Unit 3: Global Security: Old Issues, New Realities

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following has been the longest U.S. military intervention?

Afghanistan

In which two countries did the U.S. engage in major military operations as part of its global war on terror?

Afghanistan and Iraq

At the height of U.S. military presence, how many U.S. service members were in Afghanistan?

100,000

When did World War I start?

1914

When did the Holocaust take place?

1933-1945

When did the United States enter World War II?

1941

How does a virus get onto a computer (select all that apply, there are one to four correct answers)?

A user can be lured to install a fake program that releases a virus (e.g., a prompt to install a fake security update) A software already on your computer has a vulnerability that allows an attacker entry to spread a virus

How many people did the U.S. evacuate in the two-plus weeks prior to the withdrawal of its last forces in Afghanistan?

About 120,000 American citizens and Afghan allies

Which of the following organizations was responsible for the terrorist attacks on September 11, 2001?

Al Qaeda

Why did the U.S. decide to wage war against Afghanistan when al Qaeda carried out the 9/11 terrorist attacks?

Because the Taliban regime that ruled Afghanistan was giving refuge to al Qaeda

Match the events to the dates

Beginning of WWI -1914 U.S. enters WWI - 1917 End of WWI - 1918 Japanese invasion of China (begin WWII in Asia) - 1937 Germany invades Poland (begin WWII in Europe) - 1939 Japanese bombing of Pearl Harbor; U.S. enters WWII - 1941 End of WWII - 1945

How did President Truman convince a reluctant Congress to appropriate hundreds of millions of dollars to aid Europe?

By scaring the American people about the communist threat which in turn put pressure on Congress to act

Which of the following are examples that illustrate the multifaceted and interconnected nature of security (select all that apply, there are one to four correct answers)?

Civil wars can lead to a refugee crisis in a neighboring state The top ten causes of death worldwide are diseases and not war Outbreak of a disease in one country can spread to other countries (and not just neighboring ones)

In addition to millions of other people, how many Jews were murdered by Nazi Germany and its collaborators (select all that apply, there are one to four possible correct answers)?

Close to two out of every three Jews in Europe were murdered Close to 6 million Jews were murdered (out of the estimated 9 million in Europe)

What strategy was associated with the U.S. foreign policy during the entire period of the Cold War?

Containment

What do we know about cybercriminals?

Cybercriminals can be international terrorists, drug traffickers, or teenagers competing for bragging rights

Which events underscored the "bloody end" to the U.S.'s 20 year-long war in Afghanistan (select all that apply, there are one to four correct answers)?

ISIS-K launched an attack outside Kabul airport killing at least 170 Afghans and 13 American service members A U.S. drone strike targeting ISIS in Afghanistan killed 10 civilians, including 7 children

Since the beginning of the 2001 war in Afghanistan, in addition to al Qaeda what other terrorist organization has operated in the country and tried to control territory?

Islamic State in Afghanistan (also known as ISIS-K)

The Cold War was "cold" because (select all that apply, there are one to four possible correct answers):

It never led to an outright war between the superpowers in Europe It never led to a military confrontation involving the actual territory of the two superpowers

What was the 1964 Gulf of Tonkin Resolution (select all that apply, there are one to four possible correct answers)?

It was the official start of the U.S.'s expansion of military involvement in Vietnam

The superpowers used the conflicts in or between other countries (such as ______________ and _____________) as a way to increase their influence in the world.

Korea / Vietnam

Under the traditional concept of security (select all that apply, there are one to four correct answers):

Lack of war, or negative security, is at the base of national security A country's military and its size and strength are primary factors in security considerations Countries focus on protecting themselves against military foreign attacks

Created after the First World War, the __________ was an attempt by states to create a broad IGO to help maintain peace and allow for the self-determination of peoples:

League of Nations

When did the U.S. invasion of Iraq start (Operation Iraqi Freedom)?

March 2003

What event is seen as the "beginning of the end of the Cold War"?

Mikhail Gorbachev's ascension to power in 1985

What led to the official start of World War II in Europe?

Nazi Germany's invasion of Poland

Which of the following concepts were part of the post-WWI blueprint for international cooperation (select all that apply, there are one to four possible correct answers)?

Readjustment of territories and the creation of new states The principle of national self-determination The creation of the League of Nations

Who were the leaders of the Soviet Union and the United States that ushered in the eventual end of the Cold War?

Ronald Reagan and Mikhail Gorbachev

Which of the following are real-life examples of cyber-attacks (select all that apply, there are one to four correct answers)?

Russian hackers temporarily shutting down government computers and commercial servers in Estonia in 2007 and in Georgia in 2008 Chinese army officers suspected of being responsible for thousands of breaches of U.S. government and corporate websites A cyber-attack in 2017 on Ukraine's infrastructure leading to the state-owned energy provider, most domestic businesses, and even medical facilities being forced to operate by pen and paper for several days Iranian hackers blackmailing the city of Atlanta by infiltrating its computer systems with a ransomware virus

Which event is seen as a key catalyst for a return to a more traditional focus on military security?

September 11th terrorist attacks, 2001

What did the events in Greece and Turkey mean to the U.S.'s understanding of its post-WWII role in the world (select all that apply, there are one to four possible correct answers)?

That the U.S. as the only capable world power needed to resist the inevitable expansion of the Soviet Union and communism That if the two countries were not helped, the Soviet Union would threaten the rest of Europe That a crisis in two faraway countries threatened the security of the US

What is the key UN document that formulated the idea of human security?

The 1994 Human Development Report

What was the relationship between Nazi Germany and the Soviet Union by the time the Japanese attacked Pearl Harbor on December 7, 1941.

The Germans and other Axis Powers had invaded the Soviet Union and advanced deep into Soviet territory

Why is cyber-activity so attractive to criminals and terrorists (select all that apply, there are one to four correct answers)?

The Internet provides a measure of anonymity and makes secret communications possible The internet can be used for many activities that can keep an illegal or terrorist organization going (e.g. fundraising, communication, training, etc.) Cyber-attacks are easier to carry out than traditional military operations Even when security experts try to stay ahead of online criminal activity, new websites, malicious worms, or viruses can be created very quickly

What led to the official start of World War II in Asia?

The Japanese invasion of China in 1937

Which of the following returned to power when the U.S. withdrew its last forces from Afghanistan in 2021?

The Taliban

What are the reasons given in the PBS video that explain why the US intelligence community is convinced that Russia's Foreign Intelligence Service (SVR) was behind the SolarWinds cyber-espionage attacks? (select all that apply, there are one to four correct answers)?

The attack was very well planned and executed The attack showed restraint, something other Russian cyber entities are not known for The quiet, patient, and deliberate nature of the attack

Which of the following was the main reason given why the US decided to openly participate militarily in WWII?

The attacks by the Japanese against the U.S. at Pearl Harbor, HI

Human security requires recognizing (select all that apply, there are one to four possible correct answers):

The fact that some of the main causes of death today are not from wars The importance of nonmilitary threats to security, including human rights abuses, environmental degradation, health issues, migration flows, poverty and more That there are multiple and interconnected causes of insecurity That in addition to a lack of war, security needs to ensure that basic human needs are met

Which of the following are common factors of terrorism (select all that apply, there are one to four possible correct answers)?

The violence is premeditated and political Attacks are justified by the belief that they will transform the political landscape in a beneficial way Attacks are concentrated against civilians and/or noncombatants

What were the ages of the 13 U.S. service members killed in the ISIS-K attack on Kabul airport as U.S. forces withdrew from Afghanistan in August 2021?

The youngest were in their early 20s and the oldest was 31 years old

What were some of the demands made by the more than 8,000 demonstrators engaged in a silent protest parade down Fifth Avenue in 1917 (select all that apply, there are one to four possible correct answers)?

They asked that the U.S. be made safe for democracy They protested President Wilson's refusal to call out racist violence against African Americans who were preparing to fight in WWI

Which of the following are reasons why cyber-attacks are easier to carry out than traditional military operations?

They can be carried out by many different actors (states, non-state actors, private individuals)

What was the relationship between Nazi Germany and the Soviet Union when the German army invaded Poland on September 1, 1939 (select all that apply, there are one to four possible correct answers)?

They had agreed to divide territories in Poland and Eastern Europe into German and Soviet spheres of influence They had signed a non-aggression pact and agreed not to attack each other

Match the following terms with the concept of security.

Traditional security Importance of military "hard" power Protect against external threat Focus on a state's military preparedness ("security through armaments") Human security Basic human needs Importance of non-state actors Focus on interconnected security ("security through sustainable human development") Shared interests and cooperation between states Multiple causes of insecurity

Before it carried out the attacks against the US on September 11th, 2001, for which of the following attacks was al Qaeda also responsible?

US embassy bombings in Africa in 1998

Which of the following are examples of where the Cold War rivalry between the superpowers became "hot" (select all that apply, there are one to four possible correct answers)?

Vietnam Korea

What are proxy wars (select all that apply, there are one to four possible correct answers)?

Wars such as those seen in Korea and Vietnam These are wars within or between smaller states where the conflict parties are supported by (and thus serve the interests of) other powers These are conflicts, especially during the Cold War, where the superpowers did not fight each other directly but used other conflicts as stand-ins for their interests

What was the main goal of the Truman Doctrine?

containment of communism

Match the following key points to the time period.

• Decline of French and British empires- World War II • Beginning of the Holocaust- Inter-war years (period between the wars) • Pearl Harbor- World War II • Trench warfare- World War I • End of Austro-Hungarian Empire- World War I • Rise of Nazi Party in Germany- Inter-war years (period between the wars) • Use of mustard gas- World War I • Japanese invasion of China- World War II • Collapse of Ottoman empire- world War I


Set pelajaran terkait

Verbs - expressing physical, mental action or a state of being

View Set

Ch. 8 - Product Architecture and Product Design

View Set

GEB Chapter 13, Chapter 9 ,10,11,12

View Set

Higher Electricity- Operational Amplifiers

View Set

Unit 8.10 Investment Co Act of 1940

View Set

LearningCurve: 14d. Schizophrenia

View Set

Chapter 57: Drugs Affecting Gastrointestinal Secretions

View Set

Complete First - Unit 14 Reading and Use of English pt. 6 pgs. 154-155

View Set