first known female suicide bomber (employed against an Israeli Army convoy) occurred in which decade? a. 1970s b. 1980s c. 1990s d. 1960s 53. Hemorrhagic fever is classified under which category? a. Toxin b. Virus c. Bacteria d. Plague 54. Due to electronic media scrambling to break the latest news, one incident has the possibility to be converted into a _____________. a. campaign b. scandal c. controversy d. scam 55. Which of the following effects are caused by nerve agents? a. Convulsions, flood of body fluids b. Failure of body functions c. Burns, choking, respiratory failure d. Long-term skin disease

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 05_10e 56. Which of the following is NOT a major type of suicide attack? a. Suicide in warfare b. Suicide for a principle without killing others c. Suicide by cop d. Suicide terrorism 57. According to the National Conference of State Legislature, in cyberterrorism, terrorists use information technology to promote ____________. a. fear b. a political agenda c. a religious agenda d. terrorism 58. A person who commits altruistic suicide would commit suicide _____. a. under coercion or compulsion b. for economic motivations c. on behalf of family, tribe, or country d. due to a self-destructive urge 59. Smallpox is classified under which category? a. Toxin b. Virus c. Bacteria d. Plague 60. Which of the following terrorist groups has conducted more suicide bombings than any other group? a. Buddhist Sinhalese b. Sunni Kurds c. LTTE Black Tigers d. Hezbollah 61. From 2014 to 2018, female members of which group were responsible for more than 1200 deaths? a. Boko Haram b. Al Shabaab c. Al Qaeda d. Chechen Black Widows 62. According to Gonzalez-Perez’s studies, most Central and South American groups emphasized the role of women even when __________________. a. they had no stated feminist agenda b. they had a right-wing revolutionary focus c. they had enough female members d. they had male members protesting such action Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 05_10e 63. Which of the following types of traveler is most frequently affected by terrorism? a. Business b. International c. Domestic d. Local 64. Which of the following is NOT considered a force multiplier? a. Technology b. Media c. Military d. Religious fanaticism 65. Why is the United States vulnerable to multiple forms of cyberattacks? a. Large number of computer systems to monitor b. Inconsistent cyber security policy c. Continuous technological growth d. Increasing need of information flow 66. What is gender most often related to in terrorist tactics? a. Social standing of the terrorist organization b. Ideology of the terrorist organization c. Economics of the terrorist organization d. Media influence upon the terrorist organization 67. Which type of explosive is designed to spread fuel in the air and then ignite it? a. Thermobaric bomb b. Double-sided bomb c. Traditional bomb d. Radio-signaled bomb 68. Which terrorist group in eastern Turkey conducted the least deadly attacks in the course of modern suicide bombing, killing an average of two people per incident? a. Black Tigers b. Kurdistan Workers’ Party c. Tamil Hindus d. Russian Orthodox Christians 69. According to Freilich et al., how are suicide terrorists different from nonsuicidal attackers? a. They are more likely to have substance abuse problems. b. They are more likely to be mentally ill. c. They are more likely to have attempted suicide in the past. d. They are more likely to be affiliated to a terrorist group.

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 05_10e 70. What did the nuclear bomb used at Hiroshima employ? a. Highly enriched uranium b. Plutonium c. Natural uranium d. Deuterium 71. According to Brian Jenkins, which of the following is NOT a tactic of terrorism? a. Bombing b. Larceny c. Arson d. Assault 72. Which religious group is targeted more than any other group in suicide attacks? a. Catholics b. Muslims c. Jews d. Atheists 73. Pape’s examination of suicide bombings cast doubt on which popularly believed cause of suicide terrorism in Lebanon? a. Foreign occupation b. Militant Islamic theology c. Social structure d. Economic deprivation 74. In January 2015, which department of the U.S. military was claimed to be hacked by the group Cyber Caliphate? a. Department of Defense b. Central Command (Centcom) c. U.S. Cyber Command d. Department of Homeland Security 75. Which of the following terms is used by Gonzalez-Perez to refer to terrorist groups operating in multiple countries? a. Altruistic terrorism b. Endemic terrorism c. Domestic issues d. International focus 76. To which classification of force multiplier does a thermobaric bomb belong? a. Transnational support b. Technology c. Media coverage d. Religion Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 05_10e 77. According to the Centers for Disease Control and Prevention (CDC), which of the following diseases is NOT classified as the most threatening agent? a. Smallpox b. Plague c. Botulism d. Jaundice 78. Which of the following describes the belief that social order can only be changed through violent upheaval? a. Endemic terrorism b. Theory of suicide terrorism c. Force multipliers d. Philosophy of the bomb 79. Which of the following enters the body through ingestion, respiration, or contact? a. Blood agents b. Blistering agents c. Nerve agents d. Choking agents 80. Nerve agents, blood agents, choking agents, and blistering agents are all examples of____________. a. bacterial agents b. chemical agents c. viral agents d. radiological agents 81. Which of the following leads to endemic terrorism? a. A conflict between two tribes in a country. b. A conflict between two neighboring countries. c. A country’s attempt to annex another country. d. A country’s attack on another country. 82. According to Rohan Gunaratna, which three factors are common in suicide bombings? a. Secrecy, reconnaissance, and rehearsal b. Secrecy, religion, and political agendas c. Political agendas, chance of success, and secrecy d. Secrecy, rehearsal, and chance of success 83. Hemorrhagic fever is caused by __________. a. bacteria b. chemical c. virus d. natural toxin

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 05_10e 84. Oil facilities of which country were targeted by Al Qaeda in 2003? a. Iran b. Saudi Arabia c. Iraq d. Kuwait 85. In which targeted environment would you suspect a thermobaric bomb to be a terrorist’s most desirable weapon of choice? a. A small classroom b. An underground tunnel c. An open-air market d. Middle of the ocean 86. Which of the following is NOT a target of transnational attack? a. Tourism b. Energy c. Transportation d. Consumerism 87. According to Domenico Tosini, which of the following is a major factor in suicide terrorism? a. Rational choices of the terrorists b. Social structure of the surrounding society c. Religious beliefs of the terrorist groups d. Economic deprivation 88. Which of the following reflects Cindy Ness’s beliefs about women in terrorist organizations? a. Women have always played leadership roles in religious terrorist organizations. b. Religious, ethnic, and nationalistic terrorist groups welcome women equally. c. Women have developed combat and leadership roles in religious terrorist organizations. d. More women were involved in left-wing terrorist movements than in traditional movements. 89. Which of the following is considered a noncontagious bacterial infection? a. Smallpox b. MRSA c. Impetigo d. Anthrax 90. Which of the following concepts is discussed by anarchists in 1848? a. Propaganda by the deed b. Media propaganda c. Public awareness campaigns d. The philosophy of the bomb

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 05_10e 91. What does HEU stand for? a. Heavily enriched uranium b. High evolution utilities c. Harsh environmental usage d. Highly enriched uranium 92. Which of the following is NOT one of Michael Levi’s five goals for policymakers? a. Create a single agency to be responsible for the defense system. b. Support international efforts to stop the proliferation of nuclear weapons. c. Address nuclear terrorism in conjunction with all other terrorist threats. d. Mandate nuclear threat analysis based on the most probable dangers. 93. The formal name of the terrorist group referred to as PKK is _______. a. Sunni Kurds b. Hezbollah c. Kurdistan Workers’ Party d. Sunni Turks 94. A terrorist group receives a large amount of cash from a charity organization from another country that enables them to purchase weapons. This scenario is an example of which force multiplier? a. Transnational support b. Technology c. Media coverage d. Religion 95. In 1991, which of the following groups was responsible for the assassination of Rajiv Gandhi, former Prime Minister of India? a. Al Qaeda b. Sinhalese Buddhist c. Sunni Turds d. LTTE Black Tigers

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 05_10e Answer Key 1. True 2. False 3. True 4. False 5. True 6. True 7. False 8. True 9. True 10. False 11. False 12. True 13. True 14. True 15. True 16. c 17. a 18. c 19. a 20. c 21. b 22. d 23. c 24. b 25. b 26. c

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 05_10e 27. b 28. a 29. b 30. c 31. b 32. c 33. b 34. a 35. a 36. b 37. d 38. b 39. a 40. d 41. b 42. b 43. b 44. b 45. b 46. c 47. d 48. a 49. a 50. a 51. c 52. b 53. b 54. a Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 05_10e 55. a 56. c 57. b 58. c 59. b 60. c 61. a 62. a 63. b 64. c 65. b 66. b 67. a 68. b 69. a 70. a 71. b 72. b 73. b 74. b 75. d 76. b 77. d 78. d 79. c 80. b 81. a 82. a Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 05_10e 83. d 84. b 85. c 86. d 87. b 88. c 89. d 90. d 91. d 92. a 93. c 94. a 95. d

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 06_10e Indicate whether the statement is true or false. 1. There is no difference between separatist violence, ideological terrorism, and religious terrorism. a. True b. False 2. The War of the Spanish Succession pitted pro-communist Republicans against pro-fascist Nationalists. a. True b. False 3. The struggles of separatist movements have shaped modern terrorism. a. True b. False 4. Modern Spain emerged from the unification of several Hispanic kingdoms in the late 1700s. a. True b. False 5. ETA terrorism was at its peak in the 1960s. a. True b. False 6. The Euskadi Ta Askatasuna (ETA), an organization that waged a campaign of terrorism against Spain for nearly a half century, released a declaration in October 2011 declaring that it was ending its campaign of violence. a. True b. False 7. The ETA was dissolved permanently in 2018. a. True b. False 8. Under Francisco Franco, Basque culture and language were banned. a. True b. False 9. There are more Basques living outside Spain than within the country. a. True b. False 10. The current struggles in Ireland largely started in 1969 when riots broke out in Londonderry and Belfast after the annual Apprentice Boys parade. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 06_10e 11. Some data even suggest that separatist terrorism is the most violent form of terrorism in the modern world). a. True b. False 12. If calculated by the sheer number of attacks, separatists present more of a threat to Europe than any other form of terrorism. a. True b. False 13. The Sri Lankan conflict involved dissension between Hindus and Muslims. a. True b. False 14. The Euskadi Ta Askatasuna (ETA) is Europe’s longest surviving ethnic conflict. a. True b. False 15. Ethnic terrorists are usually more nationalistic than their religious counterparts. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. In which year was the Anglo-Irish Peace Accord signed? a. 1985 b. 1965 c. 2015 d. 2001 17. Why did the Unionists reject the Anglo-Irish Peace Accord? a. It compromised with moderate Republicans. b. It united northern and southern Ireland. c. The United Kingdom had not agreed to share power with the Republic of Ireland. d. There were no direct negotiations between the United Kingdom and Ireland. 18. The failure of which movement in Northern Ireland can be directly linked to modern Irish terrorism and the rebirth of the IRA? a. Catholic civil rights campaign b. The women’s movement c. The Protestant Reformation d. British rule

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 06_10e 19. What was the conclusion of the Leslie Scarman report on the violence in Northern Ireland? a. The policies of the police and the British Army had triggered the formation of the hostile forces. b. Greater police presence and more security forces were needed to resolve the violence. c. Legal methods to resolve the violence had failed and thus political methods were required. d. The people in Northern Ireland had faith in all governmental institutions to solve the problem. 20. What is the main aim of ethnic terrorists? a. To forge a national identity b. To mobilize a religious group c. To appeal to the nationalistic background of all people in a country d. To make a statement about their agenda 21. According to Daniel Byman, the central focus of the Irish, Basque, and Sri Lankan conflicts is ____________. a. ethnicity b. economy c. religion d. finance 22. In 1972, British paratroopers opened fire on Catholic protesters in Londonderry—a day that has come to be known as ____________________. a. Black September b. Bloody Sunday c. Red October d. Orange and Green Day 23. In 1992, after the signing of the cease-fire, which of the following actions was taken by Sinn Fein? a. They demanded future positions in the ruling party for their members. b. They produced a paper calling for peace in Northern Ireland. c. They claimed that Unionists could not be included in any future agreement. d. They claimed that Republicans could not be included in any future agreement. 24. How many people did the ETA’s members kill during its most violent year, 1980? a. 22 b. 92 c. 126 d. 56 25. What are the major ethnic groups in Sri Lanka? a. Hindus and Muslims b. Sinhalese and Tamils c. Sinhalese and Buddhists d. Muslims and Tamils

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 06_10e 26. What was a provision of the Belfast Agreement? a. Criminal charges against IRA leaders b. Instituting independent elections for Ireland c. The commissioning of paramilitary organizations d. The establishment of shared government in Northern Ireland 27. The original motivation of the struggle in the Basque region was the desire for _____. a. political equality b. religious freedom c. cultural identity d. class revolution 28. What kind of solution led to the apparent end to the three violent separatist movements? a. Military b. Educational c. Economic d. Political 29. On March 11, 2004, a city was attacked by jihadist terrorists. The blame of the bombings was placed on ETA, which it denied. Which of the following was this city? a. Barcelona b. Madrid c. Valencia d. Zaragoza 30. For how many years did most ETA members engage in terrorism? a. 4 b. 3 c. 1 d. 6 31. According to J. Bowyer Bell, what happened when the British army arrived in Ulster? a. The Officials and Provisionals in the IRA split and the Officials supported the British army. b. Both Unionists and Republicans began to fight the British army. c. The British Army did not continue the restrictive measures of the RUC and B-specials. d. Republicans and Catholics were subjected to the oppression of British Army measures. 32. The LTTE (or Tamil Tigers) fought for an independent homeland for how many Tamils in northern and eastern Sri Lanka? a. Around 5 million b. Less than 1 million c. Nearly 3 million d. More than 7 million Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 06_10e 33. What kind of movement was the ETA primarily? a. Ethnic b. Lower-class c. Political d. Working-class 34. What was the common goal of the Anti-Terrorist Liberation Groups (GAL)? a. Search and kill the ETA in France b. Spread terror in France c. Control over the government of France d. Convert the ETA in France to their philosophy 35. Which organization is viewed as having set the stage for modern separatist terrorism? a. ETA b. IRA c. LTTE d. PKK 36. Which of the following presidents of Sri Lanka was killed by an LTTE suicide bomber? a. Patrick Pearse b. Rajiv Gandhi c. Velupillai Pirapaharan d. Ranasinghe Premadasa 37. In the late 1990s, which top industry of Spain was targeted by ETA terrorists? a. Manufacturing b. Fashion c. Retail d. Tourism 38. Why did a group of working-class students form the ETA in 1959? a. To protest against university rules b. To express nationalism in the Basque homeland c. To express dissatisfaction at student reservation laws d. To publicize wage inequality 39. The 1916 Easter Rising is associated with terrorism in which country? a. Ireland b. Spain c. Sri Lanka d. Israel

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 06_10e 40. The ETA’s first “attacks” against Spain involved ____________________. a. Graffiti b. large nonviolent demonstrations c. cyberterrorism d. simple assaults 41. In which region does the Independent Monitoring Commission (IMC) investigate claims of both terrorist and governmental abuses? a. Spain b. Sri Lanka c. Northern Ireland d. France 42. The LTTE were pioneers in the secular use of which kind of bombings? a. Improvised explosive device (IED) b. Chemical c. Thermobaric d. Suicide 43. The Basque region has been a source for separatist terrorism since _____. a. the 1960s b. the 1800s c. 1716 d. 1936 44. Who of the following was a fascist dictator of Spain, following the Spanish Civil War (1936–1939)? a. Fulgencio Batista b. Antonio Salazar c. Francisco Franco d. Rajiv Gandhi 45. Which of the following was created in 2004 to investigate paramilitary actions and alleged governmental abuses during the Irish Peace process? a. IRA b. ETA c. GAL d. IMC

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 06_10e 46. The IRA fought from 1939 to 1944 and again from 1956 to 1962 in an attempt to bring which province under Irish control? a. Kilkenny b. Galway c. Limerick d. Ulster 47. What kind of identity do ethnic terrorists try to forge? a. National b. Religious c. International d. Social 48. Which of the following was created in 2001 to replace the Royal Ulster Constabulary? a. the Provisionals b. Ulster Volunteer Force (UVF) c. Police Service of Northern Ireland (PSNI) d. Independent Monitoring Commission (IMC) 49. According to a recent study by the RAND Corporation, what is the most effective method for ending a terrorist campaign? a. Political accommodation b. Counterattack c. Convincing through debate d. Creating a long-term military strategy 50. Which of the following statements is true about Francisco Franco? a. He was the leader of the Regional forces during the Spanish Civil War. b. He completely incorporated the Basque region into Spain. c. He was the democratic ruler of Spain. d. He campaigned for Basque national identity. 51. During the 1970s, what style campaign of assassination, robbery, and banditry did the ETA develop? a. Guevara b. Communist c. Marighella d. Anarchist 52. Which of these statements is incorrect? a. Modern Spain developed from separate ethnic groups. b. The Basque region of Spain adapted to the language and culture of invaders. c. At times, the Basque region had been an independent kingdom. d. Basque separatists wanted a homeland completely independent of Spain. Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 06_10e 53. When did the British grant Ceylon (Sri Lanka) independence? a. 1949 b. 1955 c. 1948 d. 1946 54. The Birds of Freedom was the women’s wing of the _____. a. LTTE b. IRA c. ETA d. UVF 55. The December 1990 cease-fire agreement in Ireland resulted primarily from negotiations between the British intelligence and which other group? a. The Provisionals b. B-specials c. Sinn Féin d. IRB 56. From 1922 to 1969, the government systematically reduced the civil rights of Catholics living in which part of Ireland? a. Northern b. Southern c. Eastern d. Western 57. Which of the following would be most appropriately classed as ethnic terrorist group? a. al Qaeda b. Euskadi Ta Askatasuna (ETA) c. Hezbollah d. Taliban 58. What does “Eelam” mean in the name the Liberation Tigers of Tamil Eelam? a. Independence b. Patriots c. Homeland d. Fighters 59. What do ethnic and separatist movements attempt to gain? a. Public sympathy b. Power c. Independence d. Financial support Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 06_10e 60. In which year was the LTTE defeated? a. 2009 b. 1991 c. 2001 d. 1945 61. The split in the IRA ranks, one side seeking peaceful political idealism and the other fighting for independence, began to occur in which decade? a. 1970s b. 1910s c. 1930s d. 1950s 62. The Spanish Civil War brought Francisco Franco to power. Which of the following issues was he most concerned with? a. Eradication of Basque culture b. Basque ethnic identity c. Regaining Basque culture d. Spreading awareness about Basque language 63. What change in Sri Lanka in 1955 sparked the beginnings of Tamil dissatisfaction? a. Militant Tamils from India sailed to Sri Lanka to engage in the conflict. b. Many ethnic Tamils began converting to Buddhism. c. A Sinhalese-only policy was instituted in the government. d. A Tamil assassin killed the Sinhalese leader. 64. On August 15, 1969, fighting in Ireland was focused in which two cities? a. Belfast and Londonderry b. Belfast and Limerick c. Londonderry and Dublin d. Belfast and Dublin 65. What were the Black Tigers known to wear around their necks when they attacked? a. Daggers b. Religious charms c. Cyanide capsules d. Small grenades 66. The death squads formed by the disgruntled Spanish police officers and government officials evolved into a. Euskadi Ta Askatasuna (ETA) b. Anti-Terrorist Liberation Groups (GAL) c. the Liberation Tigers of Tamil Eelam (LTTE) d. Irish Republican Army (IRA) Copyright Cengage Learning. Powered by Cognero.

.

Page 9


Name:

Class:

Date:

Chap 06_10e 67. In which decade did the Spanish Civil War occur? a. 1930s b. 1850s c. 1950s d. 1970s 68. The Provisionals were associated with which of the following? a. IRA b. LTTE c. PKK d. ETA 69. Why did the Extremist Republicans reject the Anglo-Irish Peace Accord? a. Because the violence continued b. Because it did not unite Northern and Southern Ireland c. Because it was a short-term solution d. Because they felt betrayed 70. What is the political party of the IRA known as? a. The Provisionals b. Sinn Féin c. The Apprentice Boys d. The Unionists 71. What was the impact of the Sinhalese military policies on the role of Tamil women? a. Women learnt to protect themselves in the given political climate. b. Women were helped by the Sinhalese security forces. c. Women in the North faced a lack of security. d. Women were protected by the government from being sexually assaulted. 72. Which of the following was a militant Unionist organization that waged a terrorist campaign against Catholic and Republican organizations? a. Ulster Volunteer Force (UVF) b. Royal Ulster Constabulary (RUC) c. The Provisionals d. The Apprentice Boys 73. Which British Prime Minister is credited with the 1998 signing of the Belfast Agreement, following his negotiations with Sinn Fein? a. John Major b. Tony Blair c. Margaret Thatcher d. David Cameron Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 06_10e 74. The ETA, in its return to terrorism in 1999, targeted which of Spain’s major industries? a. Tourism b. Energy c. Shipping d. Telecommunications 75. In which city was the 1950s Basque shadow government formed in response to the Spanish government’s repression of Basque culture? a. Lisbon b. London c. Paris d. Marseilles 76. Which of the following is true of Spain’s constitution of 1978? a. It gave the Basque region autonomy. b. It gave the Basque region total control over its health care system. c. It opened avenues for self-policing in the Basque region. d. It restored the Basque language. 77. What was the percentage of Tamils in Sri Lanka before 1955? a. 17 percent b. 50 percent c. 33 percent d. 5 percent 78. Who was the founder of the LTTE? a. Patrick Pearse b. Rajiv Gandhi c. Velupillai Pirapaharan d. Ranasinghe Premadasa 79. Which of the following statements is NOT true about LTTE? a. The LTTE created a special suicide squad called the Black Tigers. b. The LTTE assassinated Sri Lankan president. c. The LTTE murdered moderate Tamils who opposed their cause. d. Sri Lanka had a history of secular suicide bombings which the LTTE took up. 80. What, according to experts, was the real reason for the LTTE agreeing to the cease-fire in 2001? a. They were suffering from a lack of resources. b. They had lost most of their men. c. They realized that peaceful talks were the only way. d. They didn’t want any more bloodshed.

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 06_10e 81. Which Prime Minister of India was assassinated by an LTTE suicide bomber? a. Rajiv Gandhi b. Manoj Joshi c. Velupillai Pirapaharan d. Ranasinghe Premadasa 82. Who are the dominant ethnic group in Sri Lanka? a. Tamils b. Hindus c. Indians d. Sinhalese 83. According to most analysts and observers, the early policies and tactics of which organization played an important role in the rebirth of the IRA? a. Irish Army b. British police c. British army d. Irish police 84. After the year 2000, jihadist networks from Algeria began to operate in _____. a. the Netherlands b. the United Kingdom c. Germany d. France 85. The reserve force of the Royal Ulster Constabulary (RUC) was known as ___________________. a. Sinn Féin b. The B-specials c. The Provisionals d. The Irish Brotherhood 86. In which year was the Liberation Tigers of Tamil Eelam (LTTE) formed? a. 1972 b. 1984 c. 1976 d. 1985 87. In 1969, Belfast and Londonderry were in flames. Three days later, who did Britain send in as a peacekeeping force? a. The Royal Army b. The Scottish Army c. The British Army d. The Army of the United Kingdom Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 06_10e 88. The Basque region incorporates land regions in which other country apart from Spain? a. Portugal b. Monaco c. France d. Algeria 89. Which of the following would NOT be most appropriately classed as ethnic terrorists? a. Al Qaeda b. Euskadi Ta Askatasuna (ETA) c. The Liberation Tigers of Tamil Eelam (LTTE) d. The Irish Republican Army (IRA) 90. The nationalistic and ethnic separatist groups begin to study and copy the tactics of which group in the early part of the twentieth century? a. al Qaeda b. Weather Underground c. IRA d. The People’s Will 91. Sri Lankan security forces created “no-fire zones” and moved into Tamil areas when the LTTE became weak. Which of the following is true of this strategy? a. Only Sinhalese were allowed in the no-fire zones. b. Every person who remained in the Tamil areas was considered to be an enemy. c. The LTTE used guerrilla and terrorist tactics to fight the military. d. The Sri Lankan military had to fight on the LTTE’s terms. 92. Which of the following would NOT be classed as ethnic terrorists? a. Al Qaeda b. Euskadi Ta Askatasuna (ETA) c. The Liberation Tigers of Tamil Eelam (LTTE) d. The Irish Republican Army (IRA) 93. According to the International Crisis Group (2013), what did the government do after the LTTE surrendered? a. Encouraged the ‘Tamilisation’ of the north b. Kept the Tamil population in internment camps c. Repatriated the displaced Tamil population d. Rebuilt the areas destroyed by war 94. Which of the following is NOT one of the three forms of Unionist terror in Ireland? a. State repression b. Vengeance c. Revolutionary violence d. Political posturing Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 06_10e 95. As Spanish authorities opened opportunities for democracy and national expression, what kind of movement did the ETA transform itself into? a. Social b. Religious c. Political d. Military

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 06_10e Answer Key 1. False 2. False 3. True 4. False 5. False 6. True 7. True 8. True 9. True 10. True 11. True 12. True 13. False 14. True 15. True 16. a 17. a 18. a 19. a 20. a 21. a 22. b 23. b 24. b 25. b 26. d

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 06_10e 27. c 28. d 29. b 30. b 31. d 32. c 33. d 34. a 35. b 36. d 37. d 38. b 39. a 40. a 41. c 42. d 43. a 44. c 45. d 46. d 47. a 48. c 49. a 50. b 51. c 52. b 53. c 54. a Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 06_10e 55. c 56. a 57. b 58. c 59. c 60. a 61. c 62. a 63. c 64. a 65. c 66. b 67. a 68. a 69. b 70. b 71. c 72. a 73. b 74. a 75. c 76. d 77. a 78. c 79. d 80. a 81. a 82. d Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 06_10e 83. c 84. d 85. b 86. c 87. c 88. c 89. a 90. d 91. b 92. a 93. b 94. d 95. a

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 07_10e Indicate whether the statement is true or false. 1. The Turkish Hezbollah of Eastern Turkey is connected to the Lebanese Shi’ite Hezbollah. a. True b. False 2. The Mau Mau movement succeeded in the field. a. True b. False 3. India has a variety of terrorist problems stemming from political, religious, and ethnic strife. a. True b. False 4. Turkey is currently facing a wave of religious terrorism, but for the past three decades, its major problem has come from the Kurds. a. True b. False 5. The United Kingdom established its Middle East military headquarters in Saudi Arabia at the end of World WarII. a. True b. False 6. France began colonizing Algeria in 1830. a. True b. False 7. PKK leaders increased their efforts to build a terrorist organization by moving into Lebanon’s Bekaa Valley in September of 1980. a. True b. False 8. Endemic terrorism is nothing like nationalistic terrorism. a. True b. False 9. The PKK represents the pejorative nature of terrorism. a. True b. False 10. Women played an important role in the National Liberation Front (FLN). a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 07_10e 11. The majority of Mau Mau violence occurred in urban areas. a. True b. False 12. According to Bruce Hoffman, the politics and strategy of anticolonial revolution in the twentieth century are the basis for modern terrorism. a. True b. False 13. Nationalistic terrorism can be the basis for long-term separatist terrorism. a. True b. False 14. Beijing claims that international jihadists are attempting to overthrow Chinese rule in Xinjiang province and establish an Islamic state. a. True b. False 15. The United Kingdom claimed Cyprus as a crown colony after World War II. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Where were the ethnic groups of Kurds originally from? a. Northern Turkey b. Southern Iraq c. Southern Iran d. Southern Turkey 17. In which country did the PKK train before launching a guerrilla campaign in Turkey? a. Iran b. Iraq c. Syria d. Pakistan 18. What is the name of the jihadist group that arose from the Islamic Courts Union? a. Mau Mau b. PKK c. Boko Haram d. Al Shabab

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 07_10e 19. What was a tactic used by the FLN that included indiscriminate attacks against French outposts? a. Guerrilla tactics b. Kidnapping c. Stealing d. Blind terrorism 20. Around 1950 in Kenya, disgruntled Kikuyus began to rebel. Which of the following modes of protest did they pursue? a. Burned the fields of European farmers b. Blockaded highways in the area c. Carried out bomb attacks d. Committed mass murders of European farmers 21. Who of the following ordered his followers to violently reject all things “un-Islamic”? a. bin Laden b. Shekau c. Galula d. Yusuf 22. Which of the following statements is true of Sikhism? a. It preaches pacificism and nonviolence. b. It combines elements of Hinduism and Christianity. c. It is an ethnic group rather than a religious group. d. It emphasizes an inner journey to seek spiritual enlightenment. 23. The French captain who fought in Algeria in 1956–1958 was __________. a. David Galula b. Charles Taylor c. Nicolas Sarkozy d. Dov Lynch 24. The EOKA was successful and negotiated a deal with the United Kingdom in which year? a. 1959 b. 1963 c. 1947 d. 1974 25. What did PKK terrorists combine nationalism with? a. Ideology b. Economics c. Religion d. Education

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 07_10e 26. What destroyed the Mau Mau movement at the end? a. Military b. Politics c. Repression d. Internal divide 27. Which of the following is a confederation of tribes and clans that sought to end violence and bring Islamic law to Somalia? a. FLN b. ICU c. PKK d. TFG 28. Who were the primary victims of Boko Haram? a. The local Nigerians b. The Christians c. The tribals d. The Sunni Muslims 29. Apart from Hinduism, which other religion’s elements are embodied by Sikhism? a. Islam b. Judaism c. Shintoism d. Paganism 30. What did Mohammed Yusuf of Boko Haram urge his followers to do? a. Reject un-Islamic teachings b. Reject traditional teachings c. Follow the intellectuals d. Accept Western philosophy 31. Who was the founder of al Qaeda in Turkey? a. Habib Akdas b. Habib Ansari c. Habib Altamash d. Habib Ali 32. Which incident caused the British government to declare a state of emergency in Kenya in 1953? a. The killing of a farmer and his family by the Mau Mau b. The retreat of Mau Mau forces deep into the forests c. The distribution of European lands to British farmers d. The resettlement of the Kikuyu

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 07_10e 33. Which group does Beijing claim is/are attempting to overthrow Chinese rule in Xinjiang (New Frontier) province and establish an Islamic state? a. The Lord’s Resistance Army b. International jihadists c. Shining Path d. FLN 34. To which of the following did Turkey lose 40,000 people since 1980? a. Famine b. Terrorism c. Emigration d. Floods 35. Which of the following was the reason for the Mau Mau uprising in Kenya? a. The handing over of lands to European farmers b. The entry of the British into Kenya c. Inter-tribal rivalries among the local tribes d. The killings of Kenyans by the government 36. Which group was not fighting an international jihad for a caliphate, but rather wanted independence? a. Muslims b. Salifs c. Sikhs d. Uighurs 37. Once the Uighurs had gained Muslim independence from China, what did they call their land? a. East Kazakhstan b. East Mongolia c. East Afghanistan d. East Turkestan 38. The favored weapon of the Mau Mau warriors was a heavy bladed machete used in agricultural work, called _______. a. cleaver b. panga c. sickle d. blade 39. Which terrorist organization was Marxist-Leninist in ideology and comprised of Turkish Kurds? a. Lord’s Resistance Army b. PKK c. Shining Path d. FLN Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 07_10e 40. The failure to separate the population from the insurgents is an example of the parallel between the French experience in Algeria and the initial American response to insurgency in another country. Which country was it? a. Iraq b. Afghanistan c. Kurdistan d. Iran 41. China fights for Xinjiang because it has the largest reserves of which two natural resources? a. Lumber and bauxite b. Coal and limestone c. Oil and gas d. Iron and copper 42. Identify a parallel between the French experience in Algeria and initial American response to the insurgency in Iraq. a. A focus on rural areas b. A failure to recognize warning signs of an impending insurgency c. Successfully separating the population from the insurgents d. A need to emphasize military tactics over law enforcement 43. While never implemented, which country did the Treaty of Sevres make independent? a. Kurdistan b. Pakistan c. Chechnya d. Cape Town 44. What is the Golden Temple’s official name? a. Temple of God b. Temple of Gold c. Sacred Shrine of Sikhism d. Shrine of Sikhs 45. What kind of rule did Kemal Ataturk institute after dissolving the Islamic government in 1923? a. Dictatorship b. Theocracy c. Monarchy d. Secular republic 46. Based on what did China’s Uighurs seek regional autonomy? a. Ethnicity b. Religion c. Language d. Territorial disputes Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 07_10e 47. In which year did Algeria receive independence from France? a. 1962 b. 1952 c. 1942 d. 1972 48. The development of which doctrine in the U.S. military was inspired by the work of David Galula? a. Total National Defense b. 1-4-2-1 c. Counterinsurgency d. Win-Hold-Win 49. Who backed the Transitional Federal Government (TFG)? a. The United Nations b. The Nigerians c. The Somalis d. The Ethiopians 50. Which group followed an urban strategy using a small number of terrorists to bring international support for Cypriot independence? a. Hezbollah b. EOKA c. FLN d. al Qaeda 51. What does the word “Sikh” mean in Punjabi? a. Son of God b. Disciple c. Holy person d. Guru 52. What caused Algerian and world opinion to turn against France in the 1950s? a. The brutal counterterrorist tactics of the French government b. France’s liberation from Germany c. The granting of French citizenship to Europeans born in Algeria d. France’s tactic of flooding the Mediterranean coast with Europeans 53. Modern nationalistic terrorism arose after ________. a. World War II b. World War I c. the Korean War d. the Vietnam War

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 07_10e 54. Where did the Mau Mau movement originate? a. France b. Spain c. Chad d. Kenya 55. Despite most of the country being in Asia, which country was accepted as a partner in NATO? a. Turkey b. Cyprus c. Greece d. Belgium 56. The Mau Mau movement resulted in some retaliatory steps from the British. Which of the options was NOT one of them? a. Torture of the prisoners b. Massive detainment c. Overwhelming British military response d. Non-violent protests 57. What is the nature of the central focus of the conflicts in Cyprus, Kenya, and Algeria from the late 1940s onwards? a. Anticolonial b. Socialist c. Religious d. Economic 58. Which leader of the PKK wanted semiautonomy and asked for federal status in 1995? a. Habib Akdas b. David Galula c. Fezya Altindag d. Abdullah Ocalan 59. In which country did Habib Akdas establish al Qaeda? a. Cyprus b. Turkey c. Pakistan d. Chechnya 60. Which country’s independence did the PKK fight for? a. Chechnya b. Turkey c. Kurdistan d. Pakistan Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 07_10e 61. Most Muslims in Nigeria were originally from which sect? a. Sunnis b. Sufis c. Shi’ites d. Salafists 62. Which of the following is an organization of 54 African states to promote peace, security, and economic development? a. African Committee b. African Union c. African Nations d. African Peace Accord 63. The leader of the PKK ordered the end of a suicide-bombing campaign in 2006. Between which two countries was he calling for peace? a. Chechens and the Russian Federation b. Turkey and the Kurds c. Turkey and the Gulf states d. Iraq and Iran 64. What has provided the impetus for regional jihadists in Sub-Saharan Africa? a. Nationalistic terrorism b. Ethnic terrorism c. Economic terrorism d. Endemic terrorism 65. What is the significance of the Golden Temple for Sikhs? a. Groups of Sikhs formed terror cells inside the Golden Temple. b. Sikh forces successfully defended it against the Indian military. c. It is the holiest site in Sikhism. d. It was the site of the largest Sikh terrorist attack. 66. In which year did Nigeria gain independence? a. 1848 b. 1960 c. 1916 d. 1785 67. The national police of which country has one of the most highly educated command staffs in the world? a. China b. The United Kingdom c. Turkey d. Cyprus Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 07_10e 68. According to Raphaëlle Branche, in August 1955, which of the following activities was committed by the FLN? a. Massacred colonial families in Algeria b. Planted suicide bombs in French cities c. Conducted peaceful protests in Algeria d. Burned the fields and agricultural areas owned by the French 69. Which of the following is Turkey’s largest ethno-nationalist terrorist threat? a. FLN b. LTTE c. IRA d. PKK 70. Turkey is currently facing a wave of religious terrorism, but for the past three decades, its major problems have come from which particular community? a. Europeans b. Kurds c. Pakistanis d. Syrians 71. Which country has a population of 99 percent Muslims and was also the home of the last caliphate? a. Pakistan b. Algeria c. Kurdistan d. Turkey 72. What kind of aims were the terrorist activities of the Mau Mau attempting to achieve? a. Language and cultural rights b. Political reform c. Religious freedom d. Unification with other countries 73. In which year did Kenya gain its independence? a. 1970 b. 1955 c. 1948 d. 1963 74. Which group was established to govern Somalia in 2004 that nominally remained in power until 2012? a. FLN b. ICU c. PKK d. TFG

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 07_10e 75. The PKK officially changed its name in 2002. What was its new name? a. Kurdistan Marxist–Leninist Party b. Kurdistan Freedom Party c. Kurdistan Freedom and Democracy d. Kurdistan Democratic Party 76. What is the name of the tradition of orthodox Muslims who follow the Prophet and the early elders of the faith? a. Sunnism b. Sufism c. Shi’itism d. Salafism 77. Why are some Europeans reluctant of Turkey joining the European Union (EU)? a. They fear that if Turkey joins the EU, it will make the country more powerful. b. They fear Turkey will flood Europe with poorly educated workers. c. They fear the Turkish will convert them to Islam. d. They worry that the Turkish will change the culture of Europe. 78. Where did Britain establish its Middle Eastern military headquarters at the end of World War II? a. Cyprus b. Cape Town c. Algeria d. Tunisia 79. What was objective of the National Organization of Cypriot Fighters (EOKA)? a. Cypriot independence b. Partitioning the Cypriot people into Greek and Turk populations c. Maintenance of the Cypriot people under British rule d. Maintenance of the Cypriot people under Turkish rule 80. Boko Haram began in which country? a. Great Britain b. Nigeria c. Turkey d. India 81. J. Bowyer Bell used the term endemic terrorism to describe _____. a. the economic exploitation of Africa b. the activities of the colonial powers in Africa c. terrorist activities motivated by religious belief d. the state of terrorist violence in Africa

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 07_10e 82. In 1985, Sikh terrorists killed 329 people in a bomb attack on an Indian ____________. a. Temple b. Theater c. Airliner d. Mall 83. Which terrorism involves the artificial mixing of rival ethnic groups, tribes, nationalities, or cultures in a nationstate? a. Separatist b. Endemic c. Open d. Nationalist 84. Using Kyrgyzstan and Kazakhstan as a base, which group operated in China? a. Uighur nationalists b. Chinese communists c. Chinese right-wing nationalists d. Uighur communists 85. Which of the following refers to violent terrorism waged on the basis of a shared sense of common political unity, cultural traditions, or ethnic freedom? a. Endemic terrorism b. Separatist terrorism c. Nationalistic terrorism d. Ethnic terrorism 86. After India was partitioned in 1947, the Sikhs sought independence in a state where they represented the majority of the population. Which state was it? a. Delhi b. Chandigarh c. Haryana d. Punjab 87. In which year did the British begin creating the modern nation of Nigeria after assuming control of the area’s coast? a. 1845 b. 1960 c. 1774 d. 1916

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 07_10e 88. Georgios Grivas created which organization to overthrow British rule in Cyprus? a. EOKA b. FLN c. PKK d. ETA 89. What is the primary focus of the terrorist group Boko Haram? a. Regional b. National c. International d. Political 90. What did people have to do to become a Mau Mau warrior? a. Take an oath of non-violent resistance. b. Abandon urban areas and live in the forests. c. Take an oath in a mystical tribal ceremony. d. Be loyal to the colonial government. 91. The borders in much of sub-Saharan Africa and the modern Middle East were drawn in Europe _______________. a. considering traditional political associations b. considering religion rather than politics c. without regard for tribal areas, ethnicity, or religion d. without regard for European convenience 92. In 1949, what percentage of the Xinjiang province was Uighur? a. 100 percent b. 90 percent c. 10 percent d. 50 percent 93. According to David Anderson, what happened during the third phase of the Mau Mau movement? a. Units gathered in the lower forests of Western Kenya. b. Mau Mau units devolved into forest gangs. c. the British government declared a state of emergency. d. Recruitment decreased and gangs were isolated from one another. 94. What were ethnic Turks, mostly Sufi Muslims, who governed parts of Xinjiang province for 200 years called? a. PKK b. Salifs c. Sikhs d. Uighurs

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 07_10e 95. The original aim of the PKK, at its founding in 1974, was to fight for _____. a. a Marxist Islamic state b. a secular Turkish state c. a Marxist-Leninist state d. an Islamic Kurdish state

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 07_10e Answer Key 1. False 2. False 3. True 4. True 5. False 6. True 7. True 8. False 9. True 10. True 11. False 12. True 13. True 14. True 15. False 16. d 17. c 18. d 19. d 20. a 21. d 22. d 23. a 24. a 25. a 26. c

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 07_10e 27. b 28. b 29. a 30. a 31. a 32. a 33. b 34. b 35. a 36. d 37. d 38. b 39. b 40. a 41. c 42. b 43. a 44. a 45. d 46. a 47. a 48. c 49. a 50. b 51. b 52. a 53. a 54. d Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 07_10e 55. a 56. d 57. a 58. d 59. b 60. c 61. b 62. b 63. b 64. d 65. c 66. b 67. c 68. a 69. d 70. b 71. d 72. b 73. d 74. d 75. c 76. d 77. b 78. a 79. a 80. b 81. d 82. c Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 07_10e 83. b 84. a 85. c 86. d 87. a 88. a 89. a 90. c 91. c 92. b 93. d 94. d 95. c

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 08_10e Indicate whether the statement is true or false. 1. The only people to practice terrorism in the name of their religion are Muslim fanatics. a. True b. False 2. Leaders of the Irgun studied and incorporated the tactics of Marighella. a. True b. False 3. Sunnis comprise an estimated 85 to 90 percent of all Muslims today. a. True b. False 4. Zaidi Shi’ites compose the majority of Shi’ite Muslims. a. True b. False 5. The purpose of Islam was to subject the world to God’s will. a. True b. False 6. The Zionist movement took place at the same time the Ottoman Empire was forming. a. True b. False 7. Gulf states include only small Arab kingdoms bordering the Dead Sea. a. True b. False 8. According to Bernard Lewis, the Middle East is not a geographical region. a. True b. False 9. Some Islamic countries refer to their legislative body as a majilis. a. True b. False 10. Ismailis believe that there were twelve Imams who followed Mohammed. a. True b. False 11. Mohammed was not born in Mecca. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 08_10e 12. Muslims believe that Jews, Christians, and Zoroastrians worship the same deity. a. True b. False 13. In 1969, Colonel Muammar Gadhafi seized power in a military coup, claiming Libya as an anti-Western socialist state. a. True b. False 14. Mainstream Muslims following the caliph were conventionally called Sunnis, while the followers of Ali became known as Shi’ites. a. True b. False 15. Although theological divisions with Sunnis would eventually arise and the Shi’ites themselves would split into competing sects, the first division in Islam was political. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. The two main branches of Islam are the _______________. a. Shi’ites and Sunnis b. Sunnis and Ismailis c. Ismailis and Zaidis d. Shi’ites and Ismailis 17. In 1978, Israel launched a minor invasion of which of the following, followed by a full-scale attack in 1982? a. Iran b. Lebanon c. Iraq d. Syria 18. What is the name of the Caliphate of the second Muslim dynasty? a. Abbasids b. Wahhab c. Ali d. Mawdudi 19. In which year did Libya gain its independence? a. 1968 b. 1951 c. 1978 d. 1958

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 08_10e 20. The Zionist movement took place at the same time as which of the following was breaking up? a. Middle East b. Ottoman Empire c. Arab Empire d. Roman Empire 21. In 1922, Great Britain received permission from which of the following to create the Mandate of Palestine? a. The League of Nations b. The United Nations c. The European Council d. The Shah of Iran 22. The three most important cities in Sunni Islam are a. Badr, Mecca, and Medina b. Mecca, Medina, and Jerusalem (al Quds) c. Medina, Jerusalem (al Quds), and Cairo d. Mecca, Medina, and Karbala

.

23. Which imperialism came to Iran in the 1800s? a. American b. Israeli c. British d. French 24. The Balfour Declaration of November 1917 promised to create the state of a. Palestine b. Persia c. Israel d. Iran

.

25. The political situation at the end of which of the following wars set the stage for developments over the next century, and is the basis for terrorism in the traditional Middle East? a. The Yom Kippur War b. The Four Days’ War c. World War II d. World War I 26. Which of the following countries became a constitutional monarchy ruled by King Hussein from 1952 to 1999? a. Jordan b. Iraq c. Iran d. Syria

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 08_10e 27. The Crusades lasted from 1095 to about a. 1150 b. 1492 c. 1600 d. 1250

.

28. According to the legend, when did Mohammed along with 72 families left Mecca for Medina? a. 750 AD b. 625 AD c. 642 AD d. 622 AD 29. Which of the following was the greatest mistake according to the Muslims? a. Deification of Jesus b. Considering Mohammed as a prophet c. Creating the perfect Islamic community d. Human corruption of Hebrew and Christian Bibles 30. Which of the following is the site of a battle between the Muslims of Medina and the merchants of Mecca in 624? a. Jordan b. Iraq c. Badr d. Qutb 31. At the end of which of the following wars was the entire Middle East controlled by the British, French, and Russians? a. World War II b. World War I c. The Six-Day War d. The Hundred Years’ War 32. The Quran is a codified version of the communication Mohammed received from the angel ________. a. Gabriel (Jabril) b. Raphael (Israfil) c. Michael (Mikail) d. Azrael (Malak al-maut) 33. What was the official title of the community leader chosen by the Sunnis? a. Imam b. Caliph c. Sufi d. Allah Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 08_10e 34. Israel officially functions as a(n) _______________. a. constitutional republic b. theocracy c. oligarchy d. parliamentary democracy 35. The initial split of the Islamic faith into the Sunnis and Shi’ites was based on the issue of _________. a. militarization b. money c. leadership d. geography 36. Which of the following war reversed the defeat of the Six-Day War for many of Israel’s Arab neighbors? a. World War I b. The Hundred Years’ War c. The Yom Kippur War d. The Civil War 37. In which year did the Baath party seize power in Syria? a. 1953 b. 1960 c. 1963 d. 1970 38. The angel Gabriel (Jabril) told Mohammed that God had chosen him to be a prophet to the _______________. a. Turks b. Arabs c. Persians d. Jews 39. In the following list, who, according to Mohammed, was his male heir? a. Abu Bakr b. Ali ibn Talib c. Umar d. Uthman 40. Geographically, which country other than Japan is considered Far East? a. India b. Thailand c. Russia d. China

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 08_10e 41. In 1947, the United Nations’ post-World War II solution to the Arab-Israeli conflict was for one part of Palestine to be given to the Arabs and another part to be given to the ________. a. British b. Jews c. Christians d. French 42. Geographically, ancient Persia occupied the area known today as ________. a. Iran b. Syria c. Egypt d. Turkey 43. Gamal Nasser took power over which country in 1954? a. Turkey b. Iran c. Egypt d. Israel 44. The name of Mohammed’s daughter was _______________. a. Fatima b. Khadijah c. Ali ibn Talib d. Medina 45. Which of the following, signed by the United Kingdom in 1917, promised a homeland for Jews in the geographical area of biblical Israel? a. Sykes-Picot Agreement b. Balfour Declaration c. Declaration of Sentiments d. Mandate of Palestine 46. The two dynasties that ruled the Middle East in the years following Mohammed were the Umayyads and the _________. a. Abbasids b. Partisans of Ali c. Husseinis d. Sunnis

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 08_10e 47. The three sources of violence in the Middle East are: Intra-Arab rivalries and struggles, the future of revolutionary Islam, and _________. a. the Palestinian question b. the Islamic question c. the Arabic question d. the Persian question 48. Iranians have strong ethno-national ties to ____________. a. Ottoman Empire b. Arab Empire c. Turkish Empire d. Persian Empire 49. Muslims believe Mohammed created the perfect Islamic community at _______________. a. Medina b. Mecca c. Badr d. Jerusalem 50. Ottoman Turks conquered which of the following in 1453, renaming it Istanbul? a. Medina b. Mongolia c. Iran d. Constantinople 51. According to the text, in what year was Mohammed born? a. 100 BCE b. 560 AD c. 580 AD d. 570 AD 52. In the following list, who was also known as Saddiq and had led military expeditions that expanded Muslim influence to the north of Mecca? a. Abu Bakr b. Umar c. Uthman d. Ali

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 08_10e 53. Sporadic violence against Palestinian Jews began in 1921, and the Jews formed a defense force known as the ____________________. a. Haganah b. EOKA c. FLN d. Republican Army 54. When Israelis practice terrorism, they often refer to it as _______________. a. proactive attacks b. self-defense c. military actions d. terrorist defensive strategy 55. Who of the following was a British diplomat who signed a secret agreement with Francois Georges-Picot in May 1916? a. Michael Burleigh b. Michael Collins c. Arthur Balfour d. Mark Sykes 56. During 1900s, which of the following became one of the most violent regions in the Middle East? a. Syria b. Palestine c. Lebanon d. Egypt 57. The British established the Anglo-Persian Oil Company in 1909 and started taking oil profits out of ________. a. Saudi Arabia b. Iraq c. Persia (Iran) d. Turkey 58. Which of the following gave Britain control of Palestine and placed the British in the center of Middle Eastern affairs? a. Mandate of the Middle East b. Treaty of the Middle East c. Mandate of Palestine d. Treaty of Palestine

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 08_10e 59. Which of the following refers to Shah Mohammed Pahlavi’s secret police, empowered after the 1953 downfall of the democratic government? a. The SAVAK b. The Majilis c. The Haganah d. The Karbala 60. Which of the following was a Turkish-based government that lasted for six hundred years until 1924? a. The Persian Empire b. The Arab Empire c. The British Empire d. The Ottoman Empire 61. What is the Islamic name given to the religious council that advises a government or a leader? a. Sufi Muslim b. Majilis c. Supreme Muslim d. SAVAK 62. Following the split of the Islamic faith, which family assumed control of the Islamic movement and ruled the first Arab empire? a. Bakr b. Talib c. Umar d. Uthman 63. The British encouraged the Arabs to revolt against which of the following because this group was allied with the Germans? a. The Turks b. The Caliphate c. The Jews d. The Russians 64. Bernard Lewis points to which of the following as the origin of modern confrontations between the West and Islam? a. The Age of Colonization b. The Age of Globalization c. The Age of Enlightenment d. The Age of Discovery

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 08_10e 65. A 1929 riot in Palestine pitted the Islamic mufti of Jerusalem against ___________. a. Arab worshippers b. Jewish worshippers c. Persian worshippers d. Christian worshippers 66. The immigration of which of the following groups into Palestine played into the political issues of WWI? a. American b. French c. British d. Jewish 67. Syria was under the rule of which of the following from 1922 to 1946? a. British b. French c. American d. German 68. The cult sponsored by Ismailis in Middle Ages is known as _________. a. The Majilis b. The Assassins c. The SAVAK d. The Karbala 69. The importance of Middle East can be illustrated by three points, including the birth and spread of Islam, expansion of conflict beyond the traditional geographical realm, and ______________. a. historical confrontations between Christianity and Islam b. conflict between civilians and the government c. Crusades and Mongol invasions d. violence influencing international terrorism 70. At the turn of the 19th Century, European Jews, separated from their ancient homeland for nearly 2,000 years, and led a political movement in the hopes of creating their own nation. What was the movement called? a. Catharism b. Mandaeism c. Zionism d. Zoroastrianism

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 08_10e 71. Martyrdom and voluntary sacrifice became the trademark of which of the following, and deeply influenced Shi’ite tradition? a. Partisans of Ali b. Partisans of Hussein c. Twelve Imams d. Six Imams 72. Which of the following statements is NOT true about the twelve divinely inspired imams? a. Their coming was predicted by the Quran b. They were God’s representatives on Earth c. They were inspired by the spirit of God d. They had the ability to recognize their followers 73. When forced to flee for his life, Ayatollah Khomeini received asylum in ________. a. Berlin b. Paris c. Tehran d. Cyprus 74. Which Muslim leader was assassinated by Muslim fundamentalists in 1981 for agreeing to peace? a. Anwar Sadat b. Menachim Begin c. Gamal Nasser d. Muammar Gadhafi 75. Which of the following countries is a part of the Gulf States? a. Egypt b. Syria c. Persia d. Oman 76. The Palestine Liberation Organization (PLO) renounced terrorism in which year? a. 1993 b. 1990 c. 1984 d. 1989 77. Which of the following refers to a peace treaty between Egypt and Israel brokered by the United States in 1979? a. United Nations Peace Accord b. Amnesty Accord c. Camp David Peace Accord d. International Peace Accord

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 08_10e 78. Although modern terrorism in the Middle East grew after 1967, the region has been volatile since ________. a. 1948 b. 1949 c. 1947 d. 1950 79. Which was the first Arab and Muslim dynasty that ruled Damascus from 661 to 750? a. Husseinis b. Abbasids c. Umayyads d. Mohammedans 80. The secular socialists seeking to unite Arabs in a single socialist state are called _______. a. Sunni b. Baathist c. Abbasids d. Zaidis 81. In which year did the United Nations recognize the partition of Palestine and the modern nation-state of Israel? a. 1948 b. 1988 c. 1990 d. 1848 82. The British began to view Persia (Iran) as the northern gateway to India after ________. a. 1800 b. 1900 c. 1850 d. 1950 83. Which of the following wars was fought between Israel and its Arab neighbors in October 1973? a. The Six-Day War b. The Yom Kippur War c. The Islamic War d. The Persian War 84. Which of the following religions was NOT founded in the Middle East? a. Christianity b. Judaism c. Buddhism d. Islam

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 08_10e 85. Who of the following used a mixture of repressive tactics and political strategies to consolidate his power in Iran, and is best understood within the Shi’ite tradition of Islam? a. Saddam Hussein b. Ayatollah Khomeini c. Mohammed Reza Pahlavi d. Gamal Nasser 86. In the following list, who was the caliph during 634-644 period of caliphate? a. Abu Bakr b. Uthman c. Umar d. Ali 87. Which U.S. President was in attendance when Egypt and Israel signed the Camp David Peace Accord? a. Jimmy Carter b. George W. Bush c. Bill Clinton d. Ronald Reagan 88. Which of the following is one the three great monotheistic religions that Mohammed was exposed to at a young age? a. Christianity b. Islam c. Mandaeism d. Rastafari 89. In the following list, who did Sunni Muslims believe is the fourth and last Rightly Guided Caliph? a. Abu Bakr b. Umar c. Uthman d. Ali 90. In an effort to secure the land route to which country did the British establish several states from the Mediterranean Sea to the Persian Gulf in the 19th and early 20th centuries? a. India b. Pakistan c. China d. Afghanistan

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 08_10e 91. Who are the four major prophets of Islam? a. Abraham, Moses, Jesus, and Mohammed b. Moses, Jesus, Mohammed, and Ali c. Mohammed, Abu Bakr, Umar, and Uthman d. Mohammed, Ali, Hasan, and Hussein 92. In which country did the Zionists purchase land to create their new homeland? a. Israel b. Persia c. Palestine d. Syria 93. Who was guided by the message of Karbala, and removed scholars and political leaders who disagreed with his message? a. Saddam Hussein b. Ayatollah Khomeini c. Mohammed Reza Pahlavi d. Gamal Nasser 94. After the Six-Day War in 1967, which of the following groups began a series of terrorist attacks against Israeli civilian positions? a. PLO b. FLN c. IRA d. PKK 95. In Turkey, in which year was the caliphate ended? a. 1918 b. 1924 c. 1920 d. 1922

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 08_10e Answer Key 1. False 2. False 3. True 4. False 5. True 6. False 7. False 8. True 9. True 10. False 11. False 12. True 13. True 14. True 15. True 16. a 17. b 18. a 19. b 20. b 21. a 22. b 23. c 24. c 25. d 26. a

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 08_10e 27. d 28. d 29. a 30. c 31. b 32. a 33. b 34. d 35. c 36. c 37. c 38. b 39. a 40. d 41. b 42. a 43. c 44. a 45. b 46. a 47. a 48. d 49. a 50. d 51. d 52. a 53. a 54. c Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 08_10e 55. d 56. c 57. c 58. c 59. a 60. d 61. b 62. d 63. a 64. d 65. b 66. d 67. b 68. b 69. a 70. c 71. c 72. d 73. b 74. a 75. d 76. a 77. c 78. a 79. c 80. b 81. a 82. c Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 08_10e 83. b 84. c 85. b 86. c 87. a 88. a 89. d 90. a 91. a 92. c 93. b 94. a 95. b

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 09_10e Indicate whether the statement is true or false. 1. Hamas runs charities, schools, hospitals, and other social service organizations in Gaza where unemployment is sometimes as high as eighty-five percent. a. True b. False 2. Hezbollah International has no cells in the United States. a. True b. False 3. Unlike Israel’s excellent tactical record, its counterterrorist policies have stirred international controversy. a. True b. False 4. Suicide bombing became the most important tactic of all the Palestinian terrorist groups at the beginning of the al Aqsa Intifada. a. True b. False 5. Hezbollah is responsible for the 1985 hijacking of a TWA Flight. a. True b. False 6. In 1959, Arafat formed a guerrilla organization, to wage a campaign against Lebanon. a. True b. False 7. The Revolutionary Guards were the militarized quasi-police force of the revolutionary government during the Iranian Revolution. a. True b. False 8. The expertise of Mossad, the Israeli intelligence service, is not highly respected in international community. a. True b. False 9. From 1967 to 1982, the PLO was characterized by internal splintering. a. True b. False 10. When Israel first faced suicide bombings, the government implemented a controversial policy called bulldozing. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 09_10e 11. Hezbollah International maintains an extensive international finance ring partially based on smuggling, drugs, and other criminal activity. a. True b. False 12. Israel tends to associate the origin of modern terrorism with the rise of the IRA. a. True b. False 13. The story of Hamas is tied to Yasser Arafat. a. True b. False 14. The West Bank of the Jordan River was seized by Israel prior to World War II. a. True b. False 15. The domestic security service, Shin Beth, does not operate within Israeli borders. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Which of the following prompted the idea that Arabs could create a European-style nation based on a common language and culture? a. Arab nationalism b. Arab community c. Arab-Europe bridge d. Arab spring 17. Which war changed the future of Hezbollah? a. Syrian Civil war b. Arab-Israeli war c. Six-Day war d. Gaza war 18. To which faith does Hezbollah subscribe, though in a militarized fashion? a. Islam b. Judaism c. Sufism d. Kabbalism

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 09_10e 19. Where is the international wing of Hezbollah believed to be based? a. Dublin b. Paris c. Damascus d. Egypt 20. Which terrorist group won control of the Palestinian government in 2006? a. Hezbollah b. Hamas c. The PLO d. The PIJ 21. The organization formed by Arafat to fight against Israelis is called _______. a. PLO b. Knesset c. Fateh d. Black June 22. All three factions of the PLF seek to destroy which nation? a. Jordan b. Syria c. Israel d. Lebanon 23. Shin Beth is responsible for _________. a. international security b. internal security c. cyber security d. political security 24. Which country does Israel usually punish for “the sins of Hezbollah?” a. Palestine b. Syria c. Egypt d. Lebanon 25. Which pillar of Islam is Hamas demonstrating by running charities, schools, hospitals, and other social service organizations? a. First (Shahada) b. Second (Salat) c. Third (Saum) d. Fourth (Zakat)

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 09_10e 26. Who was the American-educated, “outside” leader of Hamas? a. Musa Abu Marzuq b. Abdel Aziz Rantisi c. Mahmud Abbas d. Ahmed Yassin 27. Which war was fought between Israel and its Arab neighbors in June 1967? a. Yom Kippur War b. Four Days’ War c. Zionist War d. Six-Day War 28. Arab nationalism grew through the early part of the 20th century and flourished till which war? a. Yom Kippur War b. Six-Day War c. al Aqsa Intifada d. Lebanese Civil War 29. Hezbollah is a configuration of political actors from the Shi’ite community of southern Lebanon and __________. a. French Revolution b. Gulf War c. Iranian Revolution d. Syrian War 30. The leader of the international branch of Hezbollah was ______________________. a. Sheik Mohammed Hassan Fadlallah b. Abdul Nasrallah c. Hassan Musawi d. Imad Mugniyah 31. The massive wall that runs through Palestinian areas in an effort to thwart Palestinian attacks was proposed by which Israeli leader? a. Shimon Peres b. Yitzhak Rabin c. Ariel Sharon d. Benjamin Netanyahu

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 09_10e 32. Which country almost always supports Israel, frequently using its veto power in the U.N. Security Council to keep the United Nations from condemning Israeli actions? a. Iran b. Great Britain c. The United States d. France 33. The original headquarters of which terrorist group was in Baalbek, a city in the Bekaa Valley? a. Hamas b. PLO c. Hezbollah d. Fatah 34. What term best describes Hezbollah’s organizational structure? a. Umbrella b. Hierarchical tree c. Paramilitary scale d. Bureaucratic 35. Palestinians began using terrorist attacks against Israel when it became evident that the Arab conventional forces could not defeat the ________. a. Lebanese Shi’ite Forces b. Hamas c. Israeli Defense Forces d. Palestinian Islamic Jihad 36. After which event did IDF add the West Bank and the Gaza Strip to Israel territory? a. The Yom Kippur War b. The Suez Crisis c. The Six-Day War d. The Arab-Israel War 37. In Israel, what was the purpose of the controversial policy of bulldozing? a. To destroy the family homes of suicide bombers b. To demolish all illegal buildings c. To clear land for irrigation and agriculture d. To remove potential Palestinian targets 38. The Palestinian Muslim Brothers became the nucleus of which terrorist organization? a. PLO b. Hezbollah c. Hamas d. Arab socialism Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 09_10e 39. During al Aqsa Intifada, which leader of Hamas was selectively assassinated by Israel in May 2003? a. Riyad Aby Zayd b. Ibrahim Maqadah c. Sheik Ahmed Yassin d. Ismail Shanab 40. Who was a leader of Fatah and alleged leader of the al Aqsa Martyrs Brigades? a. Yasser Arafat b. Marwan Barghouti c. Hassan Abdel Rahman d. Yael Shahar 41. What was the Izz el Din al Qassam Brigades? a. The military wing of Hezbollah b. The military wing of Hamas c. The military wing of Fatah d. The military wing of Aqsa Martyrs Brigades 42. Which terrorist outfit began as the military wing of the former PLO and was Yasser Arafat’s strongest military muscle? a. Hamas b. Force 17 c. al Aqsa Intifada d. Fatah 43. Which of the following statements is true of Black September? a. They worked with German right-wing allies. b. They planned a strike against the Israelis. c. They tried negotiating transportation to Lybia. d. They attacked German police. 44. Which of the following statements is NOT true according to Moshe Amon’s writings about David’s Kingdom and Israeli settlements? a. Although Israel is a secular democracy, it is being influenced by religious extremists. b. Jewish extremists have moved into Palestinian areas to establish permanent settlements. c. Many militants believe that when David’s kingdom is restored every person on earth will follow the teachings of the God of Israel. d. The militants and Israeli soldiers fight side by side.

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 09_10e 45. After the Six-day War, Arafat began to attack Israel using which group of Fatah warriors? a. Intifada b. PIJ c. al Aqsa Martyrs Brigades d. Fedayeen 46. Who was the son of a renowned Shi’ite scholar and had led the Shi’ite militia known as the Mahdi Army? a. Muqtada al Sadr b. Abdel Aziz Rantisi c. Khalid Meshal d. Ahmed Yassin 47. Most of Hezbollah’s activities link with the politics of which country? a. Lebanon b. Iraq c. Syria d. Iran 48. In which refugee camps are the al Aqsa Martyrs Brigades based? a. Iranian b. Iraqi c. Syrian d. West Bank 49. Which of the following is the site of the ancient Jewish Temple, a former Christian church, and the al Aqsa mosque? a. The Golan Heights b. The Gaza strip c. The Temple Mount d. Najaf 50. Which terrorist organization struck U.S. Marines and the French army in October 1983, forcing a withdrawal of a multinational peacekeeping force? a. Hezbollah b. Mossad c. Hamas d. The PLO 51. Which of the following is true of Israel’s counterterrorist policy of selective assassination? a. The judiciary is involved in the process of approving assassinations. b. It is supported by the United States and the international community. c. Each proposed attack must go through several stages, excluding legal review. d. Israeli deaths from terrorism have increased since it began implementing the policy. Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 09_10e 52. Which small farming region in southwest Lebanon was annexed by Israel in 1981? a. The Bekaa Valley b. Beirut c. Shaba d. Najaf 53. Which of the following is the first spontaneous uprising against Israel, which lasted from 1987 to 1993? a. Six-Day War b. Operation Peace for Galilee c. Intifada d. Yom Kippur War 54. In 1972, which group struck the Olympic Village in Munich and took most of the Israeli Olympic team hostage, killing those who tried to escape? a. Fatah b. Black September c. PLO d. IDF 55. Which group was responsible for the murder of Jordanian ambassadors in Spain, Italy, and India in the 1980s? a. PLO b. Hamas c. Black June d. PIJ 56. The transformation of Hamas began after growing disillusionment with Fatah and the _______. a. Six-Day War b. Palestinian Peace Talks c. Yom Kippur War d. Oslo Accords 57. The rebel organization created by Abu Nidal in 1976 is known as _______. a. PIJ b. Black June c. Hamas d. PLF 58. What were the repercussions of Operation Cast Lead? a. Hamas retaliated against Israel. b. Israeli citizens criticized the attack. c. The United States lauded Israel. d. Several nations condemned the Israeli incursion.

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 09_10e 59. What did the three groups led by Abu Abbas, Abdal Fatah Ghanem, and Talat Yaqub call themselves? a. Fatah b. PIJ c. PLF d. Hamas 60. Which of the following is NOT one of the three functions of Hezbollah’s international branch? a. To raise money to support operations in Europe and in the United States b. To be used by Iran as an extension of its own power c. To use their base in South America to raise funds through legitimate and illegitimate methods d. To mobilize resources from South East Asian nations 61. Terrorism began with two Zionist organizations, the Irgun Zvai Leumi and __________. a. Stern Gang b. PLO c. Fatah d. Hamas 62. The politically oriented Force 17 and the Tanzim Brigade were the two main forces of which terrorist group? a. Hamas b. Fatah c. Hezbollah d. PIJ 63. Who was the president of the Palestinian Authority since 2005, and a founding member of Fatah and an executive of the PLO? a. Hafez Assad b. Yasser Arafat c. Sabri al Banna d. Mahmud Abbas 64. Hezbollah is based within which nation? a. Lebanon b. Iran c. Israel d. Syria 65. According to the text, which is one of the most effective secret police forces in the world? a. Kahane b. Mossad c. Shin Beth d. Kach

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 09_10e 66. According to analysts, which country provides the majority of funding for Palestinian Islamic Jihad (PIJ) activities? a. Syria b. Iraq c. Iran d. Afghanistan 67. In which year was Mossad formed? a. 1947 b. 1953 c. 1961 d. 1951 68. Which of the following is NOT an Israeli counterterrorist tactic? a. Bulldozing b. The wall c. Kidnapping d. Selective assassination 69. What is the Party of God also known as? a. Hezbollah b. The IDF c. The PLO d. Hamas 70. Which of the following organizations is not one of the current major operational groups surrounding the IsraeliPalestinian conflict? a. Hezbollah b. Hamas c. The al Aqsa Martyrs Brigades d. The PLO 71. Israeli commandos and the IDF units allegedly killed opposition leader, Fathi Shekaki through selective assassination. He belonged to which of the following groups? a. PLF b. PLO c. LTTE d. PIJ

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 09_10e 72. Who originally started the Palestinian Wing of the Muslim Brotherhood, but merged it into Hamas during the first Intifada? a. Musa Abu Marzuq b. Abdel Aziz Rantisi c. Mahmud Abbas d. Ahmed Yassin 73. Who was a founding member of Fatah but went his own way in 1974? a. Sabri al Banna b. Yasser Arafat c. Abbas Musawi d. Hassan Nasrallah 74. What was the code name for the 2008 Israeli assault on Gaza? a. Operation Blue Star b. Operation Desert Storm c. Operation Red Dawn d. Operation Cast Lead 75. Who was the founder of the group Black September? a. Arafat b. Kameel Nasr c. Abu Nidal d. Sabri al Banna 76. Hezbollah developed under the leadership of three central figures: Sheik Mohammed Hassan Fadlallah, Abbas Musawi, and ____________. a. Hassan Nasrallah b. Abdal Fatah Ghanem c. Talat Yaqub d. Ahmed Jabril 77. The Golan Heights is a region occupied by Israel and was formerly a part of _____. a. Palestine b. Syria c. Egypt d. Jordan 78. In which country are the Palestinian diaspora who were displaced in 1948 living? a. Lebanon b. Saudi Arabia c. Syria d. Israel Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 09_10e 79. According to the Hamas charter, which nation faces the greatest threat? a. Lebanon b. Israel c. Jordan d. Syria 80. Which of the following statements refers to the Dome of the Rock? a. The place where Muslims believe Ibrahim had a vision of God b. The holiest site in Islam c. The place Christians believe Jesus was crucified d. The place where Jews believe Moses received the Ten Commandments 81. The al Aqsa Martyrs Brigades became one of the first secular groups in the Middle East to use a certain military tactic. Which of the following was the tactic? a. Nuclear weapons b. Suicide bombers c. Cyberterrorism d. IEDs 82. Arafat was president of the Palestinian National Authority from 1993 to ___________. a. 2004 b. 1998 c. 2000 d. 1999 83. What was the name assumed by Mohammed al Husseini, the founding member of Fatah and the PLO? a. Kahil Wazir b. Yasser Arafat c. Sabri al Banna d. Hafez Assad 84. Which group was formed to put Fatah at the center of the new Intifada? a. The al Aqsa Martyrs Brigade b. The al Aqsa Intifada c. Force 17 d. The PIJ 85. Which country did the Hamas Charter of 1988 declare to be a God-given land? a. Israel b. Palestine c. Jordan d. Egypt

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 09_10e 86. What did Hezbollah do in the fourth phase of structural change that worked? a. A kidnapping campaign was launched by them. b. They created a regional militia. c. Its militia repeatedly struck the Israelis in Lebanon. d. They introduced suicide bombers. 87. Which of the following is NOT a part of Hezbollah’s activities? a. Political b. Social service c. Security d. Economic 88. The objective of first invasion of Lebanon by Israel was to get rid of which of the following group? a. PLO b. Hamas c. Hezbollah d. PLF 89. The al Aqsa Intifada was sparked in September 2000 by Ariel Sharon’s visit to which place? a. The Temple Mount b. The Temple Medina c. The Temple Mecca d. The Temple Bethlehem 90. In 2003, the U.S. Department of Justice took actions against which of the following groups in Florida, arguing that the group had an organized network of financial supporters around the world, including the United States? a. The PIJ b. Hamas c. Hezbollah d. al Aqsa Martyrs Brigades 91. Hezbollah, Hamas, and the PIJ do not recognize the right of which country to exist? a. Lebanon b. Israel c. Syria d. Palestine 92. The shadowy organization known as Islamic Jihad is connected to which terrorist organization? a. Al Qaeda b. Hezbollah c. PLO d. Hamas

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 09_10e 93. What was a consequence of Arab nationalism after the Six-Day War? a. It united the Arabs and made them feel proud of their nation. b. It raised the standard of living of Arabs. c. As nationalistic feelings waned, religious fervor took its place. d. It improved Israel’s relations with other countries. 94. Who of the following is the secretary general of Hezbollah? a. Abbas Musawi b. Hassan Nasrallah c. Hassan Fadlallah d. Imad Mugniyah 95. The 1978 Camp David Peace Accord brokered peace between Israel and which other country? a. Palestine b. USA c. Egypt d. Arabia

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 09_10e Answer Key 1. True 2. False 3. True 4. True 5. True 6. False 7. True 8. False 9. True 10. True 11. True 12. False 13. False 14. False 15. False 16. a 17. a 18. a 19. c 20. b 21. c 22. c 23. b 24. d 25. d 26. a

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 09_10e 27. d 28. b 29. c 30. a 31. c 32. c 33. c 34. a 35. c 36. c 37. a 38. c 39. b 40. b 41. b 42. d 43. c 44. d 45. d 46. a 47. a 48. d 49. c 50. a 51. c 52. c 53. c 54. b Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 09_10e 55. c 56. d 57. b 58. d 59. c 60. d 61. a 62. b 63. d 64. a 65. c 66. c 67. d 68. c 69. a 70. d 71. d 72. d 73. a 74. d 75. a 76. a 77. b 78. d 79. b 80. a 81. b 82. a Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 09_10e 83. b 84. a 85. b 86. c 87. d 88. a 89. a 90. a 91. b 92. b 93. c 94. b 95. c

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 10_10e Indicate whether the statement is true or false. 1. Though it was formally abandoned by the Indian Constitution, a rigid caste system governed the Indian society for centuries. a. True b. False 2. As champions of revolutionary terrorism, the Tupamaros were copied around the world, especially by groups in the United States and western Europe. a. True b. False 3. The Guerrillas in Malaysia, Vietnam, and South Africa used terrorism as a tactic to support a larger strategy. a. True b. False 4. A Naxalite group known as the Shining Path launched terrorist campaigns in rural Peru. a. True b. False 5. India is one of the most underpoliced countries of the world. a. True b. False 6. The New People’s Army (NPA) is the longest-running communist insurgency in the world. a. True b. False 7. Liberation theology is a doctrine that originated in poverty. a. True b. False 8. Death squads have been associated primarily with left-wing activities. a. True b. False 9. The FARC and ELN, originally inspired by the Tupamaros, have turned to drug trafficking to survive. a. True b. False 10. Ethnic strife is the sole cause of India’s terrorist problems. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 10_10e 11. Revolutionary terrorism began in 1789 with the French Revolution. a. True b. False 12. In the Tupamaro organization, the Executive Committee was in charge, but it ran a highly decentralized operation. a. True b. False 13. After World War I, revolutionary terrorism was mainly composed of left-wing and Marxist movements. a. True b. False 14. A common misconception is that the American Revolution was based on terrorism. a. True b. False 15. FARC and the ELN emerged as revolutionary groups in 1960s France. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. According to Martha Crenshaw, which of the following can be defined as an insurgent strategy in the context of internal warfare or revolution? a. Urban terrorism b. Revolutionary terrorism c. Counterrevolutionary terrorism d. Ideological terrorism 17. What is the name applied to the area of Naxalite violence in India? a. Red Corridor b. Naxalbari c. West Bengal d. No-go areas 18. What is the goal of Maoist terrorism? a. To establish a Communist society b. To promote terrorist activities c. To establish a democratic state d. To remove economic disparity

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 10_10e 19. Which of the following groups has the tendency to be more violent than other revolutionary groups? a. Islamic terrorist b. Left-wing c. Maoist d. Counterrevolutionary 20. According to BBC (2013b) which of the following hunted and killed leftist guerrillas? a. AUC b. FARC c. ELN d. MeK 21. Peru’s revolutionary past was grounded in which of the following, as the indigenous people sought to free themselves from European rule? a. Colonialism b. Anticolonialism c. Maoism d. Racism 22. In the Tupamaro organization, the executive committee was responsible for two major functions, administering special Committee for Revolutionary Justice and _____________. a. supervising terrorist operations b. acquiring financial aid c. recruiting personnel d. Gathering intelligence on various targets 23. Which of the following is NOT a tactic of death squads? a. Raids on government opponents b. Murder c. Kidnapping d. Hijacking 24. In 1968, the Tupamaros launched a massive campaign of which type of terrorism? a. Centralized b. Decentralized c. Maoist d. Counterrevolutionary 25. Who founded the Tupamaros? a. Fidel Castro b. Raul Sendic c. Carlos Marighella d. Tupac Amaru Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 10_10e 26. Which type of environment did the Tupamaros favor? a. Rural b. Religious c. Urban d. Global 27. Most Peruvian leftists were mainstream _______. a. Maoists b. Marxists c. Jihadists d. Leninists 28. Who of the following led a revolt against Spain in 1571 and came to symbolize Peruvian independence? a. Alberto Fujimori b. Abimael Guzmán c. Tupac Amaru d. Ronald Osborn 29. During American Embassy takeover in Tehran, how many Americans were held hostage from 1979 to 1981? a. 54 b. 35 c. 72 d. 64 30. Operating primarily in rural areas, the goals of which of the following groups were to topple the government in Bogotá and establish a socialist government? a. FARC b. Shining Path c. RAF d. ELN 31. The Tupamaros followed the operational guidelines of which revolutionary leader? a. Fidel Castro b. Carlos Marighella c. Tupac Amaru d. Renato Curcio 32. The Shining Path was influenced by the revolutionary philosophy of which Chinese communist leader? a. Zhou Enlai b. Lin Biao c. Mao Zedong d. Peng Chen

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 10_10e 33. Peter Waldmann sums up the Tupamaros by stating that they became the masters of which type of terrorism? a. Urban b. Centralized c. Decentralized d. Maoist 34. Who of the following was an Inca chieftain leading a revolt against Spain in the sixteenth century? a. Abimael Guzmán b. Tupac Amaru c. Raul Sendic d. Juan Manuel Santos 35. The main purpose of which of the following was to rid China of its middle class and growing capitalist interests? a. Chinese Civil War b. National Liberation Movement c. People Power Revolution d. Cultural Revolution 36. The Philippine government used the war on terrorism as an excuse to move against all EXCEPT ________. a. lawyers b. politicians c. church workers d. union organizers 37. The power base of NPA is located in __________. a. Manila b. Mindanao c. Luzon d. Boracay 38. In which year did MeK adopted its official name, the National Liberation Movement (MLN)? a. 1960 b. 1963 c. 1953 d. 1965 39. In which year did the Tupac Amaru Revolutionary Movement (MRTA) join the Shining Path? a. 1980 b. 1984 c. 1976 d. 1985

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 10_10e 40. The Shining Path was launched in Peru in 1980, and lasted for _________________. a. two decades b. three decades c. four decades d. a decade 41. Which of the following countries was home to the 1979 Sandinista revolution? a. Venezuela b. Uruguay c. Nicaragua d. Brazil 42. In 1997, three brothers brought several larger assemblies together in Columbia to form _______. a. MeK b. AUC c. MLN d. FARC 43. Which of the following runs from Nepal to southern India, and from India’s east coast to the central regions? a. Blue Corridor b. Red Brigades c. Red Corridor d. Blue Brigades 44. Which of the following is NOT a tactic used by FARC to raise funds? a. Taxing marijuana growers b. Extorting money from local businesses c. Kidnapping d. Charities 45. Which of the following concepts combines the ideas of Marx with Christian teachings, specifically focusing on social justice and the poor? a. Liberation theology b. Communism c. Socialism d. Nationalism 46. Modern revolutionary terrorism reached its peak in __________________________. a. 1950s and 1960s b. 1965 c. 1974 d. 1960s and 1970s

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 10_10e 47. Which of the following groups is known for purging and controlling its own members? a. ELN b. Death squads c. NPA d. FARC 48. In the midst of revolution and torture of the 1960s and 1970s, the Tupamaros blamed which of the following countries for supporting the brutal Uruguayan government? a. Britain b. The United States c. France d. Greece 49. Which former President of Peru was convicted of human rights violations and sentenced to prison? a. Alan Garcia b. Alberto Fujimori c. Alvaro Uribe d. Juan Manuel Santos 50. The Shining Path was deeply influenced by China and its ________________. a. Cultural Revolution b. Religion c. Government d. Economic Revolution 51. In 2012, negotiators of which terrorist groups sat down with government officials in Oslo? a. AUC b. NPA c. MeK d. FARC 52. FARC developed two ideological problems, drug money created wealth and ____________. a. lack of political support b. using terrorism to rule c. in-group fighting d. resentment of people 53. Which of the following was a global movement expressing dissatisfaction in the wake of anticolonialism? a. Nationalist terrorism b. Religious terrorism c. Separatist terrorism d. Revolutionary terrorism

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 10_10e 54. Which former Columbian President was internationally recognized for his tough stance against FARC and other revolutionary movements? a. Raul Sendic b. Alvaro Uribe c. Renato Curcio d. Felipe Calderón 55. In which year did Alvaro Uribe win his presidential election for Columbia? a. 2002 b. 2000 c. 1999 d. 2001 56. Rural revolutionary guerrillas generally incorporated selective terrorism in the traditions of ___________. a. Collins and Guevara b. Lenin and Marx c. Marighella and Guevara d. Collins and Marx 57. The Tupamaros, unlike Castro, were not interested in building which type of force to strike at the government? a. A conventional military force b. An unconventional military force c. A centralized military force d. A decentralized military force 58. Most of FARC’s money came through the ________. a. slave trade b. charities c. corrupt politicians d. drug trade 59. Which of the following started in 1969 as a response to a Philippine dictatorship? a. AUC b. FARC c. NPA d. AFP 60. Which of the following is NOT a tactic of the Tupamaros? a. Robbery b. Kidnapping c. Drug trade d. Attacking symbolic targets

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 10_10e 61. Which of the following groups emerged in a 1967 uprising in West Bengal? a. The Naxalites b. The NPA c. FARC d. The Tupamaros 62. Which of the following countries volunteered to host peace talks between the Columbian government and FARC? a. Peru and Ecuador b. Cuba and Bolivia c. Bolivia and Ecuador d. Uruguay and Peru 63. Which rebellion has become the Indian government’s top internal security problem? a. The Naxalite b. The Hindu fundamentalist c. The Jihadi d. The left-wing 64. The emerging Colombian drug gangs that have come to replace drug cartels are known as ________. a. BACRIM b. ELN c. FARC d. MST 65. Which of the following is a campaign led by the military wing of the Philippine Communist Party? a. ELN b. FARC c. Shining Path d. NPA 66. In 1964, a small group of Catholic priests joined an idealistic group of college students to form a new organization that would fight for social justice in Colombia. They called themselves the ________. a. FARC b. MLN c. MeK d. ELN 67. What is the official name of the Tupamaros? a. National Liberation Movement b. Shining Path c. FARC d. ELN Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 10_10e 68. China experienced Cultural Revolution, a violent movement, from 1966 to _________. a. 1974 b. 1968 c. 1976 d. 1970 69. In Philippines, potential terrorist actors are motivated by which of the following? a. Inherent affinity to terrorism b. Economic disparity c. Structure of political power d. Revolutionary philosophies 70. According to The New York Times (2009) report, which type of organization did the Shining Path reinvent itself as while reemerging around 2007? a. Nonviolent political b. Sex trafficking c. Drug trafficking d. Human trafficking 71. What did the Uruguayan government primarily target in their 1972 attack upon the Tupamaros? a. The group’s logistical network b. The group’s family members c. The group’s leaders d. The group’s weapons caches 72. By examining which kind of terrorism is it possible to broadly categorize a revolutionary style? a. Sociological b. Ideological c. Psychological d. Ecological 73. The philosophy of the Mujahedin-e-Kahlq (MeK) is socialism and _______________. a. women’s liberation b. economic stability c. religious reform d. international military supremacy 74. The United States removed which of the following groups from the list of designated FTOs in 2012? a. FARC b. The MeK c. ELN d. AUC

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 10_10e 75. NPA sustains its operations by extorting money from local residents and merchants in the name of tax. What is this tax called? a. Income tax b. Protection tax c. Revolutionary tax d. Social tax 76. Which of the following groups was founded in 1965 and thus preceded the Iranian Revolution by 14 years? a. Hezbollah b. The MeK c. Hamas d. FARC 77. Maoist terrorism is a form of which type of terrorism? a. Domestic b. International c. Revolutionary d. Vigilante 78. In which Uruguayan industry did the Tupamaros have a history with union workers? a. Sugar b. Coal c. Gold d. Salt 79. Which of the following groups is responsible for the assassination of six Americans in Tehran during the 1970s? a. The Mujahedin-e-Kahlq (MeK) b. The Red Army Faction (RAF) c. The Shining Path d. The New Peoples’ Army 80. Which of the following groups demonstrated to Western groups the impact that a few violent true believers could have on the rational routines of urban life? a. The Naxalites b. The NPA c. FARC d. The Tupamaros 81. The job of the Tupamaros’ executive committee was to terrorize which of the following into obedience? a. Terrorists b. Citizens c. The government d. Police Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 10_10e 82. Which of the following refers to geographical areas that cannot be controlled by the duly empowered Indian government? a. No-go areas b. Restricted areas c. Red Corridor d. Uncontrollable areas 83. When security forces and unofficial groups engage in violence, it is known as ___________. a. Revolutionary terrorism b. Counterrevolutionary terrorism c. Urban terrorism d. Maoist terrorism 84. Who was the president of Peru from 1990 to 2000? a. Abimael Guzmán b. Tupac Amaru c. Alberto Fujimori d. Juan Manuel Santos 85. Which of the following was a mass Philippine protest movement that toppled Ferdinand Marcos in 1986? a. People Power Revolution b. Tax Revolution c. Freedom Revolution d. Citizen Rights Revolution 86. The main aim of death squads is to protect __________. a. rights of the civilians b. borders of the country c. the established order d. federal offices in the country 87. In the early 1960s, a group of revolutionaries called the Tupamaros surfaced in ___________. a. Uruguay b. Columbia c. Argentina d. Paraguay 88. Who of the following is a philosophy professor and led the Shining Path from 1980 until his arrest in 1992? a. Abimael Guzmán b. Tupac Amaru c. Raul Sendic d. Juan Manuel Santos

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 10_10e 89. Which of the following were destroyed primarily through massive arrests, based on information gleaned from interrogations? a. The Naxalites b. The NPA c. FARC d. The Tupamaros 90. Which of the following is an Italian Marxist terrorist group that had its most effective operations from 1975 to 1990? a. Red Army Faction b. New People’s Army c. Red Brigades d. Tupamaros 91. Which of the following eliminates opposition when a government is either unable or unwilling to do so? a. Death squads b. The Mujahedin c. The Bandas Criminales d. The Red Brigades 92. Which of the following has led to the growth of left-wing movements in India? a. Economic disparity b. Religious strife c. Territorial issues d. Politics 93. The MeK was founded in 1965 for the purpose of overthrowing which government? a. Pakistani b. American c. Iranian d. British 94. In which year did the United States grant independence to Philippines? a. 1997 b. 1982 c. 2001 d. 1946 95. In which Latin American city did the Tupamaros operate solely? a. Lima b. Asuncion c. Montevideo d. Rio de Janeiro Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 10_10e Answer Key 1. True 2. True 3. True 4. False 5. True 6. True 7. True 8. False 9. True 10. False 11. True 12. True 13. False 14. True 15. False 16. b 17. a 18. a 19. c 20. a 21. b 22. a 23. d 24. b 25. b 26. c

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 10_10e 27. b 28. c 29. a 30. a 31. b 32. c 33. a 34. b 35. d 36. b 37. c 38. b 39. b 40. a 41. c 42. b 43. c 44. d 45. a 46. d 47. c 48. b 49. b 50. a 51. d 52. b 53. d 54. b Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 10_10e 55. a 56. a 57. a 58. d 59. c 60. c 61. a 62. c 63. a 64. a 65. d 66. d 67. a 68. c 69. b 70. c 71. a 72. b 73. a 74. b 75. c 76. b 77. c 78. a 79. a 80. d 81. a 82. a Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 10_10e 83. b 84. c 85. a 86. c 87. a 88. a 89. d 90. c 91. a 92. a 93. c 94. d 95. c

Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 11_10e Indicate whether the statement is true or false. 1. Although the Taliban is most closely associated with Afghanistan, its core emerged from Saudi Arabia. a. True b. False 2. The nature of Jihadi Salafism changed as bin Laden and Zawahiri lost operational power. a. True b. False 3. In practice, AQI was an extension of al Qaeda. a. True b. False 4. Al Qaeda, ISIS, and a number of other militant groups follow a puritanical strain of Islam known as Jihadi Salafism. a. True b. False 5. The Muslim Brotherhood was formed in Afghanistan. a. True b. False 6. Osama bin Laden was the son of Mohammed bin Laden, a wealthy construction executive who worked closely with the Saudi royal family. a. True b. False 7. The emergence of ISIS was not a surprise to people in the West. a. True b. False 8. All types of fanatics follow the Jihadi Salafist path. a. True b. False 9. The present-day revolt in Thailand is smaller but more united than the failed revolt that occurred 40 years ago. a. True b. False 10. Jihadi Salafism represents a minority and frequently internally condemned interpretation of Islam. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 11_10e 11. Diverse al Qaeda movements have appeared in different parts of the world, and their effectiveness is growing. a. True b. False 12. Al Qaeda’s origins can be traced to the Cold War. a. True b. False 13. Most Muslims, including a large number of Jihadi Salafists, have denounced ISIS. a. True b. False 14. Lashkar-e-Taiba (LeT) seems to be emerging as a new global jihadist organization working in conjunction with al Qaeda. a. True b. False 15. Dr. Ayman al Zawahiri was born into a prominent Egyptian family in 1951. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. After the dismantlement of AQIM, the dissidents joined other breakaway organizations, such as _________. a. ISIS b. MUJWA c. LeT d. AQAP 17. Which of the following is the major power broker in Pakistan? a. ISI b. Muslim Brotherhood c. Haqqani network d. LeT 18. Who went on a shooting spree at Ford Hood, Texas, on November 5, 2009? a. Aby Sulyman al Jazairi b. Nidal Malik Hasan c. Abdullah Azzam al Saudi d. Mokhtar Belmokhtar

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 11_10e 19. Who of the following persuaded AQI to form an Islamic state with support from al Qaeda? a. Sayyid Qutb b. Ayman al Zawahiri c. Abu Basir al Tartusi d. Abu Musab al Zarqawi 20. Who of the following was an Egyptian educator who called for the overthrow of non-Islamic governments and the imposition of purified Islamic law based on the previous puritanical reformers? a. Mohammed ibn Abdul Wahhab b. Abu Basir al Tartusi c. Sayyid Qutb d. Taqi al Din ibn Taymiyyah 21. Which of the following countries is not a major crisis point for Jihadi Salafist groups? a. Japan b. Thailand c. Pakistan d. Indonesia 22. The historical path of Jihadi Salafism can be traced from ibn Taymiyya through _____________. a. Wahhab b. Qutb c. Maqdisi d. Tartusi 23. Which of the following is the military code name for the January-February offensive in the 1991 Gulf War? a. Desert Storm b. Desert Shield c. Operation Iraqi Liberation d. EIJ 24. Who of the following founded al Qaeda in Iraq? a. Mullah Omar b. Osama bin Laden c. Abu Musab al Zarqawi d. Sayyid Imam al Sharif 25. Who of the following was the leader and cofounder of AQAP? a. Nasir al Wuhayshi b. Osama bin Laden c. Qasim al Raymi d. Anwar al Awlaki

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 11_10e 26. Who did ISIS declare the new caliph on the group’s proclamation of restoration of the caliphate? a. Abu Bakr al Baghdadi b. Osama bin Laden c. Abu Mohammed al Jawlani d. Abdul Rehman 27. On May 1, 2011, whose compound was attacked by the U.S. Navy SEALs? a. Aby Sulyman al Jazairi b. Osama bin Laden c. Abdullah Azzam al Saudi d. Abdul Rehman 28. Who of the following is a religious reformer who wanted to purge Islam of anything beyond the traditions accepted by Mohammed and the four Rightly Guided caliphs? a. Mohammed ibn Abdul Wahhab b. Abu Basir al Tartusi c. Sayyid Qutb d. Taqi al Din ibn Taymiyyah 29. From which of the following did Indonesia gain its independence after World War II? a. France b. The United States c. The Netherlands d. Great Britain 30. According to Stern and Berger, which of the following is the cause of fighting between ISIS and al Qaeda core? a. Dispute between leaders of the group b. Declaration of ISIS to create the caliphate c. Al Qaeda’s claim of ISIS being an illegal group d. Most personnel preferring ISIS over al Qaeda 31. What is the name of the organization created by Osama bin Laden and Ayman al Zawahiri that represents a variety of Jihadist groups? a. Al Qaeda b. World Muslim Front against Heretics c. World Islamic Front against Jews and Crusaders d. Jihadi Salafism 32. Many Indonesian jihadist movements had been trained in the mujahedeen camps of: a. Egypt b. Afghanistan c. Saudi Arabia d. Pakistan Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 11_10e 33. Which of the following is a do-it-yourself manual for global terrorism, written by Abu Musab al Suri? a. The Management of Savagery b. The Mini-Manual for the Urban Guerrilla c. The Turner Diaries d. A Call to Global Islamic Resistance 34. Who see themselves as the only “true” Muslims, and have assumed the authority to denounce fellow Muslims as “heretics” if they disagree with the theology? a. Shi’ites b. Sunnis c. Salafis d. Caliphs 35. Which of the following groups called on Muslims throughout the world to come to the caliphate? a. Al Qaeda b. AQIM c. ISIS d. Taliban 36. Zawahiri provided core leadership for operations of which of the following terrorist groups in the tribal areas of Pakistan? a. Taliban b. ISIS c. Al Qaeda d. ABM 37. Abu Bakr al Baghdadi entered the Syrian civil war in 2010 and changed ISI to which of the following? a. ISIS b. Al Qaeda c. AQI d. AQIM 38. In 2013, which of the following Jihadi Salafist group accounted for 25 percent of all terrorist attacks? a. Jabhat al Nusra b. al Shabab c. ISIS d. Taliban

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 11_10e 39. Which of the following, written by Abu Bakr Naji, is a guide for recreating the caliphate while terrorizing enemies without and within? a. The Management of Savagery b. The Mini-Manual for the Urban Guerrilla c. The Turner Diaries d. A Call to Global Islamic Resistance 40. Bin Laden officially declared war on the United States in which year? a. 1996 b. 1998 c. 1992 d. 1990 41. Which of the following groups is responsible for the 2008 terrorist attacks in Mumbai? a. Al Qaeda b. AQAP c. LeT d. Taliban 42. Who of the following joined President George W. Bush in an interfaith prayer service shortly after 9/11, and inspired Nidal Malik Hasan? a. Anwar al Awlaki b. Qasim al Raymi c. Ibrahim al Asiri d. Nasir al Wuhayshi 43. Which of the following Islamic groups governed Afghanistan from 1996 to 2001? a. ISIS b. Taliban c. PIJ d. Al Qaeda 44. According to Bunzel (2015), who should ISIS jihadists kill because they are apostates? a. Shi’ites b. Sunnis c. Salafis d. Hindus 45. Which of the following is a major LeT terrorist operation? a. September 11 attacks (2001) b. Rizal Day bombings (2000) c. Serial bombing in Delhi (2005) d. U.S. Embassy bombings in Tanzania (1998) Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 11_10e 46. Which of the following was formed with the purpose of bringing Indonesia under strict Islamic law? a. MNLF b. Jamaat Islamiyya c. Lashkar Jihad d. ISIS 47. Three recent terrorist groups have surfaced in the Philippines: the Moro National Liberation Front (MNLF), the Abu Sayyuf, and _________________________________. a. Moro Islamic Liberation Front (MILF) b. Muslim Brotherhood c. Jamaat Islamiyya d. Pattani United Liberation Organization 48. Which civil war did ISI join in April 2013? a. Saudi Arabian b. Indian c. Algerian d. Syrian 49. Who of the following was sent to Syria by Abu Bakr al Baghdadi with instructions to create an ISI front in Syria? a. Abu Musab al Zarqawi b. Osama bin Laden c. Abu Mohammed al Jawlani d. Abdul Rehman 50. Who of the following is a known for perfecting chemical bombs and was behind several regional and international attempted murders? a. Ibrahim al Asiri b. Anwar al Awlaki c. Abu Basir al Tartusi d. Abu Bakr Naji 51. Which of the following was formed in 1968 to create a Muslim state through armed struggle in India? a. The Pattani United Liberation Organization (PULO) b. Lashkar-e-Taiba (LeT) c. Al Qaeda d. The Islamic State of Iraq and al Sham (ISIS) 52. Who of the following was also known as Dr. Fadl and was one of Egypt’s leading militants in the 1970s? a. Mullah Omar b. Sayyid Imam al Sharif c. Abdullah Azzam d. Ayman al Zawahiri Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 11_10e 53. Although Thailand is dominated by Buddhism, what is the primary religion of the three most southern states? a. Hinduism b. Islam c. Shinto d. Christianity 54. Which of the following complements the BRN-C with 40 active cells in Thailand, as well as has contacts with Jamaat Islamiyya in Indonesia and the Moro Islamic Liberation Front in the Philippines? a. BRN-A b. AQIM c. LeT d. GMIP 55. Which of the following runs its own militias, shadow governments, protection rackets, legitimate businesses, and terrorist groups? a. ISI b. Muslim Brotherhood c. The Haqqani network d. ISIS 56. Which of the following is the Pakistani domestic and foreign intelligence service that was created by the British in 1948? a. CIA b. ISI c. AQIM d. ISIS 57. The AQAP is a splinter group of which of the following terrorist organizations? a. Al Qaeda b. Hezbollah c. Hamas d. LeT 58. After setbacks by the Mongols and the Crusaders, who rediscovered” ibn Taymiyya while preaching puritanical reform in Arabia? a. Mohammed ibn Abdul Wahhab b. Abu Mohammed al Maqdisi c. Abu Basir al Tartusi d. Taqi al Din ibn Taymiyyah

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 11_10e 59. Al Qaeda was created during the ____________. a. India-Pakistan War b. Soviet-Afghan War c. World War II d. World War I 60. Which country did the Soviet Union invade in 1979? a. Afghanistan b. China c. Somalia d. Iran 61. Which of the following is NOT one of the concepts for Jihadi Salafi members of ISIS? a. Associate with all Muslims b. Root out “traitors” to Islam c. Base governments on a Salafi interpretation of Islamic law d. Eliminate any resistance to narrow theology 62. Which of the following declared its independence from al Qaeda’s core and was the most active Jihadi Salafist group in 2013? a. AQAP b. AQIM c. ISIS d. Taliban 63. Who formed a militant wing of the Muslim Brotherhood? a. Mohammed ibn Abdul Wahhab b. Osama bin Laden c. Abu Basir al Tartusi d. Sayyid Qutb 64. Al Qaeda in the Islamic Maghreb (AQIM) began as an offshoot of which war? a. The Algerian Civil War b. The Soviet-Afghan War c. The Iraq-Iran War d. The Six-Day War 65. Which organization was founded in 1928 to recapture the religious purity of the period of Mohammed and the four Rightly Guided caliphs? a. ISIS b. Al Qaeda c. Moro National Liberation Front d. Muslim Brotherhood Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 11_10e 66. Who of the following was a Muslim religious reformer in the time of the Crusades and a massive Mongol invasion? a. Mohammed ibn Abdul Wahhab b. Abu Basir al Tartusi c. Sayyid Qutb d. Taqi al Din ibn Taymiyyah 67. Who was arrested in 1954 after the Brotherhood tried to overthrow the Egyptian government, but was released in 1964 because of health problems? a. Sayyid Qutb b. Al Suri c. Abu Basir al Tartusi d. Abu Bakr Naji 68. According to Chalk, LeT and al Qaeda seem to be linked through ___________. a. Haqqani network b. bin Laden c. Afghanistan d. ISI 69. According to Frontline, bin Laden called for a guerrilla campaign against Americans in which country? a. Afghanistan b. Pakistan c. Saudi Arabia d. Iran 70. Which of the following terrorist groups currently presents the greatest international threat? a. AQAP b. AQIM c. AQI d. AQM 71. The Muslim Brotherhood is an organization founded by _________. a. Sayyid Qutb b. Al Suri c. Haqqani network d. Hassan al Banna 72. Which of the following is leading the insurgency in Thailand, and carries a jihadist agenda? a. BRN-C b. AQIM c. LeT d. GMIP Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 11_10e 73. Which of the following groups defines itself as the Palestinian branch of the Muslim Brotherhood and has rejected the multinational approach in favor of creating a Muslim Palestine? a. Hamas b. Hezbollah c. Al Qaeda d. ISIS 74. Which of the following is The Ghazi Brigades are more closely allied with than any of Pakistan’s other terrorist groups? a. The Pakistani Taliban b. The Lashkar-e-Taiba (LeT) c. The Pakistan People’s Party d. The Asian Tigers 75. In August 1998, bin Laden’s terrorists bombed the U.S. embassies in Nairobi, Tanzania, and ________. a. Kuwait b. Sudan c. Kenya d. Saudi Arabia 76. In 1981, Egyptian police to arrest dissidents from all over Egypt after the assassination of ___________. a. Anwar Sadat b. Gamal Abdel Nasser c. Hosni Mubarak d. Muhammad Naguib 77. According to Shaul Shay, which of the following did mujahedeen groups continues to struggle with in Afghanistan? a. Economic status of the country b. Defense of the country c. Control of the country d. Media of the country 78. Which of the following is a jihadist group grew from the tangled political situation in Yemen? a. AQIM b. FATA c. AQAP d. ISI

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 11_10e 79. Who of the following transformed ISI into a Che Guevara-styled guerrilla army? a. Abu Bakr al Baghdadi b. Abu Omar al Baghdadi c. Abu Mohammed al Jawlani d. Abu Sulyman al Jazairi 80. What was the name of the defensive phase of the international coalition created by President George H.W. Bush after Iraq invaded Kuwait on August 2, 1990? a. Desert Storm b. Desert Shield c. Operation Iraqi Liberation d. EIJ 81. After the U.S.-led offensive against Afghanistan in 2001, bin Laden and Zawahiri indirectly influenced bombings in which of the following cities in 2004? a. Madrid b. Yemen c. Paris d. New York 82. Which of the following is a family in the tribal area of Pakistan that has relations with several militant groups and the ISI? a. Salafism Network b. ISIS Network c. Haqqani Network d. Benghazi Network 83. Which of the following is located in Islamabad and taught militant theology to women? a. Faisal Mosque b. Red Mosque c. Aziz Masjid d. Jama Masjid 84. Which of the following groups was NOT a target for Baghdadi’s campaign for building al Nusra’s strength? a. Government leaders b. Military commanders c. Off-duty soldiers d. Foreign officials

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 11_10e 85. Who was the spiritual mentor of bin Laden? a. Sayyid Qutb b. Abdullah Azzam c. Mullah Omar d. Abu Mohammed al Maqdisi 86. Who was the leader of the Taliban? a. Sayyid Qutb b. Osama bin Laden c. Mullah Omar d. Abu Mohammed al Maqdisi 87. Ansar Bayt al Maqdis (ABM) was a jihadist extremist militant group based in which country? a. Afghanistan b. Pakistan c. Syria d. Egypt 88. Who of the following wrote Milestones in 1965? a. Abdullah Azzam b. Sayyid Qutb c. Sayyid Imam al Sharif d. Mullah Omar 89. The lengthy Jihadi Salafist treatise, A Call to Global Islamic Resistance is written by ______. a. Sayyid Qutb b. Abu Musab al Suri c. Abu Basir al Tartusi d. Taqi al Din ibn Taymiyya 90. In which year, under the watchful eye of Pakistani Inter-Service Intelligence, was Lashkar-e-Taiba (LeT) created? a. 1990 b. 1991 c. 1993 d. 1995 91. According to Chalk, which of the following terrorist groups may be operating with al Qaeda, sharing a common ideology? a. Taliban b. Lashkar-e-Taiba c. AQAP d. ISIS Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 11_10e 92. In an analysis of terrorism in Indonesia, who claims that jihadist groups began forming in the early 1990s? a. Sayyid Qutb b. Al Suri c. Zachary Abuza d. Zawahiri 93. Who converted back to Islam and denounced violent radicalism while in jail? a. Sayyid Qutb b. Abdullah Azzam c. Sayyid Imam al Sharif d. Abu Mohammed al Maqdisi 94. In the 1980s and 1990s, American right-wing extremist Louis Beam championed a concept called ______________. a. centralized leadership b. leaderless resistance c. umbrella leadership d. focused resistance 95. According to the scholarly research, which of the following is important for recruitment in ISIS? a. Social media b. Education c. Socioeconomic status d. Gender

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 11_10e Answer Key 1. False 2. True 3. False 4. True 5. False 6. True 7. False 8. False 9. True 10. True 11. True 12. True 13. True 14. True 15. True 16. b 17. c 18. b 19. b 20. c 21. a 22. a 23. a 24. c 25. a 26. a

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 11_10e 27. b 28. a 29. c 30. b 31. c 32. b 33. d 34. c 35. c 36. d 37. a 38. a 39. a 40. a 41. c 42. a 43. b 44. a 45. c 46. b 47. a 48. d 49. c 50. a 51. a 52. b 53. b 54. d Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 11_10e 55. d 56. b 57. a 58. a 59. b 60. a 61. a 62. c 63. d 64. a 65. d 66. d 67. a 68. a 69. c 70. a 71. d 72. a 73. a 74. a 75. c 76. a 77. c 78. c 79. a 80. b 81. a 82. c Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 11_10e 83. b 84. d 85. b 86. c 87. d 88. b 89. b 90. c 91. b 92. c 93. c 94. b 95. a

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 12_10e Indicate whether the statement is true or false. 1. The American prison system is not a prime area of recruitment of homegrown jihadists. a. True b. False 2. The United States experienced more domestic terrorism in the 1970s than it has in the first decade of the twentyfirst century. a. True b. False 3. Homegrown terrorism is a uniquely American problem, limited to radical Islam. a. True b. False 4. Vigilante terrorism stems from extremist right-wing views. a. True b. False 5. Many white supremacists either are motivated by religion or use it to manipulate followers. a. True b. False 6. Christian Identity is based on the premise that White men, women, and children are the only people created in the image of God. a. True b. False 7. Antiabortion violence is a product of right-wing terrorism. a. True b. False 8. The Earth Liberation Front (ELF) migrated from the United States to Europe. a. True b. False 9. The election of President Barack Obama impacted right-wing and antigovernment extremism. a. True b. False 10. The Earth Liberation Front (ELF) and the Animal Liberation Front (ALF) do not engage in sabotage and property destruction. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 12_10e 11. According to the Constitution, people are free to hold extremist beliefs. a. True b. False 12. Racism is at the heart of all right-wing terrorism. a. True b. False 13. Leftist movements have largely given way to single-issue groups. a. True b. False 14. The United States has a long history of political violence that has always been characterized as terrorism. a. True b. False 15. Right-wing terrorist groups dominated terrorism in the United States from 1967 to 1985. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Militias that were ignored historically, gained media and government attention after being linked with which incident? a. 9/11 attacks b. Oklahoma City Bombings c. Bali Bombings d. US Embassy Bombings 17. Who of the following calls for a racial holy war (RAHOWA)? a. Creatorists b. Jihadists c. Jews d. Muslims 18. Monkey wrenching has become a key tactic of _________________. a. ecoterrorists b. jihadist terrorists c. narcoterrorists d. cyberterrorists

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 12_10e 19. In paper terrorism, sovereign citizens use false documents to NOT clog which of the following processes? a. Legal b. Financial c. Educational d. Bureaucratic 20. Who of the following was the leader of The Order and was killed by the FBI in a shoot-out in 1984? a. Robert Matthews b. Bedford Forrest c. Ben Klassen d. William Pierce 21. “We must secure the existence of our people and a future for white children” is commonly referred to as _______. a. Christian Identity b. The Order c. Fourteen Words d. Creativity 22. Who was one of the founders of the Ku Klux Klan? a. William Pierce b. William Potter Gale c. Nathan Bedford Forrest d. Richard Butler 23. Which of the following books, written by William Luther Pierce, is considered to be a how-to manual for lowlevel terrorism? a. The Anarchist Cookbook b. Hunter c. The Turner Diaries d. Minimanual of the Urban Guerrilla 24. According to Denson, most violence associated with ecoterrorism has taken place in the American a. West b. North c. South d. East

.

25. Which of the following groups would NOT be classified as left-wing criminal extremism? a. ALF b. The KKK c. ELF d. Earth First! Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 12_10e 26. Which of the following groups is classified as left-wing extremist? a. Animal Liberation Front b. Sovereign citizen movement c. The Creativity Movement d. Militant survivalists 27. Which of the following is NOT one of the tactics used in violent antiabortion attacks? a. Harassment b. Arson c. Kidnapping d. Assault 28. Which of the following is a religion that incorporates the ancient Norse gods in a hierarchy under the Christian triune deity? a. Christian Identity b. Freewheeling Fundamentalism c. Anglo-Israelism d. Nordic Christianity 29. Which of the following causes has been at the heart of domestic terrorism? a. Fear b. Political agenda c. Racism d. Religion 30. Who of the following is the right-wing extremist known for bombing the Atlanta Olympics, a gay nightclub, and an abortion clinic? a. Richard Butler b. Eric Rudolph c. Robert Matthews d. Andrew MacDonald 31. Adherents of which movement believe that White Protestants of Western European origins are the true descendants of Israelites? a. Christian Identity b. Freewheeling Fundamentalism c. Anglo-Israelism d. Nordic Christianity

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 12_10e 32. David Nice (1988) found that there was no relationship between abortion clinic bombings and ________. a. social standing b. religious ideology c. economic deprivation d. cultural beliefs 33. Who was the American captured by the U.S. forces while fighting for the Taliban in 2001? a. John Walker Lindh b. Adam Gadahn c. Robert Mueller d. James Lutz 34. According to the extremist right, which of the following is in a conspiracy with Jewish bankers to create a New World Order in which Jews control the international monetary system? a. The government b. FBI c. United Nations d. WHO 35. Which of the following is NOT one of Brent Smith’s categories of terrorism? a. Right-wing extremists b. Left-wing and single issue c. International d. Transnational 36. In June 2006, Joint Terrorism Task Force (JTTF) officers arrested a group of jihadists in Miami and Atlanta who were plotting to blow up the . a. JFK Airport b. Pentagon c. New York Subway system d. Sears Tower 37. Between 1995 and 1999, which type of terrorism contributed to damages to farms and animal research laboratories that totaled to $28.8 million? a. Ecoterrorism b. Transnational terrorism c. Vigilante terrorism d. International terrorism

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 12_10e 38. What has been an important factor in America terrorism? a. Racism b. Religion c. Extremism d. Gun violence 39. Sovereign citizens do engage in which of the following activities? a. Writing cheques to terrorist groups b. File false liens against citizens c. Charge minimal attendance fees d. Cause riots in the streets 40. People who believe that they are not subject to the laws and regulations of the United States are known as ____________. a. sovereign locals b. sovereign citizens c. sovereign patriots d. sovereign loyalists 41. Which of the following concepts predated Christian Identity and is the basis for most Christian Identity beliefs? a. Anglo-Israelism b. Freewheeling Fundamentalism c. The New World Order d. Nordic Christianity 42. Which of the following incidents is an example of left-wing extremism? a. Ruby Ridge Siege b. Oklahoma City bombing c. Tree Spiking d. Shooting of two West Memphis police officers by sovereign citizens 43. Which of the following groups is NOT classified as right-wing extremist? a. Skinheads b. Animal Rights Militia c. The Aryan Nations d. The Christian Identity 44. The Joint Terrorism Task Force (JTTF) officers arrested some jihadists near New York who were planning to bomb the Times Square. According to FBI, this incident will be considered as ______________. a. left-wing extremism b. international terrorism c. domestic terrorism d. right-wing extremism Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 12_10e 45. Who of the following was the American spokesperson for al Qaeda and was killed by a drone strike in January 2015? a. John Walker Lindh b. Eric Rudolph c. Adam Gadahn d. Michael Griffin 46. According to National Police Foundation, unauthorized, armed, and private paramilitary groups are known as . a. jihadists b. eco-terrorist groups c. sovereign citizens d. militias 47. Over the past decade law enforcement agencies are making greater strides in understanding ___________. a. domestic terrorism b. Islamic fundamentalism c. Jihadist Salafism d. international terrorism 48. Which of the following groups is NOT classed as left-wing extremist? a. REAR b. Christian Identity c. Earth First! d. The Earth Liberation Front (ELF) 49. Right-wing extremists believed communism to be the primary conspiratorial force, but after the fall of the Soviet Union, it became the __________________________. a. United Nations b. government c. police d. FBI 50. Which of the following refers to small acts of sabotage against companies undertaking projects in undeveloped areas? a. Monkey wrenching b. Paper terrorism c. Paper violence d. Monkey sabotage

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 12_10e 51. Which of the following factors dominates the left-wing movement today? a. Single-issue violence b. Political violence c. Religious violence d. Economic violence 52. Which of the following is an African American group that does not recognize the validity of the U.S. government? a. Anglo-Israelism b. Moorish Nation c. Hamas d. Nordic Christianity 53. What was the original purpose of Nathan Bedford Forrest to establish the KKK? a. Promote racism b. Promote communism c. Preserve southern culture d. Terrorise African Americans 54. According to Freilich and Pridemore, 40 percent of which of the following buildings in the United States had experienced some form of attack, vandalism, or harassment? a. lumberyards b. abortion clinics c. chicken factories d. animal testing labs 55. The White Man’s Bible, emphasizing on racial purity, was published by ________. a. Jihadists b. Jews c. Creatorists d. Sovereign citizens 56. The popular work Dreadnought: Britain, Germany and the Coming of the Great War was written by who of the following? a. William Pierce b. Nathan Bedford Forrest c. Ben Klassen d. Robert Massie

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 12_10e 57. Who wrote the fictional novel The Monkey Wrench Gang? a. Edward Abbey b. Eric Rudolph c. William Pierce d. Robert Matthews 58. In religious derivation, Creativity rejects Judaism and ___________. a. Christianity b. Islam c. Norse Christianity d. Hebrews 59. In the United States, if the criminal suspects are from Los Banditos or Hell’s Angels, it is called ________. a. gang war violence b. domestic terrorism c. vigilante terrorism d. motocycle gang violence 60. PEN1 formed an alliance with which of the following groups to form nation’s largest racist prison gang? a. Aryan Brotherhood b. The KKK c. Moorish Nation d. Brüder Schweigen 61. Who of the following concluded that antiabortion violence appears in areas of rapid population growth where the abortion rate is high? a. William Potter Gale b. Nathan Bedford Forrest c. Ben Klassen d. David Nice 62. As Donald Black (2004) states, the three main ingredients of modern terrorism are: an angry group of people or sometimes even a single enraged individual; access to technology that can cause massive casualties; and __________. a. the ability to travel b. the ability to stay in one place c. the ability to socialize d. the ability to be by themselves

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 12_10e 63. Who founded the Aryan Nations? a. Nathan Bedford Forrest b. William Potter Gale c. Richard Butler d. Wesley Swift 64. When arrested, the Oklahoma City Bomber was carrying a copy of ___________. a. The Anarchist Cookbook b. The Monkey Wrench Gang c. The Turner Diaries d. Minimanual of the Urban Guerrilla 65. A report issued by which of the following departments indicated that right-wing extremists would be anxious to recruit military veterans returning from Iraq and Afghanistan? a. DHS b. FBI c. CIA d. NSA 66. Which of the following grew from the punk rock scene in southern California in the 1980s? a. The KKK b. The Order c. PEN1 d. Moorish Nation 67. According to Hirch-Hoefler, how much percentage of Radical Environmentalists and Animal Rights (REAR) activities can be classified as terrorism? a. More than 10 percent b. Less than 10 percent c. More than 20 percent d. Less than 20 percent 68. Which of the following began drawing attention after 9/11 attacks? a. Homegrown jihadist terrorism b. Single-issue terrorism c. Paper terrorism d. Cyberterrorism 69. Which of the following is NOT a type of terrorism outlined by Ted Robert Gurr? a. Vigilante terrorism b. Insurgent terrorism c. International terrorism d. Transnational terrorism Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 12_10e 70. Which novel inspired ecoterrorists? a. The Monkey Wrench Gang b. The Turner Diaries c. The Anarchist Cookbook d. Hunter 71. Sovereign citizens have had violent confrontations with police officers and other government officials, but their most common activity is __________. a. paper terrorism b. cyberterrorism c. narcoterrorism d. bombing federal buildings 72. Which of the following are young individuals or groups that embrace racial hatred and white supremacy? a. Knight Riders b. Skinheads c. Militias d. Sovereign citizens 73. According to the FBI, supporters of terrorism related to ecology and animal rights joined opponents of genetic engineering in the United Kingdom in 1992 to form a new group called _______. a. Earth Liberation Front (ELF) b. Animal Liberation Front (ALF) c. Earth First! d. Radical Environmentalists and Animal Rights (REAR) 74. Which of the following incidents is an example of right-wing extremism? a. The 2010 attack against the IRS facility in Austin, TX b. The 1987 destruction of animal research labs at UC Davis c. The 1950 attempt by Puerto Rican nationalists to assassinate President Truman d. The 1984 Rajneeshee bioterror attack 75. Homegrown Islamic extremists are Americans or American residents who adopt the __________. a. racist philosophy b. sexist philosophy c. jihadist philosophy d. sovereign philosophy

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 12_10e 76. Which of the following is the phrase used by President George H.W. Bush to describe the world after the fall of the Soviet Union? a. New World Order b. Cold War Victory c. New Generational Order d. Free World Order 77. Violent radicals broke away from student protest movements fueled by dissatisfaction with which war? a. Vietnam War b. Civil War c. Cold War d. World War II 78. For the most part, The Turner Diaries is a diatribe against minorities and ______. a. Muslims b. Jews c. Christians d. African Americans 79. Believers of which of the following contended that Jews were spawned by Satan and that non-Whites evolved from animals? a. Christian Identity b. Neopaganism c. Anglo-Israelism d. Creativity 80. Which of the following is a white supremacist organization founded by William Pierce? a. The KKK b. Christian Identity c. Aryan Nations d. National Alliance 81. The major problem of the intellectual elites controlling the student protest movement led to the demise of which of the following in the United States? a. Sovereign citizen movement b. Right-wing terrorism c. Left-wing terrorism d. Militia movement

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 12_10e 82. After the fall of original Ku Klux Klan in the wake of a criminal scandal, the modern KKK grew after which war? a. American Civil War b. World War I c. War of 1812 d. World War II 83. The first terrorists of the Ku Klux Klan were known as ________. a. The Knight Riders b. Whiskey Rebels c. Invisible Army d. Zoot Suits 84. Which of the following is the term used to describe white supremacists who either selectively use Bible passages or personal scriptural interpretations to justify the patriot agenda? a. Christian Identity b. Freewheeling Fundamentalism c. Anglo-Israelism d. Nordic Christianity 85. Who wrote the 1985 novel, The Turner Diaries, under the pseudonym Andrew MacDonald? a. William Potter Gale b. Nathan Bedford Forrest c. Ben Klassen d. William Pierce 86. Who was the founder of the Creativity movement? a. William Potter Gale b. Nathan Bedford Forrest c. Ben Klassen d. William Pierce 87. The Ku Klux Klan was created in the wake of which war? a. American Civil War b. Spanish-American War c. War of 1812 d. World War I

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 12_10e 88. According to FBI classification, domestic terrorism involves violent political extremism, lone-wolf activities, and _____. a. single-issue terrorism b. religious ideology c. insurgency d. radicalization 89. Which of the following claims that White people must struggle to defeat Jews and non-White races? a. Christian Identity b. Creationism c. Creativity d. Nordic Christianity 90. The United States has experienced two styles of homegrown attacks or attempted attacks—one involves individuals who become radicalized from personal experiences and the other involves some type of _____________________. a. religious connection b. foreign connection c. terrorist connection d. criminal connection 91. Who of the following merge into other forms of extremism and no one particular type of ideology? a. Sovereign citizens b. The KKK c. Creatorists d. Militias 92. In October 2003, law enforcement officers found small Cincinnati grocery stores raising millions of dollars for Hamas through __________________. a. price fraud b. money laundering c. credit card skimming d. counterfeiting 93. According to Christopher Hewitt, what is the most effective method of preventing terrorism? a. Extreme government surveillance b. Proactive lock-up c. Community policing d. Monitored Internet activities

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 12_10e 94. Which is the violent right-wing racist group of the 1980s that killed Jewish radio talk show host Alan Berg? a. Christian Identity b. The Order c. Fourteen Words d. Creativity 95. In the late 1980s, how many definitions of terrorism was Alex Schmid able to late? a. 45 b. 74 c. 109 d. 120

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 12_10e Answer Key 1. False 2. True 3. False 4. True 5. True 6. True 7. True 8. False 9. True 10. False 11. True 12. False 13. True 14. False 15. False 16. b 17. a 18. a 19. c 20. a 21. c 22. c 23. c 24. a 25. b 26. a

Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 12_10e 27. c 28. d 29. c 30. b 31. a 32. c 33. a 34. c 35. d 36. d 37. a 38. a 39. b 40. b 41. a 42. c 43. b 44. c 45. c 46. c 47. a 48. b 49. a 50. a 51. a 52. b 53. c 54. b Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 12_10e 55. c 56. d 57. a 58. a 59. d 60. a 61. d 62. a 63. c 64. c 65. a 66. c 67. b 68. a 69. c 70. a 71. a 72. b 73. a 74. a 75. c 76. a 77. a 78. b 79. a 80. d 81. c 82. d Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 12_10e 83. a 84. b 85. d 86. c 87. a 88. a 89. c 90. b 91. a 92. a 93. c 94. b 95. d

Copyright Cengage Learning. Powered by Cognero.

Page 19


Name:

Class:

Date:

Chap 13_10e Indicate whether the statement is true or false. 1. According to Robert Poole, aviation security remains inadequate even after the 9/11 disasters. a. True b. False 2. Less than half of the DHS agencies have police power. a. True b. False 3. The healthcare system and energy sector are also part of the infrastructure of homeland security. a. True b. False 4. National defense and security intelligence gathering are required to demonstrate a reasonable suspicion of criminal activity before they may collect information. a. True b. False 5. Redirecting military and police forces is an essential part of developing a system to protect the nation. a. True b. False 6. The Secret Service’s only function is providing presidential security. a. True b. False 7. In the 1950s, the CIA tested drugs on Americans without their consent or knowledge. a. True b. False 8. U.S. Attorneys are elected by the American public, with advice and consent of the U.S. Senate. a. True b. False 9. A minimal portion of homeland security involves civic responsibility. a. True b. False 10. Essentially, mission and understanding of homeland security mean the same thing, but there are many different understandings of homeland security because agencies have differing missions. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 13_10e 11. The DOD does not assume any counterterrorist functions. a. True b. False 12. Immigration and Customs Enforcement (ICE) is DHS’s largest investigative arm. a. True b. False 13. The Transportation Security Administration is responsible for airport security. a. True b. False 14. Researchers have suggested that the problem with intelligence gathering is with the structure of the system, not with individual analysts. a. True b. False 15. The Bureau of Alcohol, Tobacco, and Firearms (ATF) has played a leading role for years in counterterrorism. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. What kind of targets do terrorists seek to strike fear into society and to feel a sense of power themselves? a. Symbolic b. Military c. Random d. Educational 17. Which of the following does NOT have a major role in preventing terrorism? a. The Department of Homeland Security b. The Department of Education c. The Department of Defense d. The Department of Justice 18. According to David Carter, intelligence works when information is based on what kind of threats? a. Potential b. Confirmed c. Political d. Intangible

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 13_10e 19. Who was the director of the FBI at the time of the 9/11 attacks? a. Thomas Pickard b. Robert S. Mueller c. Louis J. Freeh d. Floyd I. Clarke 20. COINTELPRO was the name given to which agency’s counterintelligence program? a. The FBI b. The CIA c. The NSA d. The DOD 21. Congress approved the creation of the Department of Homeland Security by uniting how many agencies? a. 22 b. 24 c. 12 d. 19 22. Which of the following describes NCISP? a. A plan to share criminal intelligence among the international law enforcement agencies. b. A plan to gather criminal intelligence from all countries. c. A plan to create a common software platform for all criminal intelligence. d. A plan to share criminal intelligence among the nation’s law enforcement agencies. 23. Bombs are one of the most frequent weapons used in terrorism. Which agency has some of the best explosives experts in the world? a. FBI b. ATF c. JTTF d. ODNI 24. When raw information is analyzed to reveal patterns of suspicious activity and behavior, vulnerable targets, and probability of attack, what is it called? a. A military intelligence product b. An intelligence product c. An intelligence system d. An intelligence model 25. JTTF agents may NOT use national security intelligence in ___________________. a. foreign operations b. terrorist identification c. domestic operations d. criminal prosecutions Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 13_10e 26. Shortly after 9/11, the IACP joined with which department to create the National Criminal Intelligence Sharing Plan? a. DOE b. DHS c. DOJ d. DOD 27. The 9/11 Commission did all of the following, except _____. a. recommending the creation of a single intelligence director b. implementing reform in the intelligence community c. recommending that federal intelligence fall under the ODNI d. clearly defining the roles of different intelligence groups 28. Scholar Stephen Flynn’s greatest criticism of homeland security is aimed at which department of the U.S. government? a. Defense b. Port security c. Justice d. CIA 29. Which entity approved the creation of the DHS in 2002? a. Congress b. The President c. Senate d. The U.S. Supreme Court 30. Which agency is responsible for setting up the HSIN? a. FBI b. DHS c. CIA d. ODNI 31. What did the Regional Intelligence Centers evolve into? a. High-Intensity Drug Trafficking Centers b. Civil Defense Units c. Regional Crime Gun Centers d. COINTELPRO

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 13_10e 32. An operation was set up to gather information from multiple sources, analyze it, and distribute it to various agencies. What was it called? a. Fusion centers b. Total information centers c. Homeland safety information networks d. Security intelligence networks 33. What is the output of information analysis known as? a. Fusion center b. Analytical product c. Intelligence product d. Fusion product 34. If a terrorist threat comes from a particular country, which of the following do the intelligence analysts need to have? a. The ability to estimate the influence of religious influences on behavior b. An advanced understanding of crime c. Skills in several physical sciences d. An understanding of symbolism 35. Under whose administration did the government begin to limit the power of intelligence operations, unintentionally hampering their effectiveness? a. Jimmy Carter b. Bill Clinton c. George W. Bush d. Ronald Reagan 36. Which President of the United States formed the Department of Homeland Security to direct and coordinate efforts to secure the mainland? a. Donald Trump b. George W. Bush c. Barack Obama d. Bill Clinton 37. What is MASINT? a. Human intelligence b. Signal intelligence c. Measures and signatures intelligence d. Mass and social intelligence

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 13_10e 38. In which year was the Regional Information Sharing System (RISS) created? a. 1983 b. 1982 c. 1973 d. 1976 39. The Armed Forces Intelligence and National Security Agency report to the ______________. a. Director of CIA b. Director of FBI c. Director of National Intelligence d. Director of DOE 40. Community policing is based on information gathered from _________________. a. Police–citizen partnerships b. Individual citizens c. Intracommunity networks d. Police–local administration partnerships 41. With the advent of radiodispatched motorized patrols, which factor became the measure of police effectiveness? a. Interagency cooperation b. Arrest statistics c. Response time d. Successful prosecutions 42. What is defined as information gathered on the reasonable suspicion that a criminal activity is occurring or is about to occur? a. Criminal intelligence b. National security intelligence c. Police intelligence d. Federal intelligence 43. Why did the counterintelligence program COINTELPRO come under congressional criticism in the early 1970s? a. It conducted medical experiments on citizens without their consent. b. It violated constitutional limitations on domestic intelligence-gathering. c. It was involved in assassination attempts on foreign leaders. d. It was infiltrated by spies from enemy countries. 44. Two types of private-sector organizations participate in homeland security. Identify one from the following. a. Businesses providing basic infrastructure b. Businesses providing security technology and service c. Businesses providing border monitoring d. Businesses providing sea navigation intelligence

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 13_10e 45. After a major gaff in foreign policy, everyone is quick to blame others. Who usually does NOT take the blame? a. Political decision makers b. Agencies c. Analysts d. Media 46. Which service provides protection to federal officials under threat from terrorism, in addition to securing the courts and apprehending escaped offenders? a. Secret Service b. FBI c. U.S. Marshals Service d. NSA 47. The Homeland Security Information Network (HSIN) is set up to connect all jurisdictions with _____________. a. real-time communication b. internal security c. streamlined processes d. a common dashboard 48. How many U.S. Attorneys are stationed throughout the United States, Puerto Rico, the U.S. Virgin Islands, Guam, and the Northern Mariana Islands? a. 90 b. 93 c. 98 d. 92 49. Many counterterrorist experts believe that the southern border will become one of the main infiltration routes for ______________. a. jihadist terrorists b. illegal immigrants c. espionage agents d. drug traffickers 50. Which of the following is NOT one of the reasons of confusion in defining Homeland Security? a. The policy guiding homeland security in the United States has not been fully developed. b. Agency leaders are not quite sure how all the missions of the various agencies fit together. c. Law enforcement and military communities are trying to find policies to define their roles. d. There was conflict between various levels of government and private industry.

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 13_10e 51. According to analysts, at the Center for Strategic and International Studies, which of the following aspects does the DHS need to improve on? a. Coordinating among government agencies b. Counterintelligence c. Cybersecurity d. Defense forces 52. In time of war, which department plays the leading role? a. Department of State b. Department of Energy c. Department of Justice d. Department of Defense 53. There is a four-step process in placing information within national and international contexts. Which of the following is NOT one of them? a. Applied information: Analysts gather information about a specific problem. b. Basic information: Analysts begin work after obtaining an in-depth, multidisciplinary education. c. Relevant information: Analysts receive information that is relevant to an existing problem. d. Analyzed information: Analysts produce intelligence based on analyzed information. 54. The confusion within the DHS centers is on which aspect of its functioning? a. Mission b. Policy c. Understanding of homeland security d. Reporting structure 55. Which of the following groups is engaged in civil defense? a. Defense contractors b. HAM radio operators c. Military operatives d. CIA agents 56. The Constitution forbids military forces from enforcing civil law except in which times? a. Declared martial law b. War c. Attempted Presidential assassination d. Natural disasters 57. Who is/are responsible for breaking some of America’s most formidable terrorist cells? a. Foreign agencies b. The general public c. Government contractors d. Police agencies Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 13_10e 58. Which of the following refers to a system of agencies and networks that gathers information about threats to the country? a. Criminal intelligence b. National security intelligence c. Police intelligence d. Federal intelligence 59. Which agency’s aim is to unite America’s national security intelligence under one umbrella? a. Office of the Director of National Intelligence b. Office of National Security c. Central Intelligence Agency d. Department of National Defense 60. Which of the following is NOT the duty of the Coast Guard? a. Protection of coastal and inland waterways b. Maintaining communication with all US vessels on the seas c. Interdiction of contraband d. Interception of terrorists and weapons on the high seas 61. Civil defense evolved slowly from civilian functions during which war? a. World War I b. The Korean War c. The Vietnam War d. World War II 62. What is an all-crimes approach to the intelligence process known as? a. Total information awareness b. Intelligence product c. Total criminal intelligence d. Fusion 63. Which agency is NOT a part of the U.S. Office of the Director of National Intelligence (ODNI)? a. State and local law enforcement b. the CIA c. National Reconnaissance Office d. the National Security Agency (NSA) 64. Which of the following is NOT part of David Carter’s “R-cubed” approach to police intelligence? a. Reassess b. Refocus c. Revise d. Reallocate

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 13_10e 65. Which of the following is the lead agency in domestic terrorism? a. CIA b. DOD c. TSA d. FBI 66. Which agency helped provide the basis for fusion centers? a. ATIX b. RIC c. HSIN d. NCISP 67. The DHS was created by Congress from which department in 2003 as a direct result of the 9/11 attacks? a. Federal Bureau of Investigation b. National Security Agency c. Office of Homeland Security d. Bureau of Alcohol, Tobacco, and Firearms 68. The ODNI is made up of the CIA, the National Security Agency, the Defense Intelligence Agency, the National Reconnaissance Office, and ______________. a. National Geological-Intelligence Agency b. National Geospatial-Intelligence Agency c. National Geographical-Intelligence Agency d. National Geothermal-Intelligence Agency 69. The Federal Bureau of Investigation (FBI) and the Bureau of Alcohol, Tobacco, and Firearms (ATF) are part of the ______________. a. Department of Homeland Security b. Department of Defense c. Department of Justice d. Department of State 70. Who fear growing power in agencies associated with homeland security, and express concern over expanding executive authority? a. Homeowners’ associations b. Bureaucracy c. Civil liberty groups d. Local militia

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 13_10e 71. Which kind of intelligence gathered to defend the nation is not subject to legal scrutiny? a. Criminal intelligence b. Technological intelligence c. Military intelligence d. National security intelligence 72. Indicators such as an increase in violent rhetoric and the appearance of extremist groups may be pointers to a certain phenomenon. What would that phenomenon be? a. A terrorist threat b. A war c. A revolution d. Martial law 73. Which of the following is NOT an example of a civil defense structure? a. Missile silo b. Private and public broadcasting c. Evacuation routes d. Fallout shelters 74. Regional intelligence centers were originally established to gather intelligence on which activity? a. Domestic terrorism b. International terrorism c. Espionage d. Drug trafficking 75. Which problem has the ODNI been able to solve by placing analysts in critical thinking training? a. Goal displacement b. Organizational stagnation c. Groupthink d. Lack of motivation 76. What is the term used to describe citizens engaging in homeland security? a. Civil defense b. Citizen surveillance c. Suspicious activity reporting d. Neighborhood watch 77. What is HIDTA? a. The High Intensity Drug Trafficking Areas b. The Homeland Informants, Drug, and Terrorist Analysis c. The Highly Impact Department for Terrorism Assessment d. The Homeland Insurgency Deterrent Training Arrangement

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 13_10e 78. Which academy operates in Glencoe, Georgia with the function of training agents and police officers for agencies that do not operate their own academy? a. FLETC b. FBI c. DOD d. CIA 79. According to Richard Best, two channels of information should be planned and developed by law enforcement. Which one of the following did he suggest? a. One channel should be aimed at the types of information police agencies collect. b. One channel should deal technology updates. c. One channel should monitor violations of law. d. One channel should be prepared to pass information along to defense sources. 80. The IACP created a committee to develop national standards for what kind of intelligence? a. Criminal b. Civil c. Law enforcement d. Investigative 81. Which counterterrorism system connects all fifty states, five territories, Washington, D.C., and fifty major urban areas? a. DHS b. ICE c. FLETC d. HSIN 82. What kind of intelligence do the state and local law enforcement agencies need to collect for the prevention of terrorism? a. Tactical b. Business c. Criminal d. Social 83. This is a type of law enforcement effort in which resources are deployed based on information gathered and analyzed from criminal intelligence. Which of the following is it? a. Fact-led policing b. Data-led policing c. Information-led policing d. Intelligence-led policing

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 13_10e 84. A criminal intelligence network has six centers. Each of these centers serves a select group of states that share criminal information with investigators on terrorism. What is this network called? a. JTTF b. NCISP c. RISS d. TCI 85. Preventing terrorism is the result of gathering and analyzing _______________. a. religious beliefs b. social attitudes c. political beliefs d. information 86. Which department is specifically responsible for protecting nuclear materials, power grids, and gas lines? a. The Department of Homeland Security (DHS) b. The Department of Defense (DOD) c. The Department of Energy (DOE) d. The Department of the Interior (DOI) 87. Which of the following is considered to be at the heart of local intelligence systems? a. Information hiding b. Information sharing c. Information coding d. Information retrieval 88. Which targets have limited military or security value to terrorists, but represent the power of the state under attack? a. Potential targets b. Critical targets c. Vulnerable targets d. Symbolic targets 89. Which of the following is one of the roles performed by the Secret Service? a. Gathering maritime intelligence b. Countering financial crime c. Monitoring narcotics trade d. Carrying out counterterrorism activities 90. According to Thomas Fingar, what is the goal of the intelligence community? a. Provision of funding for operations b. International diplomacy efforts c. Reducing uncertainty d. Controlling bureaucratic policies Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 13_10e 91. Which of the following refers to ATF’s intelligence center focused on the illegal use of firearms? a. Regional Crime Gun Center (RCGC) b. Regional Intelligence Center (RIC) c. Federal Law Enforcement Training Center (FLETC) d. Regional Information Sharing Center (RISC) 92. Under which department was the U.S. Coast Guard prior to 9/11 (except in time of war)? a. Department of Justice b. Department of Transportation c. Department of State d. Department of Labor 93. Asymmetrical war is most often waged against what kind of targets? a. Systematic b. Symbolic c. Economic d. Democratic 94. Which of the following is the greatest criticism that the Department of Homeland Security faces? a. The existence of DHS has led to worse coordination of government agencies. b. State and local agencies have no sense of their role in preventing terrorism because of actions in the DHS. c. The southern border is not secure and can become one of the main infiltration routes for jihadists. d. It failed in its attempts to coordinate criminal information gathering and intelligence analysis. 95. Intelligence gathering and academic research are similar in many ways. Which of the following statements is NOT true in this regard? a. Both move from abstract principles to reality. b. Both need basic knowledge of a field. c. In both cases, background information has direct bearing on the actual question. d. Information is divided into in-depth knowledge about a specific topic and the latest information from the discipline.

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 13_10e Answer Key 1. True 2. False 3. True 4. False 5. True 6. False 7. True 8. False 9. False 10. True 11. False 12. True 13. True 14. False 15. True 16. a 17. b 18. a 19. b 20. a 21. a 22. d 23. b 24. b 25. d 26. c

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 13_10e 27. d 28. b 29. a 30. b 31. a 32. a 33. c 34. a 35. a 36. b 37. c 38. c 39. c 40. a 41. c 42. a 43. b 44. b 45. d 46. c 47. a 48. b 49. a 50. d 51. c 52. d 53. c 54. b Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 13_10e 55. b 56. a 57. d 58. b 59. a 60. b 61. d 62. c 63. a 64. c 65. d 66. b 67. c 68. b 69. c 70. c 71. d 72. a 73. a 74. d 75. c 76. a 77. a 78. a 79. a 80. a 81. d 82. a Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 13_10e 83. d 84. c 85. d 86. c 87. b 88. d 89. b 90. c 91. a 92. b 93. b 94. c 95. c

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 14_10e Indicate whether the statement is true or false. 1. The DHS also uses technology, such as biometric measuring—identification systems based on body characteristics such as fingerprints, facial patterns, and/or DNA—to maintain records on aliens. a. True b. False 2. Homeland security is an extension of what state and local agencies are already doing. a. True b. False 3. The DHS has spared no expense in securing every U.S. seaport. a. True b. False 4. The DHS maintains terrorist watch lists. a. True b. False 5. There are no real solutions to the inherent problems associated with bureaucracies. a. True b. False 6. The most significant threat of unregulated immigration comes in the form of terrorism and organized crime. a. True b. False 7. One of the controversial issues surrounding border protection involves immigration. a. True b. False 8. If electrical grids and computers stop functioning, transportation and communication systems can shut down. a. True b. False 9. Information, energy, communication, transportation, and economic systems are unlikely terrorist targets. a. True b. False 10. The southern border is secure; DHS plans for securing the border have been more than adequate. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 14_10e 11. Police are in a perfect position to engage in intelligence-gathering activities and expand their role in national defense. a. True b. False 12. America’s power system and the technological organizations that support it are vulnerable to disruptions. a. True b. False 13. The FBI and CIA are to work separately on intelligence gathering, and are not to share information with each other. a. True b. False 14. The number of police agencies in the United States is conducive to information sharing. a. True b. False 15. Federal agencies distrust one another at times, and their failure to cooperate in some circumstances influences local police relationships. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Which of the following is a local fusion center that evaluates information gathered from a variety of governmental sources? a. JTTF b. TSC c. NSA d. FBI 17. Which of the following is a problem associated with border protection? a. Lack of funds b. Emigration issues c. Size of borders d. Lack of personnel for patrolling 18. The most effective initial method to involve local agencies into homeland security is to train officers. Which of the following is NOT in this list? a. Patrol officers b. Investigators c. Custom officers d. Narcotics officers

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 14_10e 19. The CIA was originally established at the end of which war? a. The Korean War b. The Vietnam War c. World War II d. The Cold War 20. What is the full-form of SARs? a. Suspicious Activity Reports b. Security Activity Reports c. Security Association Reports d. State Administration Reports 21. The ability to stay focused on the primary mission of the organization is called _______. a. task indicator b. task orientation c. task focus d. task goal 22. Local agencies are slowly becoming involved in homeland security. Which of the following statements is NOT true about these agencies? a. They must learn to assess terrorist threats in their jurisdictions. b. They must learn to recognize possible information that may add to national defense intelligence. c. They must develop routines to forward such information. d. They must collect critical information for law enforcement agencies. 23. According to Stephen Flynn, which of the following is one of the two crucial mistakes made by America? a. Jihadists have been allowed to enter the country. b. U.S. intelligence agencies did not share information with other countries. c. Homeland security has been unified with national security. d. The infrastructure is vulnerable to attacks. 24. Max Weber (1864–1920) was one of the founding masters of which subject? a. Economics b. Sociology c. Criminology d. Counterterrorism 25. Which of the following is NOT one of the main agencies responsible for border protection? a. Customs and Border Protection b. ICE c. FBI d. Coast Guard

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 14_10e 26. In which state is the Terrorism Screening Center located? a. South Carolina b. California c. New York d. West Virginia 27. Which of the following is the term used to describe the criminal and social actions of individuals and groups before a terrorist attack? a. Preterror indicators b. Preattack indicators c. Previolence indicators d. Preincident indicators 28. Which of the following terms refers to information that law enforcement agencies, military units, or other security forces can use to prevent an attack or operation? a. Intelligence product b. Border security c. Actionable intelligence d. Covert intelligence 29. Setting national criminal intelligence training standards is a recommendation of which of the following bodies? a. American Police Chiefs Association b. International Police Chiefs Association c. Global Intelligence Working Group d. The Department of Homeland Security 30. Law enforcement in the United States is composed of how many small to large bureaucracies? a. Over 13,000 b. Over 11,000 c. Over 10,000 d. Over 12,000 31. In which of the following incidents would the military MOST likely be engaged? a. The bombing of an American Embassy overseas b. The bombing of a U.S. federal building c. The takeover of an American high school by right-wing extremists d. Terrorist attack on the Supreme Court

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 14_10e 32. Which of the following is NOT listed as a “best practice” of security in the computer industry, as recommended by the Institute for Security Technology Studies at Dartmouth College? a. Biometric access requirements b. Update software c. Maintain firewalls d. Scan for viruses and use virus protection 33. Which agency, along with the FBI, compiles the president’s daily intelligence briefing? a. CIA b. NSA c. ATF d. DEA 34. According to the members of the lead panel at the first National Fusion Center Conference, agencies have to develop new methods of ______________. a. coordinating and communication b. coordinating and counterterrorism c. communication and counterterrorism d. communication and implementation 35. Which of the following statements is NOT true about a reaction to crisis? a. It is a critical mission of the police. b. It is an emergency function. c. It is integral to preventing terrorism and crime. d. It has little to do with the cause of the disaster. 36. In which of the following incidents would the military LEAST likely be engaged? a. A massive shutdown of the Nation’s energy systems b. Evacuating U.S. citizens from a hostile situation in another country c. A hostile takeover of an American business overseas d. Espionage on a military encampment based in the United States 37. How many U.S. seaports are at risk for a terrorist attack? a. More than 300 b. More than 20 c. More than 800 d. More than 100 38. Which of the following is a goal of the “working group”? a. Support and promote intelligence-led policing. b. Create a blueprint for security system for other countries. c. Protect right to information. d. Work on strict streamlined processes rather than innovation. Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 14_10e 39. Which department takes the fight to terrorists in other lands, rather than letting terrorists become a problem within America’s borders? a. DOD b. DHS c. FBI d. CIA 40. Intelligence and information sharing is the goal of terrorism prevention, but police agencies must also prepare to deal with _____________________. a. spies b. disasters c. educational institutions d. health care system 41. The Civil Service Reform Act, a federal law designed to prevent political interference with the decisions and actions of governmental organizations, was enacted in which year? a. 1946 b. 2003 c. 1978 d. 1967 42. Which state was granted $36,000 by homeland security to keep terrorists from infiltrating bingo halls? a. Kansas b. Kentucky c. Minnesota d. Georgia 43. Actionable intelligence is returned to the fusion centers as an intelligence product. This is delivered to _______________. a. patrol officers b. deputies c. agents d. local communities 44. In the “wedding cake” model of the American justice system, the bottom layer refers to ______________. a. misdemeanors b. serious crimes c. terrorist activities d. celebrated cases

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 14_10e 45. As American troops were preparing to enter Iraq in 2003, there was a tremendous dispute between which two U.S. entities about the validity of intelligence coming out of Iraq? a. The CIA and the military b. The FBI and the CIA c. The FBI and the military d. The NSA and the CIA 46. A manager emphasizing employee needs over a unit’s purpose is an example of which of the following processes? a. Task orientation b. Process orientation c. Mission creep d. Goal displacement 47. Which is the lead agency for counterterrorism in the United States? a. Central Intelligence Agency b. Department of Homeland Security c. Department of Defense d. Federal Bureau of Investigation 48. Which of the following can deter most terrorism? a. Military defense b. Cooperative partnerships c. Foreign assistance d. Civil defense 49. Which of the following steps is NOT a possible method for overcoming bureaucratic problems? a. Increasing information sharing through fusion centers b. Cross-border partnerships c. Re-envisioning the mission of law enforcement d. Employing the JTTF model 50. Which organization combines all levels and all types of law enforcement organizations in a single unit? a. TSC b. FBI c. JTTF d. DHS 51. Which of the following is an example of how the military might augment civil defense? a. Providing transport for emergency evacuation b. Targeting terrorists with drone technology c. Patrolling the Great Lakes for mines d. Securing military bases across country Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 14_10e 52. A mission being approved with the understanding that it is to be aborted if it cannot be done legally is an example of which of the following processes? a. Task orientation b. Process orientation c. Mission creep d. Goal displacement 53. Analysts at local fusion centers turn information into actionable intelligence and forward it to which organization? a. The NCTC b. The FBI c. The CIA d. The JTTF 54. Out of the following, who argues that by allowing unregulated flow of immigrants from the southern border, the United States will open the door to terrorist infiltration? a. Kerry Diminyatz b. Patrick Buchanan c. Peter May d. Stephen Flynn 55. A U.S. Navy SEAL team is dispatched to rescue a number of U.S diplomats being held hostage by terrorists; the team members are also asked to procure any documents they can from the location, take photos of the terrorists, and to try to turn at least one of the terrorists as an informant. Such a scenario is an example of which of the following processes? a. Task orientation b. Process orientation c. Mission creep d. Goal displacement 56. Which U.S. administration argued that counterterrorism is mainly a military problem? a. Clinton administration b. Obama administration c. Bush administration d. Trump administration 57. Which of the following scenarios would be LEAST likely to cause the President to direct the military to protect U.S. borders? a. A terrorist attack off the coast of Florida b. A shutdown of New York’s subway system c. Mass assassination of the senior members of the Presidential administration d. Terrorist hijacking a major U.S. airliner

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 14_10e 58. Which is the largest organization involved in homeland security? a. The FBI b. The DHS c. The DOD d. U.S. Customs 59. Reporter Ed Bradley examined the Department of Energy (DOE) and its nuclear facilities in 2004 and found many problems. Which of the following was NOT one of those problems? a. The facilities had outdated equipment. b. Guards were sleeping on duty. c. Facilities were penetrated during mock terrorist attacks. d. Stolen keys to secure facilities were not replaced for three years. 60. Which of the following statements is true of bureaucracies? a. Innovation, creativity, and individuality are encouraged. b. Within a bureaucracy, it is better to make the correct decision rather than a safe decision. c. Bureaucrats postpone decisions under the guise of gathering information. d. Outcomes are more important than policies and procedures. 61. Which of the following occurs when managers begin focusing on issues other than the purpose of the organization? a. Goal displacement b. Mission creep c. Process orientation d. Task orientation 62. Officers need to become aware of the types of activities that take place before an attack. What are such activities known as? a. Pre-emptive indicators b. Offensive indicators c. Preincident indicators d. Intelligence indicators 63. With which of the following entities does the federal government seek to form partnerships so that law enforcement officers can act as an extension of agencies charged with border security? a. Local communities b. Law enforcement agencies c. Border security forces d. State governments

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 14_10e 64. Which of the following is NOT one of the three common bureaucratic problems that can be avoided by focusing on the goal? a. Goal displacement b. Threat analysis c. Process orientation d. Mission creep 65. How many state and local law enforcement officers are there in the United States? a. More than 500,000 b. More than 800,000 c. More than 600,000 d. More than 900,000 66. Which of the following involve controlling the incident through an organized response-and-command system and assigning various organizations to supervise the restoration of social order? a. Emergency reaction plans b. Emergency response plans c. Emergency restoration plans d. Emergency reorder plans 67. National security intelligence is a function of which entity? a. Federal government b. State government c. Citizens d. Local agencies 68. Sharing information is the lifeblood of _________________________. a. Department of State b. Department of Justice c. Department of Defense d. Department of Homeland Security 69. Which of the following refers to a federal law designed to prevent political interference in the management of federal governmental organizations and to increase the efficiency of management? a. The 1978 Civil Service Reform Act b. The USA PATRIOT Act c. The Government Management Reform Act of 1994 d. The Border Security and Reform Act

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 14_10e 70. What are the preparations made by any agency to deal with natural, accidental, or human-made disasters known as? a. Emergency response plans b. Emergency preparations c. Emergency strategies d. Emergency reaction plans 71. What is threat analysis? a. The process of determining threat from illegal immigrants. b. The process of determining the criticality of potential threat areas to the community. c. The process of analyzing the threat once an attack is confirmed. d. The process of examining how impactful a counterthreat might be. 72. The National Crime Information Center (NCIC) maintains information on ___________. a. nationwide basis b. statewide basis c. international basis d. local basis 73. Under the intelligence reform law of 2004, all intelligence coordination must take place in which organization? a. National Counterterrorism Center (NCTC) b. New York Joint Terrorism Task Force (JTTF) c. Law Enforcement Information Network (LEIN) d. The National Crime Information Center (NCIC) 74. Which of the following is an organization designed to filter information from the intelligence process, synthesize counterterrorist information, and share it with appropriate organizations? a. JFFT b. CIA c. NCTC d. DHS 75. According to Richard Clarke, why are most computer systems vulnerable to viruses? a. Computer users do not update the security systems. b. Computer users do not pay for proper protection. c. Available security programs are ineffective. d. Proper security programs are not available. 76. According to Max Weber, what kind of an organization is the bureaucracy? a. Professional and rational b. Professional and political c. Professional and societal d. Professional and economic Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 14_10e 77. Currently, the main military role in counterterrorism is to ________________. a. protect U.S. borders b. project American power overseas c. prevent terrorist attacks d. conduct wars overseas 78. Law enforcement executives have several associations. Which of the following options is NOT one of them? a. The Major County Sheriffs Association b. The Major City Chiefs Association c. The International Association of Chiefs of Police d. The International Sheriffs Association 79. Which of the following DHS policies was unpopular with other countries? a. Background check on visitors b. Biometric measuring of visitors c. Fingerprinting and photographing of visitors d. Digital monitoring of the visitors 80. Which of the following has the tendency to stifle the flow of information on security and intelligence? a. Media b. Bureaucracy c. Intelligence agencies d. Law enforcement agencies 81. Homeland security involves the use of intelligence and ____________. a. law enforcement b. military c. government support d. public support 82. Which of the following statements is true about the government’s role in combating terror? a. Responding to events is difficult. b. Terrorism is easy to prevent. c. Prevention of terrorism requires bureaucratic change. d. The government has no experience in responding to events. 83. According to the CIA, which of the following is the most likely route for smuggling WMD into the United States? a. By air b. By land transport c. By underground tunnels d. By sea

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 14_10e 84. According to Richard Marquise, which city was the best place to locate counterterrorist headquarters because it positioned the FBI for inevitable turf battles with the CIA and Department of State? a. New York City b. Washington, D.C. c. Los Angeles d. Chicago 85. To combat modern terrorism, security forces do NOT require groups of people with _______________. a. abstract reasoning skills b. pragmatic information-gathering skills c. specialized expertise in particular regions d. knowledge of international politics and history 86. Which of the following is NOT true about the justice system? a. The justice system is a multifaceted bureaucracy. b. Each layer of the justice system has differing procedures for dealing with different types of crimes. c. Police departments, court systems, and correctional agencies work together in tandem. d. There is no overall leader as the entities refuse to accept single management. 87. Intelligence organizations hesitate to form partnerships with police agencies. Which one of the following is NOT a reason? a. They frequently question the competence of the police. b. They know that information is not valuable until placed within a context. c. They feel they are higher in the hierarchy. d. They feel that police officers exhibit no concern for in-depth background information. 88. Which agency has the leading role at the National Counterterrorism Center (NCTC)? a. The NSA b. The CIA c. The DOD d. The FBI 89. Which of the following organizations created the National Criminal Intelligence Sharing Plan? a. The Police Foundation b. The Police Executive Research Forum c. The Global Intelligence Working Group d. The National Tactical Officers Association 90. Which term is applied to situations wherein too many jobs divert a unit from its primary mission? a. Mission fail b. Mission threat c. Mission creep d. Mission multiplicity Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 14_10e 91. The process of gathering which kind of intelligence is not readily apparent in American policing? a. Civilian intelligence b. Criminal intelligence c. Defense intelligence d. Air traffic intelligence 92. Which of the following agencies is responsible for port security and transportation systems? a. Department of Defense (DOD) b. Department of Justice (DOJ) c. Department of Homeland Security (DHS) d. Department of the Interior (DOI) 93. Reaction to a crisis is a(n) _________. a. military function b. political function c. emergency function d. causal function 94. The Department of Homeland Security was created from the Office of Homeland Security in which year? a. 2001 b. 2003 c. 1993 d. 1988 95. Who coined the term bureaucracy? a. Max Weber b. Karl Marx c. Steven Flynn d. David Carter

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 14_10e Answer Key 1. True 2. True 3. False 4. False 5. False 6. True 7. True 8. True 9. False 10. False 11. True 12. True 13. False 14. False 15. True 16. b 17. c 18. c 19. c 20. a 21. b 22. d 23. d 24. b 25. c 26. d

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 14_10e 27. d 28. c 29. c 30. d 31. a 32. a 33. a 34. a 35. c 36. c 37. a 38. a 39. a 40. b 41. c 42. b 43. d 44. a 45. a 46. d 47. d 48. b 49. b 50. c 51. c 52. b 53. a 54. b Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 14_10e 55. c 56. c 57. b 58. b 59. a 60. c 61. a 62. c 63. a 64. b 65. b 66. b 67. a 68. d 69. c 70. a 71. b 72. a 73. a 74. c 75. b 76. a 77. b 78. d 79. c 80. b 81. a 82. c Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 14_10e 83. d 84. b 85. b 86. c 87. c 88. b 89. c 90. c 91. c 92. c 93. c 94. b 95. a

Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 15_10e Indicate whether the statement is true or false. 1. Titles III and V of the USA PATRIOT Act decreased law enforcement power. a. True b. False 2. In 2006, the Supreme Court declared that the military tribunal system established for enemy combatants was legal. a. True b. False 3. The most controversial facet of counterterrorism laws deals with intelligence gathering and sharing. a. True b. False 4. Federal counterterrorist laws were toughened after the 1995 Oklahoma City bombing. a. True b. False 5. In response to the 9/11 Commission report, Congress passed the Intelligence Reform and Terrorism Prevention Act in December 2006. a. True b. False 6. If terrorists are prosecuted under criminal law, the Constitution will not be preserved. a. True b. False 7. The USA PATRIOT Act, which made significant changes in the structure of federal law enforcement, was passed within weeks of the 9/11 attacks. a. True b. False 8. During the American Civil War, Abraham Lincoln suspended the writ of habeas corpus. a. True b. False 9. Danger to civil liberties appears when agencies inside a network either act illegally or forget their role. a. True b. False 10. Terrorism is a murky subject, a cloudy area that obscures the boundary separating war and peace. a. True b. False

Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 15_10e 11. According to Anthony Newkirk, the actions of troopers at a Maryland fusion center to gather data on a wide array of groups from 2005 to 2006 amounted to an assault on civil liberties. a. True b. False 12. Societies, even in times of emergency, are never willing to sacrifice personal liberty in the name of security. a. True b. False 13. Lewis Katz believed in limited government before 9/11, but he rethought his position in the wake of the attacks. a. True b. False 14. The USA PATRIOT Act enhanced the gathering and sharing of intelligence. a. True b. False 15. President Obama ordered the closing of Guantánamo detention facility within days after his inauguration. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. In which year was the USA PATRIOT Act passed? a. 2001 b. 2004 c. 2005 d. 2000 17. The CIA suspects a local grocery store owner to be a hawala dealer that is providing weapons to a local terrorist organization. What section of the PATRIOT Act would give the CIA authority to access the store owner’s records? a. Title I b. Title II c. Title III d. Title IV 18. Which of the following illustrates the passions involved in counterterrorism efforts, and is supported by die-hard conservatives who support many of the Bush administration’s other efforts? a. The Colb-Katz thesis b. The Katz-Dempsey thesis c. The Cole-Dempsey thesis d. The Colb-Katz thesis

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 15_10e 19. According to the U.N., if human rights are violated, the persons have the right to which remedy? a. religious b. legal c. political d. civil 20. In the PATRIOT Act, provisions to increase wiretaps were approved in ____. a. 2015 b. 2011 c. 2012 d. 2001 21. Which of the following refers to the basic entitlements and protections that should be given to every person? a. Human rights b. Civil liberties c. Civil rights d. Civil society 22. According to a New York Times investigation, for which of the following organizations did the FBI collect a large amount of data including Internet searches from 9/11/2001 to 2008? a. The NSA b. The CIA c. The NCIS d. The FISA 23. In which year was the USA FREEDOM Act passed? a. 2001 b. 1918 c. 2015 d. 1967 24. Strong advocates of civil liberties tend to emphasize human rights over the nation’s _______. a. economic good b. international reputation c. law d. security 25. Which of the following uses law enforcement information gathered through normal patrol or investigative operations? a. The federal government b. The Nationwide SAR Initiative c. The local police d. The Nationwide SAN Initiative Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 15_10e 26. Suspension of which of the following lies at the root of arguments about homeland security? a. Foreign diplomacy b. Liberty c. Free trade d. Government corruption 27. The CIA tortures a number of suspected terrorists in the hopes of gaining information about an impending nuclear attack on U.S. soil. Which article of the U.N.’s Universal Declaration of Human Rights would best illustrate the violation occurring under such circumstances? a. 3 b. 6 c. 9 d. 5 28. Which two people say that counterterrorist legislation empowers law enforcement agencies to enforce political law? a. Lewis Katz and James Dempsey b. Sherry Colb and Lewis Katz c. David Cole and James Dempsey d. David Cole and Sherry Colb 29. Which of the following bars the bulk collection of Americans’ telephone records and Internet data? a. USA PATRIOT Act b. USA FREEDOM Act c. The Bill of Rights d. Universal Declaration of Human Rights 30. An increase in executive branch powers makes criminal justice more effective, but it threatens ___________________. a. civil freedoms b. human rights c. human liberties d. civil liberties 31. FBI authorities seize the general ledger of a dry cleaning business that they suspect to be a front for a terrorist cell. Issues surrounding the FBI’s actions would be governed by what section of the PATRIOT Act? a. Title I b. Title II c. Title III d. Title IV

Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 15_10e 32. Which of the following protects free speech and the right to assemble, prevents the government from performing illegal search and seizure, and prevents self-incrimination? a. USA PATRIOT Act b. USA FREEDOM Act c. The Bill of Rights d. Universal Declaration of Human Rights 33. Which of the following titles of the USA PATRIOT Act is designed to enhance domestic security? a. Title I b. Title II c. Title III d. Title VII 34. Which sections of the PATRIOT Act allow government investigators to seize financial records? a. Titles I and II b. Titles I and IV c. Titles III and V d. Titles II and III 35. Which of the following ensures that suspects have access to counsel? a. The First Amendment b. The Fourth Amendment c. The Fifth Amendment d. The Sixth Amendment 36. The United Nations adopted the Universal Declaration of Human Rights in ______________. a. 1948 b. 1950 c. 2001 d. 2011 37. According to Wedgwood, which citizens are recruited by Al Qaeda for operations because they are not subject to arbitrary arrest? a. British b. Indian c. U.S. d. Mexican

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 15_10e 38. Writing for Security Management, Joseph Straw (2009) admits that the tremendous amount of information gathered by the national network of which of the following could expose innocent citizens to unfair scrutiny? a. Government employees b. Fission centers c. Fusion centers d. Terrorists 39. Which title of the PATRIOT Act aims to improve the government’s ability to gather electronic evidence? a. Title II b. Title I c. Title IV d. Title X 40. What is the law of the land in the United States? a. The Universal Declaration of Human Rights b. The Constitution c. The Bible d. The USA PATRIOT Act 41. People encountered during normal patrol or investigative operations are known as ________. a. field contacts b. field missions c. tri-forces d. delta forces 42. Which of the following criticized federal agencies for failing to recognize and share intelligence? a. 9/11 Commission b. Senate Review Committee c. White House d. Judicial Review Committee 43. Which of the following amendments guarantees the right to assembly? a. Fourteenth b. First c. Fourth d. Eighth 44. To avoid one branch gaining excessive power, governmental powers are __________________. a. separated b. consolidated c. dissolved d. decreased

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 15_10e 45. Congressional debate about the renewal of the PATRIOT Act began again in______. a. 2015 b. 2016 c. 2011 d. 2012 46. Older people with vivid recollections of 9/11 were more likely to want to keep all the provisions of which act? a. USA FREEDOM Act b. USA NATIONAL Act c. USA PATRIOT Act d. USA NATIONAL FREEDOM Act 47. Title II of the USA PATRIOT Act gives police officials expanded authority to ________________. a. protect eyewitnesses b. monitor communications c. arrest suspected individuals d. arrest individuals without warrant 48. Title II of the PATRIOT Act contains a passage that automatically ends the provisions of the Patriot Act unless it is renewed before a certain time limit. The passage is referred to as the _____________________. a. sunrise clause b. moonlight clause c. eclipse clause d. sunset clause 49. When criminal justice and national security agencies gather information about organizations and people, they do so as an extension of which branch of government? a. Executive b. Legislative c. Judicial d. Congressional 50. Generally, many researchers feel that law enforcement agencies are collecting too much information beyond which kind of intelligence? a. Governmental b. Criminal c. Federal d. Foreign

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 15_10e 51. What title of the PATRIOT Act forbids discrimination against Arabs and Muslims? a. I b. II c. III d. IV 52. Sherry Colb (2001) of Rutgers University School of Law argues that racial profiling (targeting specific groups of people on the basis of race, ethnicity, religion, or other) violates which amendment? a. Fourteenth b. First c. Fourth d. Eighth 53. Which of the following is a method of quickly intercepting disposable phones or Internet traffic? a. Roving wiretaps b. Echelon c. Surveillance worms d. Roving nets 54. Which of the following amendments stipulates that a person cannot be deprived of freedom or property by the government unless the government follows all of the procedures demanded for legal prosecution? a. Fourteenth b. First c. Fourth d. Eighth 55. The first ten amendments of the U.S. Constitution are known as _________________. a. civil liberties b. human rights c. the Freedom Act d. the Bill of Rights 56. The American government was founded on the idea of ______________________________. a. patriotism b. human rights c. religious freedom d. civil liberties

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 15_10e 57. Under the renewed USA PATRIOT Act of 2006, when the government seeks information, the request can be ___________________. a. challenged in court b. ignored by law c. denied with the help of private agencies d. challenged privately 58. Who believes any profiling system, including one having ethnicity as a factor, will yield many more investigative inquiries than apprehensions? a. Dempsey b. Cole c. Katz d. Colb 59. What are diminished when security measures are adopted? a. Civil freedoms b. Human rights c. Human liberties d. Civil liberties 60. The U.S. Constitution separates the powers of the three branches of government: executive, legislative, and judicial. This is known as ________________________. a. the church-state divide b. the separation of powers c. federalism d. bureaucracy 61. What is the real test of the Fourth Amendment? a. Judicial review b. Reasonableness c. Security d. Protection 62. In some controversial ways, human rights intersect with homeland security and _____. a. terrorism b. civil liberties c. domestic intelligence law d. the government

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 15_10e 63. After 9/11, which of the following maintained detention facilities in various foreign countries and detained people without warrant? a. The CIA b. The FBI c. The DHS d. The Department of Defence 64. Criminologists, behavioral scientists, and civil libertarians have begun to question the new emphasis on the role of law enforcement in homeland security and __________. a. Military operations b. CIA operations c. Intelligence operations d. FBI operations 65. Which administration faced a barrage of criticism for many of its policies in the wake of 9/11? a. The Bush b. The Obama c. The Trump d. The Reagan 66. The criminal justice system is permitted to collect information only when it has _________________. a. clear and convincing evidence that people are involved in crimes b. reasonable suspicion that people are involved in crimes c. belief beyond a reasonable doubt that people are involved in crimes d. a preponderance of evidence that people are involved in crimes 67. Which of the following is frequently limited by the courts through interpretations of the law? a. Presidential power b. Terrorist power c. Racial profiling d. Arbitrary arrests 68. What is the purpose of the Bill of Rights? a. To expand what citizens are able to do b. To increase the powers of government c. To limit the powers of the government d. To limit what citizens can do

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 15_10e 69. Which of the following is the law replacing many of the powers of the PATRIOT Act with greater scrutiny from the FISA court? a. USA SECURITY Act b. USA FREEDOM Act c. USA LIBERTY Act d. USA PATRIOT Act II 70. According to David Cole and James Dempsey, which of the following is growing too strong in a wave of national hysteria? a. Power of the military b. Power of federal law enforcement c. Power of local law enforcement d. Power of militias 71. After the 1995 Oklahoma City bombing, President William Clinton supported legislation to increase the government’s power to limit civil liberties in the face of _____. a. gun violence b. cybercrime c. racism d. terrorism 72. A local resident befriends a known terrorist. Federal authorities show up at the local resident’s home with a warrant and take several photographs he took of the two together. Which amendment is potentially at play in the aforementioned scenario? a. Second b. Third c. Fourth d. Fifth 73. To ensure that an arrest is justified by probable cause, the government cannot hold a person without a(n) _________________. a. indictment b. witness c. hearing d. justification 74. What amendment seeks to prevent the government from illegal search and seizure? a. The First Amendment b. The Fourth Amendment c. The Fifth Amendment d. The Sixth Amendment

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 15_10e 75. Title III of the PATRIOT Act provides arrest power outside U.S. borders for U.S. agents investigating terrorist financing and ________________________. a. vandalism b. drug trafficking c. money laundering d. treason 76. According to Katz, which amendment is violated upon eavesdropping on attorney–client conversations? a. First b. Fourth c. Fourteenth d. Sixth 77. A group of suspected terrorists gather outside a mosque after performing their religious rituals. Local police demand they disband. Which amendment is potentially utilizable in the aforementioned scenario? a. First b. Second c. Third d. Fourth 78. Which of the following is defined as courts that try combatants outside the civilian court system? a. Military Justice b. Military International Criminal Courts c. Military Tribunals d. Military Criminal Courts 79. Critics argue that the provision in Title II forcing which of the following to give information on their users to federal law enforcement agencies is not acceptable? a. Courts b. The government c. Private corporations d. Schools 80. Which of the following focuses on the legal right to exist in a society where people are free from arbitrary coercion? a. Human rights b. Civil liberties c. Civil rights d. Democracies

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 15_10e 81. What is the assessment of the actions an average person would take when confronted with certain circumstances? a. Logic of conflict b. Reasonableness c. Probable doctrine d. Arbitrary action 82. In the late 1960s and early 1970s, the FBI violated the rights of suspects and citizens through its counterintelligence program, __________________. a. Crime Control and Safe Streets Act b. COINTELPRO c. FISA d. Counter Intelligence Enhancement Act 83. Title I of which of the following creates funding for counterterrorist activities? a. The Bill of Rights b. The FREEDOM Act c. The PATRIOT Act d. The Universal Declaration of Human Rights 84. Recent criminal justice scholarship has been taking what kind of a view of enhanced governmental powers? a. A more critical view b. A less critical view c. A balanced view d. A biased view 85. Mexican authorities confiscate the beach house of a foreign national for other than a public purpose. Which article of the U.N.’s Universal Declaration of Human Rights would best illustrate the violation occurring under such circumstances? a. 12 b. 17 c. 20 d. 8 86. Which of the following is a mandatory request from the FBI for public and private records? a. National Information Request b. National Security Letter c. Freedom of Information Request d. Proactive Surveillance Request

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 15_10e 87. Which of the following courts reviews federal requests for electronic evidence gathering and search warrants without public review? a. Military b. Federal criminal c. Local criminal d. FISA 88. Some of the most controversial aspects of the PATRIOT Act appear in _________________. a. Title III b. Title I c. Title IV d. Title II 89. Recent court decisions have emphasized the importance of (1) balanced power among the branches of government and (2) maintenance of ___________________. a. civil freedoms b. human rights c. human liberties d. civil rights 90. Federal authorities demand the attendee list of a meeting of a local charity suspected to have ties to Hamas. What section of the PATRIOT Act would give the feds authority to make such demands? a. Title I b. Title II c. Title III d. Title IV 91. In the wake of 9/11, one of the most contentious issues that the government dealt with was_____________. a. the detention of foreign immigrants b. the execution of suspected terrorists c. the escape of suspected terrorists d. the detention of suspected terrorists 92. The Department of Justice argued for the continuation of how many provisions after the PATRIOT Act was preserved in 2011? a. Three b. Two c. Five d. Four

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 15_10e 93. In which year was much of the power of the PATRIOT Act preserved when the Department of Justice argued for the continuation of three key provisions? a. 2002 b. 2004 c. 2005 d. 2011 94. Which of the following are individual rights granted to citizens under the U.S. Constitution? a. Civil freedoms b. Human rights c. Human liberties d. Civil liberties 95. Which amendment requires law enforcement and homeland security forces to follow the due process of law before depriving any person of his or her liberty? a. First b. Second c. Fourth d. Fourteenth

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 15_10e Answer Key 1. False 2. False 3. True 4. True 5. False 6. False 7. True 8. True 9. True 10. True 11. True 12. False 13. True 14. True 15. True 16. a 17. c 18. c 19. b 20. b 21. a 22. a 23. c 24. d 25. b 26. b

Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 15_10e 27. d 28. c 29. b 30. d 31. c 32. c 33. a 34. c 35. d 36. a 37. c 38. c 39. a 40. b 41. a 42. a 43. b 44. a 45. a 46. c 47. b 48. d 49. a 50. b 51. a 52. a 53. a 54. a Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 15_10e 55. d 56. d 57. a 58. d 59. d 60. b 61. b 62. a 63. a 64. c 65. a 66. b 67. a 68. c 69. b 70. b 71. d 72. c 73. c 74. b 75. c 76. d 77. a 78. c 79. c 80. a 81. b 82. b Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 15_10e 83. c 84. a 85. b 86. b 87. d 88. d 89. d 90. b 91. d 92. a 93. d 94. d 95. d

Copyright Cengage Learning. Powered by Cognero.

Page 19


Name:

Class:

Date:

Chap 16_10e Indicate whether the statement is true or false. 1. American law enforcement is a military occupation. a. True b. False 2. Practitioners champion community policing as a way to prevent terrorism and increase homeland security. a. True b. False 3. Terrorism is primarily a criminal justice problem. a. True b. False 4. Studies indicate that tactical units are frequently used in drug enforcement efforts. a. True b. False 5. After 9/11, military equipment was no longer available to state and local police agencies. a. True b. False 6. If homeland security is to function, myriad law enforcement agencies must share information. a. True b. False 7. Most practitioners do not embrace community policing efforts. a. True b. False 8. Tactical units are increasingly being used for situations other than emergencies. a. True b. False 9. DOJ officials decided that no agency would participate in the SAR process unless it had a publicly approved policy for collecting and sharing criminal intelligence that matched the standards set by the FBI. a. True b. False 10. The basic tactics of terrorism remain relatively constant, and terrorists do not develop new ways to use them. a. True b. False 11. Private businesses are not subjected to the same constitutional rules and regulations as government entities. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 1


Name:

Class:

Date:

Chap 16_10e 12. Private-public partnerships reduce the effectiveness of preventive policies. a. True b. False 13. Despite the necessity of sharing information, law enforcement agencies are reluctant to do so. a. True b. False 14. Defense contractors possess the same skills as most government agencies. a. True b. False 15. Criminal and terror networks often intersect. a. True b. False Indicate the answer choice that best completes the statement or answers the question. 16. Information about possible terrorist threats is assessed by two agencies, e-Guardian and ________. a. CIA b. NSI c. SAR d. JTTF 17. Which of the following is NOT one of the three lessons the FBI learned from the Mumbai and Lahore attacks? a. Prepare for strikes by small groups operating without a central command b. Positive relationships with local communities c. Recruiting more personnel to be more prepared for future attacks d. Need to develop international partnerships and sources of information 18. According to advocates, what works against crime, solves problems before they occur, and brings law enforcement officers into closer relationships with the people they serve? a. Daily patrols b. Homeland security c. Community policing d. Information sharing 19. Which of the following is an attempt to systematically gather and share information among multiple law enforcement agencies? a. The NCISP b. The NSI c. The SAR d. The e-Guardian

Copyright Cengage Learning. Powered by Cognero.

Page 2


Name:

Class:

Date:

Chap 16_10e 20. Who coined the term Military-industrial complex? a. Lyndon Johnson b. George W. Bush c. Ronald Reagan d. Dwight Eisenhower 21. According to financial experts, which of the following tactics is being increasingly utilized for the funding of domestic terrorist operations? a. Kidnapping b. Embezzlement c. Prostitution d. Fraud 22. Some police agencies have developed units that are more suited for which kind of functions than for police work? a. Federal b. Business c. Civilian d. Military 23. Which of the following conducted a detailed tactical analysis of the attacks in Mumbai and Lahore and found similarities? a. The CIA b. The FBI c. The NYPD Intelligence unit d. Homeland security 24. Which program helps law enforcement provide local businesses with guidelines for detecting suspicious activities? a. 9/11 Commission Implementation Act of 2207 b. Private-Public Business Model c. Communities Against Terrorism d. USA Intelligence Act 25. American citizens who believe that the original citizens of the United States were free from all government controls are referred to as ______________. a. sovereign citizen b. indigenous citizen c. native citizen d. nationalist citizen

Copyright Cengage Learning. Powered by Cognero.

Page 3


Name:

Class:

Date:

Chap 16_10e 26. If units are overutilized during drug raids and other search warrant activities, perceptions of which of the following will increase? a. Police militarization b. Government corruption c. Community militarization d. Community policing 27. Which of the following groups is the best source of information about potential terrorist violence? a. CIA agents b. Religious leaders c. Military intelligence d. Local citizens 28. Who of the following indicates similarities and differences between terrorists and organized criminals? a. The FBI b. Boin c. Graham d. Stohl 29. Which of the following is necessary for effective homeland security? a. Positive relationship with locals b. Public-private partnerships c. Information sharing d. Community partnerships 30. Which of the following entities encourages employees in various industries to report terrorist or illegal activities to their local agencies? a. IACP b. FBI c. DHS d. CAT 31. According to the ACLU, which of the following groups is routinely utilized for drug raids and search warrants? a. Field training officers b. Field contacts c. The military d. Tactical units 32. In 2008, Russia utilized what type of attack against Georgia? a. Biological b. Radiological c. Cyber d. Virtual Copyright Cengage Learning. Powered by Cognero.

Page 4


Name:

Class:

Date:

Chap 16_10e 33. One of the sources of militarization comes from police________. a. tactical units b. radicalization c. cyber units d. expediency 34. The e-Guardian system falls under the domain of the ___________. a. FBI b. CIA c. JTTF d. NSA 35. Which police agency created a new intelligence operation after the 9/11 attacks to assess domestic and international threats to the city? a. NYPD b. LAPD c. NJPD d. FBI 36. Which of the following refers to responding to social problems with military solutions? a. Martial law b. Fascism c. State terror d. Militarization 37. Who of the following does not freely share their shortcomings with the government agencies that hire them? a. Corporations b. Communities c. Private citizens d. Federal employees 38. What is the essence of community policing? a. Community sharing b. Public-private partnerships c. Information sharing d. Community partnerships 39. The ACLU claims that American law enforcement has militarized the war on ______________. a. ammunition b. drugs c. racism d. immigration

Copyright Cengage Learning. Powered by Cognero.

Page 5


Name:

Class:

Date:

Chap 16_10e 40. The NYPD concluded that terrorist tactics of sophisticated groups like LeT will shift from emphasizing suicide bombings to focus on ______________. a. guerrilla-style assaults b. police-style assaults c. military-style assaults d. unit-style assaults 41. After 9/11, the Dearborn Police Department immediately placed officers around mosques and schools with Arab students to protect Muslims from _________. a. discrimination b. kidnappers c. vigilante attacks d. religious fanatics 42. Which of the following will unite with community policing in future policing efforts? a. The CIA b. Homeland security c. The government d. The military 43. According to Lim and Guzman, police departments deemphasized their relationship with communities after accepting _________. a. homeland security tasks b. bribes c. budget cuts d. intelligence agencies tasks 44. According to a RAND evaluation, which of the following has been less than effective in sharing information? a. Homeland security b. The DHS c. Fusion centers d. Fission centers 45. In the 1960s, police forces found that the use of which of the following provided a convenient means of controlling crowds? a. Military formations and tactics b. Tear gas c. Air guns and barricades d. Nonviolent demonstrations

Copyright Cengage Learning. Powered by Cognero.

Page 6


Name:

Class:

Date:

Chap 16_10e 46. Which of the following terrorist organizations was responsible for the November 2008 terrorist attacks in Mumbai, India? a. MeK b. LeT c. Hamas d. Al-Qaeda 47. Which of the following is designed to standardize intelligence analysis and sharing? a. The NCISP b. The NSI c. The SAR d. The e-Guardian 48. In which year was the task force LEEWG created? a. 2011 b. 2016 c. 2013 d. 2015 49. Which of the following is the term used to describe the relationship between American military forces and private industries? a. Industrial militarization b. Military-industrial complex c. Corporate military d. Military privatization 50. Experts have presented data to suggest that law enforcement officers will be increasingly targeted by _______________. a. violent international extremists b. violent domestic extremists c. criminal enterprises d. international jihadists 51. Davis and Plotkin recommend which of the following with organizations and citizens as a means of preventing terrorism? a. Community information sharing b. Community policing c. Community militarization d. Community partnerships

Copyright Cengage Learning. Powered by Cognero.

Page 7


Name:

Class:

Date:

Chap 16_10e 52. Which of the following are experienced senior patrol officers who ride with police academy graduates? a. Field contacts b. Field training officers c. Field teaching officers d. Field cops 53. People encountered during normal patrol or investigative operations are known as __________. a. Field officers b. Field contacts c. Field training officers d. Field informants 54. Which of the following tactics should NOT be used by law enforcement officers to prevent terrorism? a. infiltrate communities b. detect potential acts of violence c. foil attacks d. check every home in the neighborhood 55. Who of the following self-declare that they are individually free from driver’s licenses, car registrations, and tax laws of the country? a. Domestic radicals b. Terrorists c. Politicians d. Sovereign citizens 56. Which group copies LeT’s swarm attacks in Afghanistan? a. Al-Qaeda b. ISIS c. The Taliban d. LTTE 57. Which of the following encourages departments to increase communication, establish transparency, and create agency presence on social media? a. The International Association of Chiefs of Police (IACP) b. Nationwide SAR Initiative (NSI) c. The federal government d. e-Guardian

Copyright Cengage Learning. Powered by Cognero.

Page 8


Name:

Class:

Date:

Chap 16_10e 58. Which of the following scenarios is NOT an example of the military-industrial complex? a. The military is ordered by the President to secure U.S. airspace. b. The U.S. government hires a private company to escort U.S. diplomats. c. The FBI, the CIA, and local law enforcement conduct a coordinated sting operation on a suspected terrorist cell. d. The CIA shares intelligence gained in Iraq with a local police agency that has been targeted by Hamas for attack. 59. Attacks involving several attackers suddenly coming to a single location and rapidly dispersing are called ______________. a. strain attacks b. ambush attacks c. swarming attacks d. complex attacks 60. The acronym LEEWG stands for: a. Law Enforcement Equipment Acquisition Working Group b. Law Enforcement Equipment Attainment Working Group c. Law Enforcement Entity Acquisition Working Group d. Law Enforcement Equipment Acquisition Weapon Group 61. Which of the following is designed to overcome both the danger of and the reluctance to share information about activities that might indicate a terrorist attack is in the making? a. The 9/11 Commission b. The Quadrennial Homeland Security Review c. The Communities Against Terrorism d. The Nationwide SAR Initiative 62. The most likely future trend of terrorists is the use of _____________________. a. remote detonation devices b. biological weapons c. chemical weapons d. cyberattacks 63. SAR is an acronym for ______________. a. Suspicious Activity Report b. Surveillance Activity Report c. Safety and Recognition d. Suspicion and Recognition

Copyright Cengage Learning. Powered by Cognero.

Page 9


Name:

Class:

Date:

Chap 16_10e 64. James Van De Velde (2010) says diversion is the best way to keep terrorists from using __________. a. chemicals b. drugs c. cyberweapons d. megaweapons 65. According to Tom Barry, which term is no longer applicable to the relationship between big defense contractors and the government? a. Industrial militarization b. Military-industrial complex c. Corporate military d. Military privatization 66. One of the greatest fears remaining in the face of terrorism is the use of chemical, radiological, and __________________. a. virtual weapons b. biological weapons c. nuclear weapons d. human (e.g., suicide bombers) weapons 67. Which of the following terrorist groups learned from the success of the 2008 Mumbai attacks and attacked a convoy in Lahore four months later? a. The LeT b. The MeT c. The Taliban d. The MeK 68. Which of the following is a federal program designed to develop common antiterrorism intelligence-reporting procedures among state, local, and tribal law enforcement agencies? a. CSI b. JTTF c. NSI d. NTOA 69. After the riots in 1980, the Metro-Dade Police Department in Florida developed an effective method called fieldforce technique, for responding to ___________. a. terrorism b. drug cartels c. gang violence d. urban riots

Copyright Cengage Learning. Powered by Cognero.

Page 10


Name:

Class:

Date:

Chap 16_10e 70. Former counterterrorism czar Richard Clarke and Robert Knake of the Council on Foreign Relations state that nations seeking to attack the United States would achieve a strategic advantage if they could disrupt a number of U.S. government systems. Which government system do they NOT mention? a. Transportation b. Communications c. Financial systems d. Information technology 71. Nationwide SAR Initiative or NSI is based on which of the following? a. Each tactical unit retains control of the information. b. Each agency retains control of the information. c. Each agency gives up control of the information. d. Each agency retains control of the community. 72. During the Black and Tan War, which of the following attacked a British police station in a swarming attack? a. LeT b. The Taliban c. The IRA d. Al Qaeda 73. Who of the following would most likely be the first responder to a terrorist incident? a. A CIA agent b. A police officer c. An FBI agent d. A military intelligence officer 74. Who created the LEEWG? a. President Reagan b. President Clinton c. President George W. Bush d. President Obama 75. The U.S. Department of Justice describes which of the following as, “a philosophy that promotes organizational strategies, which support the systematic use of partnerships and problem solving techniques, to proactively address the immediate conditions that give rise to public safety issues…” a. Homeland security b. Community policing c. Preventative policing d. Militarized policing

Copyright Cengage Learning. Powered by Cognero.

Page 11


Name:

Class:

Date:

Chap 16_10e 76. Out of the following, who are reported with standardized information gathered from a variety of law enforcement departments? a. Informants b. Security links c. Field contacts d. Community personnel 77. According to Patrick Hardouin, which of the following fields is one of the most important intersections between criminals and terrorists? a. Finance b. Narcotics c. Technology d. Operational strategy 78. Which of the following is NOT a mission of DHS? a. Prevent Terrorist Attacks b. Keeping tabs on the drug cartels operating c. Effectively Control U.S. Air, Land, and Sea Borders d. Ensure Effective Emergency Response 79. The United States would experience a crisis similar to the 2007 major recession, if private corporations become responsible for ______. a. homeland security b. government funding c. intelligence agencies d. national security 80. Which of the following refers to a process in which individual police units or entire agencies begin to approach specific problems with military values and attitudes? a. Counterterrorism b. Militarization c. Military-industrial complex d. Swarming attacks 81. Which agency funds the program Communities Against Terrorism? a. Bureau of Justice Assistance b. U.S Senate Office c. FBI d. DHS

Copyright Cengage Learning. Powered by Cognero.

Page 12


Name:

Class:

Date:

Chap 16_10e 82. There is a debate about the relationship between community policing and _________. a. community partnerships b. homeland security c. businesses d. citizens 83. In law enforcement, militarization is usually characterized by ______________. a. martial law b. fascism c. state terror d. community policing 84. According to the Nationwide SAR Initiative, the information can be reviewed by other agencies if positive reviews are provided by the local JTTF and ______________. a. field contacts b. e-Guardian c. the cybersystem d. the DOJ 85. Private incursion in the public sphere has been expanded by the wars in Afghanistan and ___________. a. Iraq b. Iran c. Syria d. Egypt 86. Which of the following is a 2005 set of recommendations designed to overcome barriers to sharing criminal intelligence? a. The NCISP b. The NSI c. The SAR d. The e-Guardian 87. Which of the following limits the power of government but not private industries, making private-public partnerships complicated? a. The Human Rights Declaration b. The DHS c. Homeland security d. The Constitution

Copyright Cengage Learning. Powered by Cognero.

Page 13


Name:

Class:

Date:

Chap 16_10e 88. One of the emerging critical issues in antiterrorism policy is the development of homeland security industries by ____________________. a. public companies b. NGOs c. private businesses d. virtual businesses 89. E-guardian exemplifies an information _______. a. sharing network b. withholding network c. distributing network d. protecting network 90. According to terrorism analysts, which of the following aspects of terror networks automatically gives groups the ability to adapt to future changes? a. Their political nature b. Their tactical efficiency c. Their hidden nature d. Their infrastructure 91. Which of the following is NOT a responsibility of field training officers? a. Mentorship b. Training c. Evaluation d. Therapy 92. Which of the following issues in the United States does not usually involve political terrorism, although some of the incidents can be classified as domestic terrorism, and others handled like a terrorist incident? a. Active shooter incidents b. Race-related assault c. Sex-related assault d. Assassination 93. In November 2008 Mumbai attack, terrorist did NOT target which of the following location? a. Railway station b. Police Station c. Hospital d. Airport

Copyright Cengage Learning. Powered by Cognero.

Page 14


Name:

Class:

Date:

Chap 16_10e 94. Despite of various procedures, flow of information can be hampered by human factors. Which of the following is NOT one of these factors? a. Individual competition b. Agency rivalries c. Duplication of effort d. Personal benefits 95. Which of the following agencies observed a difference in the level of sophistication between the attacks in Mumbai and Lahore? a. The CIA b. The FBI c. The NYPD Intelligence unit d. Homeland security

Copyright Cengage Learning. Powered by Cognero.

Page 15


Name:

Class:

Date:

Chap 16_10e Answer Key 1. False 2. True 3. True 4. True 5. False 6. True 7. False 8. True 9. False 10. False 11. True 12. False 13. True 14. False 15. True 16. d 17. c 18. c 19. b 20. d 21. d 22. d 23. c 24. c 25. a 26. a

Copyright Cengage Learning. Powered by Cognero.

Page 16


Name:

Class:

Date:

Chap 16_10e 27. d 28. d 29. c 30. d 31. d 32. c 33. a 34. a 35. a 36. d 37. a 38. d 39. b 40. c 41. c 42. b 43. a 44. c 45. a 46. b 47. a 48. d 49. b 50. b 51. d 52. b 53. b 54. d Copyright Cengage Learning. Powered by Cognero.

Page 17


Name:

Class:

Date:

Chap 16_10e 55. d 56. c 57. a 58. b 59. c 60. a 61. d 62. a 63. a 64. d 65. b 66. b 67. a 68. c 69. d 70. a 71. b 72. c 73. b 74. d 75. b 76. c 77. a 78. b 79. a 80. b 81. a 82. b Copyright Cengage Learning. Powered by Cognero.

Page 18


Name:

Class:

Date:

Chap 16_10e 83. a 84. b 85. a 86. a 87. d 88. c 89. a 90. c 91. d 92. a 93. d 94. d 95. b

Copyright Cengage Learning. Powered by Cognero.

Page 19


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.