Filters
Question type

Study Flashcards

The exploitation of or attack on information systems is referred to as ________________.

Correct Answer

verifed

verified

Technology is not used by terrorists.

Correct Answer

verifed

verified

The first line of defense against terrorism is


A) federal law enforcement.
B) the United Nations.
C) the patrol officer in the field.
D) the U.S. military.
E) the state police.

Correct Answer

verifed

verified

Potential terrorists are only male and have ties to foreign countries.

Correct Answer

verifed

verified

Homeland security encompasses far more than the nation's collective efforts to prevent and respond to terrorist acts.

Correct Answer

verifed

verified

Technological terrorism is not a threat.

Correct Answer

verifed

verified

A/an ____________________ is a holy war.

Correct Answer

verifed

verified

________ ________ are designed to share information between federal,state,and local law enforcement agencies.

Correct Answer

verifed

verified

Most terrorist acts result from frustration resulting from an inability to change things through acceptable,nonviolent means.

Correct Answer

verifed

verified

The Army of God,a pro-life extremist group,has been involved in assassinations.

Correct Answer

verifed

verified

MATCHING Each item may be matched only once. Select the best match. -a loose network of individuals scattered across the United States who believe that the original citizens of the United States were free from all government control and that the federal,state,and local governments today operate illegally


A) asymmetric war
B) bioterrorism
C) contagion effect
D) cyberterrorism
E) agroterrorism
F) ecoterrorism
G) jihad
H) fusion center
I) sovereign citizens
J) interoperability

Correct Answer

verifed

verified

MATCHING Each item may be matched only once. Select the best match. -terrorism that initiates,or threatens to initiate,the exploitation of or attack on information systems


A) asymmetric war
B) bioterrorism
C) contagion effect
D) cyberterrorism
E) agroterrorism
F) ecoterrorism
G) jihad
H) fusion center
I) sovereign citizens
J) interoperability

Correct Answer

verifed

verified

The lead agency for consequence management (after an attack) is


A) FEMA.
B) the FOP.
C) the CIA.
D) the FBI.
E) the USSS.

Correct Answer

verifed

verified

Bioterrorism is the most likely terrorist act to occur because it is the easiest.

Correct Answer

verifed

verified

MATCHING Each item may be matched only once. Select the best match. -a subset of bioterrorism,it is the intentional release of animal or plant toxins to generate widespread public fear and economic loss and undermine social stability


A) asymmetric war
B) bioterrorism
C) contagion effect
D) cyberterrorism
E) agroterrorism
F) ecoterrorism
G) jihad
H) fusion center
I) sovereign citizens
J) interoperability

Correct Answer

verifed

verified

Theodore Kaczynski is known as the Unabomber.

Correct Answer

verifed

verified

MATCHING Each item may be matched only once. Select the best match. -the ability of public officials to communicate with each other seamlessly in real time by voice or data transmissions


A) asymmetric war
B) bioterrorism
C) contagion effect
D) cyberterrorism
E) agroterrorism
F) ecoterrorism
G) jihad
H) fusion center
I) sovereign citizens
J) interoperability

Correct Answer

verifed

verified

Going from most likely to least likely,select the order in which the following weapons of mass destruction are likely to be used in a terrorist attack.


A) incendiary devices and explosives, chemical devices, biological weapons
B) chemical devices, biological weapons, incendiary devices and explosives
C) biological weapons, chemical devices, incendiary devices and explosives
D) biological weapons, incendiary devices and explosives, chemical devices
E) chemical devices, incendiary devices and explosives, biological weapons

Correct Answer

verifed

verified

One concern related to the "war on terrorism" is that civil liberties may be jeopardized.

Correct Answer

verifed

verified

A dual threat to law enforcement means


A) officers must keep a watchful eye on international terrorism as well as domestic terrorism.
B) there are sleeper cells within America.
C) officers must keep a watchful eye on anti-law enforcement groups and domestic terrorism.
D) terrorists may use biological and chemical agents against key targets.

Correct Answer

verifed

verified

Showing 21 - 40 of 85

Related Exams

Show Answer