Ch3 Full Test Bank + American Military Strategy in an Era of - Complete Test Bank | Contemporary American Foreign Policy by Richard W. Mansbach. DOCX document preview.

Ch3 Full Test Bank + American Military Strategy in an Era of

Chapter 3

Multiple Choice Questions

1. Where did the United States initiate airstrikes in 2014?

a. Iran.

b. Iraq.

c. Yemen.

d. Lebanon.

2. What event deterred U.S. officials from intervening in Darfur or Rwanda?

a. The sinking of the USS Cole off Yemen.

b. The losses suffered in the Persian Gulf War of 1990-1991.

c. The deaths of U.S. soldiers in Somalia in 1993.

d. The downing of NATO aircraft in Bosnia in 1994.

3. Which president claimed his policies were influenced by his religious faith?

a. Jimmy Carter.

b. George H. W. Bush.

c. Bill Clinton.

d. Barack Obama.

4. What was America’s grand strategy during the entire Cold War?

a. Preemption.

b. Humanitarian intervention.

c. Containment.

d. Massive retaliation.

5. Who was the architect of containment?

a. Harry S. Truman.

b. Chester Bowles.

c. George Kennan.

d. Henry Cabot Lodge, Jr.

6. What foreign-policy document did Paul Nitze author?

a. The “Mr. X” article.

b. The Truman doctrine.

c. NSC-68.

d. The Long Telegram.

7. What was the “domino theory”?

a. A theory that ascribed Soviet aggressiveness to Moscow’s desire for security.

b. A theory the viewed communism as inherently expansionist.

c. A theory communist China was responsible for the invasion of South Korea in 1950.

d. A theory that if one country fell to communism, its neighbors would soon suffer a similar fate.

8. Where did America’s most extensive Cold War military intervention take place?

a. South Korea.

b. Vietnam.

c. Afghanistan.

d. The Dominican Republic.

9. Who was Jacobo Arbenz?

a. A Guatemalan president overthrown by the U.S.

b. A left-wing president of Venezuela.

c. A Panamanian president who was imprisoned in the U.S. for drug smuggling.

d. A long-time military dictator of Argentina.

10. What was the doctrine of “massive retaliation”?

a. A conventional Soviet attack on an American ally might elicit an U.S. nuclear response.

b. An attack on the U.S. homeland would elicit a massive nuclear response.

c. Soviet use of tactical nuclear weapons would trigger rapid escalation to a full scale strategic response.

d. An attack on U.S. interests by communist China would be regarded by the U.S. as a Soviet attack and would trigger retaliation against the USSR.

11. What was the assumption of behind “mutual assured destruction”?

a. In a U.S.-Soviet crisis Washington would have to launch a nuclear strike first to avoid a Soviet second strike.

b. Only mutual vulnerability to nuclear attack could prevent nuclear war.

c. A full-scale nuclear exchange would produce nuclear “winter”.

d. The construction of effective U.S. and Soviet anti-missile defenses would allow both to escape destruction in a nuclear war.

12. Which of the following was the first genuine U.S.-Soviet disarmament agreement?

a. the Anti-Ballistic Missile (ABM) Treaty.

b. SALT II.

c. The Intermediate-Range Nuclear Forces Treaty.

d. The Strategic Arms Reduction Treaty (START I).

13. What was the first major foreign-policy challenge faced by the U.S. after the Cold War?

a. The Bosnian civil war.

b. The famine and civil war in Somalia.

c. Civil war in Nicaragua and the overthrow of the Sandinistas.

d. Iraq’s invasion of Kuwait.

14. What was “Operational Desert Storm”?

a. U.S. liberation of Kuwait (1991).

b. U.S. intervention in Kosovo (1999).

c. U.S. intervention in Afghanistan (2001).

d. U.S. invasion of Iraq (2003).

15. In what conflict did the United States introduce “smart” weapons such as stealth aircraft and precision-guided munitions?

a. U.S. liberation of Kuwait (1991).

b. U.S. intervention in Kosovo (1999).

c. U.S. intervention in Afghanistan (2001).

d. U.S. invasion of Iraq (2003).

16. What two countries were the targets of U.S. “dual containment” after the Cold War?

a. Russia and China.

b. China and Iraq.

c. Iraq and Russia.

d. Iran and Iraq.

17. Which of the following was emphasized in America’s 2002 National Security Strategy?

a. Rising China.

b. Mutual Assured Destruction.

c. Anticipatory self-defense.

d. Counterinsurgency tactics.

18. What country did the International Security Assistance Force (ISAF) seek to pacify?

a. Iraq.

b. Bosnia.

c. Afghanistan.

d. Libya.

19. Who promoted the “surge strategy” in Iraq?

a. General David Petraeus.

b. Secretary of Defense Leon Panetta.

c. General Colin Powell.

d. President George W. Bush.

20. Which of the following were not involved in Iraq’s sectarian violence during the Iraq War that began in 2003?

a. Sunni Muslims.

b. Shia Muslims.

c. Sufi Muslims.

d. Ethnic Kurds.

21. Which of the following was a central foreign-policy objective of President Obama after he assumed office?

a. Nuclear disarmament.

b. Regime change in Iraq.

c. Providing security to Saudi oil production facilities.

d. Fostering human rights in China.

22. What did America’s 2010 Nuclear Posture Review (NPR) emphasize?

a. Modernization of U.S. nuclear forces.

b. Reducing the role of nuclear weapons in U.S. military strategy.

c. Eliminating nuclear weapons globally.

d. Increasing the number of U.S. ICBMs.

23. Which of the following did the Obama administration increasingly emphasize in its counterterrorism and counterinsurgency strategies?

a. Prepositioning military equipment.

b. Cyber-weapons.

c. Nation-building.

d. Special Operations Forces.

24. What country is believed to have hacked into the computers of Sony Pictures in 2014?

a. China.

b. North Korea.

c. Iran.

d. Russia.

25. What was “Stuxnet”?

a. A computer virus used to attack Iranian nuclear facilities.

b. A surveillance program employed by America’s National Security Agency (NSA)?.

c. A cyber-weapon used by Russia to attack Georgia and Estonia.

d. An antimissile system used by Israel to defend against Hezbollah and Hamas.

26. What is Unit 61398?

a. A U.S. Special Operations team.

b. A Chinese cyber-espionage team.

c. An Iranian nuclear research group.

d. A Russian unit detected in Ukraine.

27. Where did America’s first lethal drone strike occur?

a. Afghanistan

b. Iraq.

c. Pakistan.

d. Yemen.

28. What is meant by a “signature strike”?

a. A Special Operations raid to capture a suspected terrorist.

b. A drone strike against a known terrorist.

c. A drone strike on unidentified but suspected terrorists.

d. A Special Operations raid intended to assassinate a known terrorist.

29. What is major risk of drone strikes?

a. They may harm innocent civilians.

b. They may strike urban areas.

c. They may produce U.S. military casualties.

d. They may reduce the willingness of allies to use ground forces against local terrorists.

30. Who is Anwar al-Awlaki?

a. The leader of al-Qaeda after the death of Osama bin Laden.

b. An American citizen who died in a targeted drone strike in Yemen.

c. The founder of the Taliban in Afghanistan.

d. A Pakistani leader who opposed U.S. drone strikes in his country.

31. Which of the following countries is modernizing its nuclear forces?

a. The United States.

b. Russia.

c. Pakistan.

d. All of the above.

32. What country claims it successfully redirected a U.S. drone to land in its territory?

a. Russia.

b. Iran.

c. India.

d. China.

33. What U.S. agency has managed most American drone strikes?

a. The Strategic Air Command.

b. The Central Intelligence Agency.

c. The U.S. Air Force.

d. The U.S. Navy.

34. Why was it important during the Cold War that neither superpower be able to defend its cities against a nuclear attack?

a. Such a defense, if effective, might embolden the superpower with such a defense to behave aggressively.

b. It would reduce the willingness of both superpowers to reach an arms-control agreement.

c. Such a defense, if effective, might embolden the superpower without such a defense to behave aggressively.

d. It would lead the other superpower to develop a similar defense, thereby triggering an arms race.

35. Who declared he would use tactical nuclear weapons to defend his country’s sphere of influence?

a. Chinese President Xi Jinping.

b. Indian Prime Minister Narendra Modi.

c. North Korean supreme leader Kim Jong-un.

d. Russian President Vladimir Putin.

36. What was the most important arm- control agreement reached during the Cold War?

a. The Anti-Ballistic Missile (ABM) Treaty.

b. SALT II.

c. The Intermediate-Range Nuclear Forces Treaty.

d. The Strategic Arms Reduction Treaty (START I).

37. What is MIRV?

a. America’s first generation ICBM.

b. A U.S. missile deployed in Western Europe in response to Soviets deployment of intermediate missiles in Eastern Europe.

c. A missile with multiple warheads.

d. An accurate and mobile Soviet missile.

38. Why was the United States reluctant to overthrow Saddam Hussein in 1991?

a. It feared that revolutionary Iran might take advantage of his death.

b. It expected that Saddam would cooperate with the United States afterwards.

c. It feared that Saddam’s successor might be a militant Islamist.

d. It desired to form a regional alliance to include Iraq.

39. What country experienced genocide in 1994 that the U.S. refused to recognize?

a. Somalia.

b. Rwanda.

c. Bosnia.

d. Kosovo.

40. What was “Operation Enduring Freedom”?

a. U.S. liberation of Kuwait (1991).

b. U.S. intervention in Kosovo (1999).

c. U.S. intervention in Afghanistan (2001).

d. U.S. invasion of Iraq (2003).

Essay Questions

41. What is a hegemon?

42. What is cyber-espionage?

43. What was the gist of National Security Document 68?

44. What constitutes a “second strike” nuclear weapon?

45. Identify one element in the Powell Doctrine.

46. What is a “first strike” capability.

47. What is the Taliban?

48. In addition to military force what is required for a successful counterinsurgency policy?

49. What is meant by the “attribution problem” in cyber-security?

50. What is “Global Zero”?

51. Although there is no clear global challenger to the U.S., major states like ________________________________ pose regional challenges.

52. President ___________________ had substantial foreign-policy experience--UN Ambassador, Ambassador to China, CIA Director, and Vice-President.

53. Presidents ______________________ both claimed their styles and policies were shaped by their religious faith.

54. As the Cold War began U.S. fears intensified after Moscow reneged on the promises it had made at the _____________________ to demobilize its forces in Eastern Europe and allow free elections in those countries.

55. National Security Council Document 68 _______________ recommended ____________________________ to counter Soviet expansionism.

56. The belief that if one country were allowed to fall to communism others would follow became known as _____________________.

57. In 1953 Eisenhower adopted the doctrine of ____________________ as part of a defense policy that sought to reduce the role of costly conventional forces in Europe ____________________________________.

58. Deterrence underwent refinement as America and the USSR acquired ______________________ by burying missiles in underground silos, making them mobile, or deploying them on submarines.

59. The doctrine of _____________________ assumed that only mutual vulnerability to nuclear attack could prevent nuclear war.

60. ________________ argued that America should only commit forces to battle when a clear vital interest was threatened, other means of protecting that interest had been exhausted, there was a clear exit strategy and the use of force enjoyed broad domestic and international support.

61. In 1994 genocidal war erupted in the small country of _____________ in central Africa.

62. Responding to 9/11 the Bush Doctrine involved ________________________.

63. Since 2009, there has been little evidence that nuclear-armed powers were moving toward the _________________ that President Obama envisioned.

64. In 2014 cyber-security gained widespread attention when a group calling itself the Guardians of Peace hacked _________________, leaking thousands of documents and emails.

65. ______________ were used for reconnaissance during the Vietnam War

a. Drones

Document Information

Document Type:
DOCX
Chapter Number:
3
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 3 American Military Strategy in an Era of Power Diffusion
Author:
Richard W. Mansbach

Connected Book

Complete Test Bank | Contemporary American Foreign Policy

By Richard W. Mansbach

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party