Ch.8 Sea Change The New Terrorism + Test Questions & Answers - Homeland Security 3e Complete Test Bank by Gus Martin. DOCX document preview.

Ch.8 Sea Change The New Terrorism + Test Questions & Answers

Chapter 8: Sea Change: The New Terrorism and Homeland Security

Test Bank

Multiple Choice

1. What are soft targets?

A. military arsenals and combat outposts

B. civilians and passive military targets

C. naval bases and air stations

D. garrisons and military camps

Learning Objective: 8-1: Define and discuss attributes of the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Opening Viewpoint: The New Terrorism and Soft Targets

Difficulty Level: Easy

2. Which of the following is an attribute of the New Terrorism?

A. clearly identifiable organizations or movements

B. the view that civilian casualties are “collateral damage” to the intended target

C. utilization of modern networking technologies

D. focused messaging to a small, targeted national audience

Learning Objective: 8-1: Define and discuss attributes of the New Terrorism.

Cognitive Domain: Comprehension

Answer Location: Introduction

Difficulty Level: Medium

3. ______ are conventional or unconventional adversaries who engage in armed conflict as members of regular military or irregular guerrilla fighting units.

A. Noncombatants

B. Extremists

C. Old Terrorists

D. Combatants

Learning Objective: 8-1: Define and discuss attributes of the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Combatants, Noncombatants, and the Use of Force

Difficulty Level: Easy

4. ______ is regularly condemned when used in any non-warfare environment, regardless of the characteristics of the victim.

A. Use of force

B. Blind force

C. Indiscriminate force

D. Discriminate force

Learning Objective: 8-1: Define and discuss attributes of the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Indiscriminate and Discriminate Use of Force

Difficulty Level: Easy

5. Which term describes the “copy-catting” phenomenon among terrorists where one terrorist group imitates another’s tactics?

A. totalitarian method

B. contagion effect

C. fear dyad

D. proxy warfare method

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Knowledge

Answer Location: The Pre-September 11 Terrorist Environment

Difficulty Level: Easy

6. Insurgencies like those led by Mao Zedong in China, Ho Chi Minh in Vietnam, and Fidel Castro in Cuba are examples of wars of ______.

A. national liberation

B. loyalism

C. capitalism

D. traditionalism

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Knowledge

Answer Location: Proxy Warfare: Ideological Conflict and the Old Terrorism

Difficulty Level: Easy

7. Groups from ______ and ______ figured prominently in left-wing domestic and international terrorist incidents between the 1960s and the early 1980s.

A. North Africa; Southeast Asia

B. North America; North Africa

C. Latin America; Western Europe

D. South America; Eastern Europe

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Knowledge

Answer Location: The Recent Past: The Left-Wing Terrorist Environment Prior to September 11, 2001

Difficulty Level: Easy

8. Beginning in the late 1960s, ______ nationalists were the leading practitioners of international terrorism.

A. Palestinian

B. Israeli

C. Northern Irish

D. White

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Knowledge

Answer Location: Ongoing Communal Conflict: The Palestinian Terrorist Environment

Difficulty Level: Easy

9. Which of the following was the most serious domestic incident of religious terrorism on United States soil prior to September 11, 2001?

A. the 2000 sinking of the U.S.S. Cole in Yemen

B. the 1998 embassy bombings in Nairobi, Kenya, and Dar es Salaam, Tanzania

C. the 2000 Palestinian bombings on the Gaza strip

D. the 1993 vehicular bomb detonated at the World Trade Center by Ramzi Yousef

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Knowledge

Answer Location: The Religious Terrorist Environment and the New Terrorism

Difficulty Level: Easy

10. Which of the following is an attribute of the Old Terrorism?

A. loose cell-based networks

B. skillful manipulation of the media

C. political vagueness

D. a “surgical” selection of targets

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Comprehension

Answer Location: Historical Context: The “Old Terrorism” Prior to September 11, 2001

Difficulty Level: Medium

11.______ terrorism is political violence conducted by groups of “true believers” who have fervent faith in the sacred righteousness of their cause.

A. Political

B. Religious

C. Environmental

D. Philosophical

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Religion and Terrorism in the Modern Era

Difficulty Level: Easy

12. Which of the following is considered a cause for the globalization of political violence?

A. new information technologies

B. established bureaucracies within terrorist networks

C. increased predictability of terrorist acts

D. vacuums of political leadership

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Comprehension

Answer Location: The New Terrorism and Globalization

Difficulty Level: Medium

13. Which of the following best describes a type of asymmetrical attack that has been gaining popularity among terrorists since 2014?

A. armored vehicle attacks using explosives

B. motorized vehicle attacks using unarmored, nonexplosive vehicles

C. Molotov cocktails being thrown from public transportation vehicles

D. stealing tanks from the armed forces and driving them into concerts

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Application

Answer Location: Asymmetrical Warfare and the Contagion Effect: The Case of Motorized Vehicle Attacks

Difficulty Level: Medium

14. Proponents of New Terrorism justify their goal of maximizing casualties because they want to attract attention to their cause, damage the economies of their enemies, make enemy populations scrutinize their demands, and ______.

A. carry out religious mandates

B. generate revenue

C. collect raw materials

D. return to traditional methods

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Comprehension

Answer Location: Maximum Casualties and the New Terrorism

Difficulty Level: Medium

15. The ______ describes the emerging mode of conflict and crime in which the protagonists use network forms of organization and related doctrines, strategies, and technologies attuned to the information age.

A. Internet contagion theory

B. netwar theory

C. protagonist method

D. combatant method

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Netwar: A New Organizational Theory

Difficulty Level: Easy

16. Experts do not know how many people count themselves as Al-Qaeda operatives, but estimates range from ______.

A. 3,000 to 5,000

B. 35,000 to 50,000

C. 350,000 to 500,000

D. 3 million to 5 million

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: The Al-Qaeda Network

Difficulty Level: Easy

17. The main goals of ISIS are first, to refuse to recognize the borders of Syria, Iraq, and other nations and second, ______.

A. to wage war against the United States and claim all of its territory

B. to protest anti-Muslim sentiments worldwide and win converts to their faith

C. to win control of the government through legitimate, democratic means

D. to wage war to establish a renewed Islamic state that will encompass the entire Muslim world

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Comprehension

Answer Location: ISIS

Difficulty Level: Medium

18. Counterterrorist experts seek to prevent terrorist groups from finalizing their plans, deter extreme activists from becoming terrorists, minimize destruction and casualties, and ______.

A. procure weapons of mass destruction to destroy disputed territories

B. use social media to infiltrate all terrorist organizations

C. implement treaties, laws, and task forces to create a counterterrorist environment

D. create stricter immigration laws

Learning Objective: 8-4: Evaluate possible counterterrorist policy options.

Cognitive Domain: Comprehension

Answer Location: Policy Options

Difficulty Level: Medium

19. Peace processes, negotiations, and social reforms are all examples of ______.

A. conciliatory options

B. dissident action

C. diplomatic immunity

D. international immunity

Learning Objective: 8-4: Evaluate possible counterterrorist policy options.

Cognitive Domain: Knowledge

Answer Location: Countering Extremism

Difficulty Level: Easy

20. Current methods of fighting New Terrorism include increased homeland security measures, counterterrorist financial operations, global surveillance, identification and disruption of transnational terrorist cells, and ______.

A. publicized mediations

B. covert shadow wars

C. invitations to join NGO’s

D. chemical warfare

Learning Objective: 8-4: Evaluate possible counterterrorist policy options.

Cognitive Domain: Comprehension

Answer Location: Countering the New Terrorism

Difficulty Level: Medium

True/False

1. There is no unanimity on what kind of violence constitutes an act of terrorism.

Learning Objective: 8-1: Define and discuss attributes of the New Terrorism.

Cognitive Domain: Comprehension

Answer Location: Defining Terrorism: An Ongoing Debate

Difficulty Level: Medium

2. The “Old Terrorism” profile included unclear grievances promoting ambiguous causes.

Learning Objective: 8-1: Define and discuss attributes of the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: The Pre-September 11 Terrorist Environment
Difficulty Level: Easy

3. During the Cold War, the United States and the U.S.S.R. engaged in a predictable pattern of behavior whereby the United States would support established governments, and the U.S.S.R. would support nationalist insurgencies.

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Comprehension

Answer Location: Proxy Warfare: Ideological Conflict and the Old Terrorism

Difficulty Level: Medium

4. The Palestinian nationalist movement created a movement characterized by the acceptance of communal dissident terrorism as a strategy.

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Comprehension

Answer Location: Ongoing Communal Conflict: The Palestinian Terrorist Environment

Difficulty Level: Medium

5. New Terrorism is characterized by rigid, strictly defined chains of command.

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Comprehension

Answer Location: September 11, 2001, and the New Terrorism

Difficulty Level: Medium

6. Asymmetrical warfare refers to the use of unexpected, nearly unpredictable, and unconventional methods of political violence.

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Asymmetrical Warfare

Difficulty Level: Easy

7. Modern-day terrorists use unconventional methods, such as asymmetrical and indiscriminate attacks, because if they used conventional methods, they would never be a match for a superpower like the United States.

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Comprehension

Answer Location: Asymmetrical Warfare and the Contagion Effect: The Case of Motorized Vehicle Attacks

Difficulty Level: Medium

8. Chain networks occur when a set of actors is tied to a central node or actor and must go through that node to communicate and coordinate.

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Netwar: A New Organizational Theory

Difficulty Level: Medium

9. The Internet, encryption applications, and social communication technologies are now used extensively by many terrorist groups and extremist movements.

Learning Objective: 8-3: Describe plausible scenarios stemming from the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: Netwar: A New Organizational Theory

Difficulty Level: Easy

10. Counterterrorism and antiterrorism are one in the same.

Learning Objective: 8-4: Evaluate possible counterterrorist policy options.

Cognitive Domain: Knowledge

Answer Location: Policy Options

Difficulty Level: Easy

Essay

1. List three attributes of the “Old Terrorism” profile.

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Knowledge

Answer Location: The Pre–September 11 Terrorist Environment

Difficulty Level: Medium

2. List three attributes of the New Terrorism profile.

Learning Objective: 8-1: Define and discuss attributes of the New Terrorism.

Cognitive Domain: Knowledge

Answer Location: September 11, 2001, and the New Terrorism

Difficulty Level: Medium

3. Summarize the counterterrorist measures available against the New Terrorism.

Learning Objective: 8-4: Evaluate possible counterterrorist policy options..

Cognitive Domain: Comprehension

Answer Location: Countering the New Terrorism

Difficulty Level: Medium

4. Briefly describe Cold War terrorist networking theory. Compare and contrast this understanding of terrorist networks with today’s terrorist networks.

Learning Objective: 8-2: Analyze the terrorist environment prior to the September 11, 2001, terrorist attacks.

Cognitive Domain: Analysis

Answer Location: Chapter Perspective 8.2: Cold War Terrorist-Networking Theory

Difficulty Level: Hard

5. Describe the difference between counterterrorism and antiterrorism.

Learning Objective: 8-4: Evaluate possible counterterrorist policy options.

Cognitive Domain: Comprehension

Answer Location: Policy Options

Difficulty Level: Hard

Document Information

Document Type:
DOCX
Chapter Number:
8
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 8 Sea Change The New Terrorism and Homeland Security
Author:
Gus Martin

Connected Book

Homeland Security 3e Complete Test Bank

By Gus Martin

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party