Ch8 Complete Test Bank Pursuing Security - Global Politics 1e | Test Bank Boyer by Mark A. Boyer. DOCX document preview.
1) The founder of North Korea was _________________.
Feedback:factual
Chapter Section Reference: Chapter Opener
a. Kim Hyong-jik
b. Kim Il-Sung
c. Kim Jong-il
d. Kim Jong-nam
2) The Democratic People’s Republic of Korea invaded South Korea in ____________.
Feedback:factual
Chapter Section Reference: Chapter Opener
a. 1948
b. 1950
c. 1955
d. 1958
3) North Korea possesses the ____________ conventional army in the world.
Feedback:factual
Chapter Section Reference: Chapter Opener
a. second largest
b. sixth largest
c. third largest
d. fifth largest
4) The traditional approach to security emphasizes the primacy of the __________________.
Feedback:conceptual
Chapter Section Reference: The Traditional Approach
a. organizations
b. nation-state
c. United Nations
d. leaders
5) Social theorist ___________ described security as an “essentially contested concept”.
Feedback:conceptual
Chapter Section Reference: The traditional Approach
a. Jane Addams
b. W. B. Gallie
c. Peter L. Berger
d. Roland Barthes
6) National security in its traditional sense has become synonymous with attaining and amassing ____________.
Feedback:factual
Chapter Section Reference: The Traditional Approach
a. political power
b. military power
c. economic power
d. diplomatic power
7) According to the Stockholm International Peace Research Institute (SIPRI), in 2018 the world spent about __________on military arms.
Feedback:factual
Chapter Section Reference: The traditional Approach
a. 2.4 trillion
b. 1 trillion
c. $1.8 trillion
d. 2 trillion
8) In 2018 the U.S. national defense budget accounted for _________ of total global defense spending.
Feedback:factual
Chapter Section Reference: The Traditional Approach
a. 36%
b. 41%
c. 28%
d. 45%
9) According to the first Secretary-General of the United Nations _____________ “wars occur because people prepare for conflict, rather than for peace.”
Feedback:factual
Chapter Section Reference: The traditional Approach
a. Gladwyn Jebb
b. Dag Hammarskjöld
c. Kurt Waldheim
d. Trygve Lie
10) ____________, as a security logic, is when the state seeks to preserve and protect itself by any and all means necessary.
Feedback:applied
Chapter Section Reference: The Traditional Approach
a. Alea iacta est
b. Carte blanche
c. Magna Carta
d. Acta non verba
11) A central assumption of the ______________ system is that no central global authority exists to maintain order and ensure justice.
Feedback:applied
Chapter Section Reference: Anarchy and Self-Help
a. Holy Roman Empire
b. Arabic civilization
c. Byzantine Empire
d. Westphalian
12) In recent years Japan’s foreign policies have shifted toward _________ and ______________.
Feedback:applied
Chapter Section Reference: Anarchy and Self-Help
a. projecting strength; increasing military capabilities
b. multilateralism; alliance formation
c. self-reliance; normal nationalism
d. diplomacy; peace building
13) Which of the following is not a feature of the security dilemma?
Feedback:applied
Chapter Section Reference: A Security Dilemma for States
a. absence of reliable information flow between states
b. the armed race between states
c. the protracted conflict between states
d. interactions among IGOs
14) ________________ is a situation where states misinterpret largely defensive actions and capabilities by other states as threats.
Feedback:conceptual
Chapter Section Reference: A Security Dilemma for States
a. Bad intelligence
b. Security dilemma
c. Militarism
d. Diversion
15) According to ____________, states must assume and act according to “worst-case scenario” possibilities.
Feedback:applied
Chapter Section Reference: A Security Dilemma for States
a. Robert Jervis
b. John Mearsheimer
c. David Heather
d. John Ikenberry
16) In his1983 article entitled “Redefining Security”, _______________ called to attention to issues such as environmental security.
Feedback:conceptual
Chapter Section Reference: Security Re-Envisioned
a. Richard Ullman
b. Ludwig Trepl
c. Hugh C. Dyer
d. Richard Grove
17) _____________ called for the need to rethink the concept of security as a global development that includes resource, environmental, and demographic issues.
Feedback:conceptual
Chapter Section Reference: Security Re-Envisioned
a. Ken Booth
b. John Vogler
c. Mark Imber
d. Jessica Tuchman Mathews
18) During the _____________, many IR scholars and policymakers began to challenge traditional assumptions about security and the centrality of the state.
Feedback:factual
Chapter Section Reference: Security Re-Envisioned
a. 1990s
b. 1980s
c. 1960s
d. 1970s
19) After the Cold War, the _____________ approach to security became increasing unsatisfactory.
Feedback:conceptual
Chapter Section Reference: Security Re-Envisioned
a. traditional liberalist
b. traditional constructivist
c. traditional realist
d. traditional feminist
20) According to political scientist ______________, security is embedded in the interaction of localizing and globalizing forces.
Feedback:applied
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. Von Hippel
b. Heather David
c. Koen De Ceuster
d. James Rosenau
21) The __________ developed a theory of securitization, which critically evaluates how security threats are identified and prioritized across various dimensions such as military, political, social, economic, environmental.
Feedback:conceptual
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. Copenhagen School
b. the Paris School
c. Aberystwyth School
d. National War College
22) The U.S. Department of Defense’s first report on climate change as a security threat was published in ___________.
Feedback:factual
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. 1990
b. 2003
c. 1994
d. 2000
23) Climate change was famously labeled by __________ as the “mother of all security problems.”
Feedback:applied
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. The New Yorker
b. National Geographic
c. Time magazine
d. Fortune magazine
24) Security of the individual within the global context of intrastate violence, civilian casualties, and human rights violations was the focal point of both scholars and policymakers in the _____________.
Feedback:applied
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. 1990s
b. 2000s
c. 1960s
d. 1970s
25) Which of the following most closely adheres to the Copenhagen School’s focus on securitization?
Feedback:applied
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. liberal approaches to security studies
b. realist approaches to security studies
c. feminist and gender-focused approaches to security studies
d. world system approaches to security studies
26) In 2018 the estimated value of transfer agreements in major arms worldwide was approximately _________.
Feedback:factual
Chapter Section Reference: Arms Control
a. $90 billion
c. $70 billion
d. $65 billion
27) One of the earliest statements concerning human security appeared in the ____________________.
Feedback:applied
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. 1995 UN Report on Poverty
b. World Development Report 1990: Poverty
c. UN’s 1994 Human Development Report
d. 1987 Report of the World Commission on Environment and Development: Our Common Future
28) ______________, a prominent Canadian politician, supports human security logic because it puts people first and recognizes that their safety is integral to the promotion and maintenance of international peace and security
Feedback:factual
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. Pierre Trudeau
b. Jagmeet Singh
c. Lloyd Axworthy
d. Kim Campbel
29) The chapter references three types of freedom as it relates to an important UN Report. Which one of the following was not highlighted?
Feedback:conceptual
Chapter Section Reference: Broadening and Deepening the Security Agenda
a. freedom of speech
b. freedom from want
c. freedom from fear
d. freedom to take action on one’s own behalf
30) Which of these countries is not one of the five leading arms exporters?
Feedback:factual
Chapter Section Reference: Arms Control
a. Russia
b. France
c. Germany
d. Brazil
31) It is estimated that close to ___________ of arms sales go to developing nations.
Feedback:factual
Chapter Section Reference: Arms Control
a. 55%
b. 60%
c. 40%
d. 48%
32) For the period of 2014-2018, ___________ was the world leading exporter of arms.
Feedback:factual
Chapter Section Reference: Arms Control
a. Brazil
b. The United States
c. Russia
d. China
33) Arms control advocates argue that ________________.
Feedback:applied
Chapter Section Reference: Attempting Arms Control
a. there should be a better trading mechanism for arms globally.
b. profits from global arms should be evenly distributed.
c. a decline in the number and power of weapons systems will ease political tensions.
d. if every state has enough arms, then global security will be better.
34) The two bilateral Strategic Arms Reduction Treaties (START I and II) are important arms control treaties between_____________.
Feedback:applied
Chapter Section Reference: Attempting Arms Control
a. the U.S. and Russia
b. China and the UK
c. Canada and Mexico
d. Germany and France
35) All of these are attempts at controlling arms except for ______________.
Feedback:conceptual
Chapter Section Reference: Attempting Arms Control
a. numerical restrictions
b. deployment restrictions
c. geographic restrictions
d. disbarment restrictions
36) Which of these treaties fall under the categorical restrictions?
Feedback:factual
Chapter Section Reference: Attempting Arms Control
a. Treaty on the Non-Proliferation of Nuclear Weapons (NPT)
b. Treaty for the Prohibition of Nuclear Weapons in Latin America
c. the Convention on Cluster Munitions
d. the Comprehensive Test Ban Treaty (CTBT)
37) The Small Arms Survey (2011) estimated that civilian conflict deaths due to small arms and light weapons ranges from _______ each year.
Feedback:factual
Chapter Section Reference: Monitoring and Reporting
a. 30-50%
b. 50-70%
c. 40-80%
d. 60-90%
38) India’s drive to acquire nuclear weapons in the 1970s was a reaction in part due to the nuclear arms of ________.
Feedback:applied
Chapter Section Reference: Obstacles to Arms Control
a. Iran
b. China
c. Pakistan
d. Russia
39) _____________ is a controversial term to describe states that are perceived to be in noncompliance with the majority of prevailing rules, norms, and laws in the global system.
Feedback:conceptual
Chapter Section Reference: Obstacles to Arms Control
a. Ineffective state
b. Least developing state
c. Rogue state
d. Marginalized state
40) In the Odyssey, _________ claims that “the blade itself incites to violence.”
Feedback:applied
Chapter Section Reference: Seeking Security: Obstacles to Arms Control
a. Protagoras
b. Socrates
c. Plato
d. Homer
41) In discussing arms control negotiations with the Soviet Union, ______________ famously said trust, but verify.
Feedback:factual
Chapter Section Reference: Obstacles to Arms Control
a. Harry Truman
b. John F. Kennedy
c. Richard Nixon
d. Ronald Reagan
42) Which of these agencies is tasked for on-site inspections on arms control?
Feedback:applied
Chapter Section Reference: Obstacles to Arms Control
a. The North Atlantic Treaty Organization (NATO)
b. Amnesty International
c. International Atomic Energy Agency (IAEA)
d. Global Partnership for the Prevention of Armed Conflict (GPPAC)
43) __________refers to an arrangement that often generates strong domestic opposition to arms control.
Feedback:conceptual
Chapter Section Reference: Obstacles to Arms Control
a. Triad
b. Defense diplomacy
c. Military-industrial complex
d. Military apparatus
44) The ___________ between the Clinton Administration and Kim Jong-Il would have bound North Korea to abandon its weapons program.
Feedback:conceptual
Chapter Section Reference: Obstacles to Arms Control
a. U.S. North Korea Nuclear Nonproliferation Treaty
b. The Nuclear Weapon Treaty
c. Framework Agreement
d. U.S. North Korea Partnership
45) Korea withdrew from the Nuclear Nonproliferation Treaty in _______________.
Feedback:factual
Chapter Section Reference: Obstacles to Arms Control
a. 2000
b. 1998
c. 2003
d. 1990
46) Which of these countries was not a part of the “Six Party Talks” to deal with North Korea’s nuclear weapon delivery capabilities?
Feedback:factual
Chapter Section Reference: Obstacles to Arms Control
a. U.S.
b. Russia
c. India
d. Japan
47) A realist would argue that arms sales among countries would __________________.
Feedback:applied
Chapter Section Reference: Arms Control
a. create more trust among countries
b. help create stabilizing balances of power among states
c. help creates a hegemonic power among state
d. solve economic downfall of countries
48) ____________ is any effort to control or contain an ongoing conflict between politically motivated actors operating at the state or sub-state level.
Feedback:conceptual
Chapter Section Reference: Conflict Management
a. Conflict Management
b. Conflict Resolution
c. Conflict Deliberation
d. Conflict Regulation
49) Which of the following is not a part of the idea of collective security?
Feedback:applied
Chapter Section Reference: Collective Security
a. The global community understands a state's national interest should always supersede the interest of the international community.
b. Armed aggression is an unacceptable form of international political behavior.
c. The provision of security (including the prevention and reversal of acts of aggression) is the duty of all actors in the global political system
d. An act of aggression against a member with good standing in the international community is an act of aggression against all.
50) Which of the following is not typically the role of peacekeeping operations?
Feedback:applied
Chapter Section Reference: Peacekeeping
a. to monitor ceasefires
b. maintain buffer zones,
c. facilitate security
d. capture valuable resources
51) Which of the following is not a distinctive feature of peacekeeping?
Feedback:conceptual
Chapter Section Reference: Peacekeeping
a. impartiality
b. hold or acquire territory
c. limited reliance on coercive force
d. consent from the combatants
52) North Korea announced its nuclear weapons capability _______ after they withdrew from the Nuclear Nonproliferation Treaty.
Feedback:factual
Chapter Section Reference: Seeking Security: Illustrations
a. one year
b. three years
c. two years
d. one and half-years
53) Which of the following was not a peace enforcement mission?
Feedback:applied
Chapter Section Reference: Peace Enforcement
a. Operation Urgent Fury
b. Australian-led International Force for East Timor
c. Operation Allied Force in Kosovo
d. United Nations Organization Mission in the Democratic Republic of the Congo
54) Which chapter of the UN Charter was invoked by the UN Security Council in September 2003 to authorize the UN Mission in Liberia?
Feedback:conceptual
Chapter Section Reference: Peace Enforcement
a. Chapter VI
b. Chapter VII
c. Chapter V
d. IV
55) The term “peace enforcement” was popularized by Former UN Secretary-General _________________.
Feedback:applied
Chapter Section Reference: Peace Enforcement
a. Ban Ki-moon
b. Kofi Annan
c. Boutros Boutros-Ghali
d. Javier Pérez de Cuéllar
56) The Uppsala Conflict Data Programme (Sweden) outlined only _________ wholly inter-state conflicts in 2017.
Feedback:factual
Chapter Section Reference: Shifting Rules: State Sovereignty in Decline
a. five
b. two
c. ten
d. one
57) The UN Transitional Administration in East Timor took place in _____________.
Feedback:factual
Chapter Section Reference: Peacekeeping
a. 1995
b. 2001
c. 1999
d. 1997
58) All of these are aspects of the new security environment except for _____________.
Feedback:applied
Chapter Section Reference: Defining Features: New Rules, Actors, and Threats
a. shifting rules
b. emerging actors
c. bipolarity
d. intensifying threats
59) The Uppsala Conflict Data Programme (Sweden) estimated that there were ___________ active armed conflicts in 2017.
Feedback:factual
Chapter Section Reference: Shifting Rules: State Sovereignty in Decline
a. 49
b. 40
c. 55
d. 60
60) The state’s diminished role in the contemporary security arena is underscored by all the following except for _______________.
Feedback:applied
Chapter Section Reference: Emerging Actors: The Impact of Nonstate Actors
a. the impact of multinational corporations
b. inter-state conflicts
c. transnational terrorist networks
d. paramilitaries
61) Which of the following is a goal of conflict management?
Feedback:applied
Chapter Section Reference: Conflict Management
a. to find middle ground on a conflict
b. to promote democracy in conflict areas
c. to deny the utility of aggression
d. to provide restorative justice
62) In 1993, Huntington described the new security environment post-Cold War as ____________________.
Feedback:conceptual
Chapter Section Reference: Origins: The End of the Cold War
a. the end of history
b. a multipolar balance of power within the global system
c. a clash of civilizations
d. a new world disorder
63) The dark side of interdependence within the new security environment framework refers to _______________.
Feedback:factual
Chapter Section Reference: Intensifying Threats: The “Dark Side” of Interdependence
a. the recognition of new or previously overlooked sources of insecurity
b. the global system constantly being in a state of anarchy
c. the distrust form cooperating among states
d. states usually working to pursue their self-interests
64) In 1945 during World War II the atomic bomb was dropped over ________ and __________.
Feedback:factual
Chapter Section Reference: The Threat Assessment: Weapons of Mass Destruction
a. Osaka; Kobe
b. Hiroshima; Nagasaki
c. Nagoya; Sapporo
d. Fukuoka; Kyoto
65) North America first experienced biological warfare in ____________.
Feedback:factual
Chapter Section Reference: Biological Weapons
a. 1750
b. 1780
c. 1763
d. 1793
66) In 1346 the ____________ used biological weapons as a tool of war in Kaffa, a Genoese trading outpost in the Crimea.
Feedback:factual
Chapter Section Reference: Biological Weapons
a. Mongol army
b. Tartar army
c. Volga Bulgaria army
d. Novgorod Republic army
67) The ________ Biological Weapons Convention (BWC) bans the production, possession, and use of germ-based biological weapons.
Feedback:factual
Chapter Section Reference: Biological Weapons
a. 1980
b. 1972
c. 1983
d. 1967
68) When President Trump threatened North Korea in August 2017 with “fire and fury like the world has never seen”, he was articulating the _____________.
Feedback:conceptual
Chapter Section Reference: Nuclear Deterrence and Strategy
a. mutually assured destruction logic
b. the nationalist logic
c. the superpower logic
d. nuclear utilization theory
69) The containment doctrine was a key strategy of mutually assured destruction advanced by____________.
Feedback:conceptual
Chapter Section Reference: Nuclear Deterrence and Strategy
a. George F. Kennan
b. Irving Kristol
c. Yale Richmond
d. Seymour Martin Lipset
70) The “poor man’s atomic bomb” is used to describe ______________.
Feedback:conceptual
Chapter Section Reference: Chemical Weapons
a. biological weapons
b. suicide boomers
c. chemical weapons
d. radiative weapons
71) The ability and willingness to destroy enemy weapons before the weapons explode on one's own territory and forces is supported by _____________.
Feedback:applied
Chapter Section Reference: Nuclear Deterrence and Strategy
a. the containment doctrine
b. the nuclear utilization theory
c. The non-proliferation and disarmament logic
d. the political hawk logic
Type: essay/short answer question
Title: Chapter 08 Question 01
1) What are weapons of mass destruction (WMD)?
Feedback: Provide examples from the chapter.
What are the major security threats of WMD?
Type: essay/short answer question
Title: Chapter 08 Question 02
2) What is the security dilemma?
Feedback: Define the security dilemma.
What are some of the examples of the security dilemma?
Discuss the logic of self-help anarchy.
Type: essay/short answer question
Title: Chapter 08 Question 03
3) Explain the concept of wagoning.
Feedback: What is the goal of wagoning?
Which theoretical perspective best explain wagoning?
Give some examples of wagoning.
Type: essay/short answer question
Title: Chapter 08 Question 04
4) In 100 words, explain balance of power politics.
Feedback: Provide examples of balance of power.
Examine the importance of alliances as a strategy to balance power.
Provide examples of past or present alliances as a way to balance power.
Type: essay/short answer question
Title: Chapter 08 Question 05
5) Describe and give examples of rogue states.
Feedback: How do you define a rogue state?
What are some of the characteristics of rogue states?
What are some of the human rights violations of rogue states?
Type: essay/short answer question
Title: Chapter 08 Question 06
6) Explain the concept of Responsibility to Protect (R2P).
Feedback: What is the Responsibility to Protect?
Explain the concept of human security.
What are the elements of human security as outlined in the UN’s 1994 Human Development Report?
Type: essay/short answer question
Title: Chapter 08 Question 07
7) Describe and explain the idea of collective security.
Feedback: What are the core ideas behind collective security?
Give examples of regional or global institutionalized collective security arrangements.
What are some failures of collective security?
Type: essay/short answer question
Title: Chapter 08 Question 08
8) Explain the term conflict management as a security strategy/approach.
Feedback: Define the term conflict management.
What are some of the different forms of conflict management?
Explain the term peace enforcement.
Type: essay/short answer question
Title: Chapter 08 Question 09
9) Explain the importance of peacekeeping missions.
Feedback: What are some examples of peacekeeping missions?
What are the goals of peacekeeping?
Explain some of the political and strategic aspects of peacekeeping.
Type: essay/short answer question
Title: Chapter 08 Question 10
10) What is the military-industrial complex?
Feedback: Describe the term military-industrial complex.
Who benefits from the military-industrial complex?
Who are the main actors of the military-industrial complex?
Type: essay/short answer question
Title: Chapter 08 Question 11
11) Is state sovereignty in decline?
Feedback: What is state sovereignty?
How do new security issues challenge state sovereignty?
What does the empirical data on state sovereignty tell us?
Type: essay/short answer question
Title: Chapter 08 Question 12
12) Reflect on the war on drugs as a security threat in Mexico.
Feedback: Which theoretical perspective best explain the war on drugs as a security threat?
How does the drug war in Mexico impact the U.S.?
How does the drug war in Mexico impact the rest of the world?
Type: essay/short answer question
Title: Chapter 08 Question 13
13) How do non–state Actors transform the security debate?
Feedback: Define and describe non–state actors.
With examples, explain some of the strategies employed by non–state actors to undermine a country’s security.
How do non–state actors interrupt a state’s security?
Type: essay/short answer question
Title: Chapter 08 Question 14
14) How has globalization complicated the security process?
Feedback: Explain the process of complex interdependence.
How has globalization promoted terrorism?
With examples demonstrate how globalization has support security activism.
Type: essay/short answer question
Title: Chapter 08 Question 15
15) What is the significance of the United Nations Security Council Resolution (UNSCR) 1325?
Feedback: Explain the concept of new security environment.
Why was this resolution unanimously adopted by the United Nations Security Council?
With examples demonstrate the gender perspective of this resolution.
Type: essay/short answer question
Title: Chapter 08 Question 01
1) Historically, the realist approach to global politics has been the most recognized. However, there has been push-back to the realist approach, especially within security studies. Write an essay outlining the significant criticisms and limits of the realist approach to security studies.
Feedback: What is the realist approach to security studies?
What are the primary concerns of a realist scholar?
What are the limits of a realist approach to security studies?
What are the major alternatives to the realist approach to security scholarship?
Is the realist approach to security still relevant? Why or why not?
Type: essay/short answer question
Title: Chapter 08 Question 02
2) As explained in the chapter, much of the debates on national security have become synonymous with attaining and amassing military force sufficient to deter aggression. Write an essay examining the above statement.
Feedback: Do a historical analysis of the traditional security approach.
Should states continue growing their military apparatus? If so, why?
Examine some of the successes of using military force.
Examine some of the failures of using military force.
Type: essay/short answer question
Title: Chapter 08 Question 03
3) The U.S.-North Korea relationship has been well documented in security studies. Write an essay evaluating the various attempts by the U.S. to have nuclear weapon agreements with North Korea for the past two decades.
Feedback: What are some of the major security issues on the Korean Peninsula?
Should both North and South Korea have access to nuclear weapons? Give reasons for your answer.
What are some of the major attempts by the U.S. to reach a nuclear deal with North Korea?
What are some of the successes and failures of the U.S.-Korean nuclear deal?
Prescribe a way forward for the U.S.-Korean security issue.
Type: essay/short answer question
Title: Chapter 08 Question 04
4) With the end of the Cold War, there have been many ethnic conflicts and humanitarian crises that are challenging the traditional definitions and applications of security. Through 3 different case studies, write an essay comparing and contrasting ethnic conflicts in three different regions in the world.
Feedback: Identify a significant ethnic conflict in Africa, Europe, and Asia post-Cold War.
What were or are the reasons for these conflicts?
What are some of the similarities between these conflicts?
How did the international community react to these various conflicts?
In what ways is the current Trade War affecting ordinary citizens?
How were the conflicts resolved? If the conflicts are ongoing, how should they try to resolve them?
Type: essay/short answer question
Title: Chapter 08 Question 05
5) In an attempt to enhance security, states and the international community have created many international mechanisms. Write an essay evaluating the effectiveness of the international community to curb and control the sale of arms.
Feedback: Who are the leading producers of arms?
Who are the primary consumers of arms?
What are the various restrictions imposed by the international community to control the sale of rms?
Evaluate the effectiveness of different international treaties on arms control. Discuss methods of monitoring, evaluation, and compliance.
What are some of the significant obstacles to arms control?