Exam 12: National Security and Insecurity
Exam 1: Power and Systems34 Questions
Exam 2: IR Theories32 Questions
Exam 3: Why War38 Questions
Exam 4: Americas Changing National Interests35 Questions
Exam 6: Can the United States Lead the World34 Questions
Exam 7: From Colonialism to Decolonization34 Questions
Exam 8: Eternal Warfare in the Holy Land35 Questions
Exam 9: Oil and Turmoil: The Persian Gulf40 Questions
Exam 10: Trouble and Hope in Latin America37 Questions
Exam 11: Development in Rich and Poor Countries36 Questions
Exam 12: National Security and Insecurity39 Questions
Exam 13: Internal Conflict35 Questions
Exam 14: Asymmetrical Warfare36 Questions
Exam 15: If the Euro Fails, Europe Fails34 Questions
Exam 16: Asia Awakes33 Questions
Exam 17: The United States and Globalization41 Questions
Exam 18: Diplomacy Is Still Alive35 Questions
Exam 19: The Uses of International Law33 Questions
Exam 20: The Reach of the United Nations33 Questions
Exam 21: Finite Few Foodenergywater36 Questions
Select questions type
Which of the following is chiefly credited with creating and confirming the end of Cold War?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
A
Which of the following is the most accepted element of security?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
Which attempt to ban weapons provides the least support for the potential of disarmament?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
A
A state that is utilizing the bandwagoning approach to security would ________.
(Multiple Choice)
4.7/5
(45)
Can deterrence work in the post-Cold War world? Specifically, is deterrence an effective security strategy when dealing with rogue states? What about terrorists? Why or why not? What evidence exists to support your claims?
(Essay)
4.9/5
(38)
Which security strategy or strategies is/are heavily dependent on the assumption that all governments will act rationally and as a result of a cost-benefit calculation?
(Multiple Choice)
4.8/5
(41)
Hegemony and bandwagoning are contradictory approaches to security.
(True/False)
4.8/5
(38)
How is technology related to national security? Discuss how a state's success at employing the four strategies relates to the type and level of military technology at its disposal.
(Essay)
4.9/5
(37)
Can any of the strategies work alone? How do they work better in combination? Discuss some possible combinations of these strategies with suitable examples.
(Essay)
4.8/5
(36)
When more states started acquiring nuclear weapons, it triggered proliferation.
(True/False)
4.7/5
(34)
Proponents of national missile defense argue that ________.
(Multiple Choice)
4.8/5
(28)
According to the text, which of the following is NOT a basic strategy for national security?
(Multiple Choice)
4.8/5
(32)
States pursue only two strategies to achieve security: defense and deterrence.
(True/False)
4.8/5
(31)
Detente diplomacy is successful when common interests are far less than conflictual interests.
(True/False)
4.9/5
(40)
What are the four ways that states ensure their security? Describe each and provide examples. Must all of these strategies be utilized simultaneously or are they sufficient on their own or in different combinations?
(Essay)
4.8/5
(36)
Which of the following concepts closely relates to deterrence?
(Multiple Choice)
4.7/5
(37)
Defense is the most viable security strategy for dealing with terrorist threats.
(True/False)
4.9/5
(37)
If you fundamentally believed that disarmament could prevent war, then you would believe that war is a learned, rather than natural, behavior.
(True/False)
4.8/5
(38)
How is the United States currently pursuing national security? Which of the four strategies, or what combination of the four, are currently the center of American foreign policy? Has there been a shift from the Bush 43 administration to the Obama administration? Make sure that you reference at least four interactions with at least three different countries when formulating your answer.
(Essay)
4.9/5
(36)
Showing 1 - 20 of 39
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)