Exam 15: Understanding and Preventing Terrorism

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List and describe the methods used by terrorists to further their cause and how the United States can and should respond.

(Essay)
4.9/5
(32)

According to the text, all of the following are considered terrorist acts except:

(Multiple Choice)
4.7/5
(39)

The events of September 11, 2001, led to the development of the ________________, the country's first standardized management approach unifying federal, state and local -governments for incident response.

(Multiple Choice)
4.8/5
(35)

It has been estimated that approximately ________________ percent of the country's critical infrastructure is protected by private security.

(Multiple Choice)
4.7/5
(23)

An example of religiously motivated terrorists is:

(Multiple Choice)
4.7/5
(30)

A subtitle of the Homeland Security Act of 2002, called the Homeland Security Information Sharing Act, required the president to develop new procedures for ________________, as well as unclassified but otherwise sensitive information, with state and local police.

(Short Answer)
4.9/5
(44)

Who was the Unabomber?

(Multiple Choice)
4.7/5
(32)

The fight against terrorism begins in our own backyards-our own communities, our own neighborhoods-and police chiefs need to prepare themselves, their officers and their -communities-the people they've sworn to protect-against terrorism.

(True/False)
4.8/5
(42)

As a result of 9/11, the Department of Homeland Security was established, reorganizing the departments of the federal government.

(True/False)
4.8/5
(39)

________________ involves such biological weapons of mass destruction (WMDs) as anthrax, botulism, and smallpox.

(Short Answer)
4.8/5
(32)

According to the text, the coverage of terrorism inspiring more terrorism is called the:

(Multiple Choice)
5.0/5
(39)

Terrorism can survive without publicity, and the media generates much of this publicity.

(True/False)
4.9/5
(38)

The first line of defense against terrorism is the patrol officer in the field.

(True/False)
4.9/5
(32)

________________ is defined by the FBI as "terrorism that initiates, or threatens to initiate, the exploitation of or attack on information systems."

(Short Answer)
4.9/5
(43)

The contagion effect is that:

(Multiple Choice)
4.9/5
(37)

According to the text, the most common threats include ________________ agents, ________________ agents, and ________________ exposure.

(Essay)
4.9/5
(31)

The Department of Homeland Security (DHS) was established by Executive Order on -October 8, 2001, and integrated ________________ different federal departments and -agencies.

(Multiple Choice)
5.0/5
(23)

Which weapons of mass destruction do most experts predict terrorists will use?

(Multiple Choice)
4.7/5
(38)

Cyberterrorism is defined as the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in -disabling or deleting critical infrastructure data or information.

(True/False)
4.8/5
(42)

The IACP has identified five key principles that should form the basis for a national -homeland security strategy.Which of the following is one of those key principles?

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 58
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)