POLS 4202 Midterm

Ace your homework & exams now with Quizwiz!

According to the course syllabus, how many points will be added to your exam score if three of your questions are selected to be included in the exam? A. 2 points for each question, or 6 points total B. Half a point for each question, or 2.5 points total C. 5 points for each question, or 15 points total D. 1 point for each question, or 3 points total E. A student can only receive points for up to two questions. Only 4 points will be added to their exam score.

A. 2 points for each question, or 6 points total

Intelligence agencies exist for four main reasons, what are those reasons? A. Avoid strategic surprise, provide long-term expertise, support the policy process, maintain the secrecy of information, needs, and methods. B. Fight terrorism, maintain the secrecy of information, needs, and methods, influence policy makers, provide long-term expertise. C. Avoid strategic surprise, carry out covert operations, support the policy process, provide long-term expertise. D. Support the policy process, fight terrorism, carry out covert operations maintain the secrecy of information, needs, and methods. E. None of the above.

A. Avoid strategic surprise, provide long-term expertise, support the policy process, maintain the secrecy of information, needs, and methods.

What agency was Ana Montes an analyst for? A. DIA B. CIA C. FBI D. NSA E. None of the above

A. DIA

What was Ana Montes's job that gave her access to state secrets? A. Defense Intelligence Agency Analyst B. Security Officer at the Pentagon C. CIA advisor D. National Intelligence Ambassador E. Cuban Military Analyst

A. Defense Intelligence Agency Analyst

Which phase of the intelligence process rarely happens? A. Feedback. B. Dissemination. C. Identifying Requirements. D. Collection E. All phases of the intelligence process happen fully.

A. Feedback.

As of September 2004 there were ______ Directorate of Operations officers with al-Qaeda expertise than in September 2001. A. Fewer B. Two times as many C. As many D. The same or more E. At least four times as many

A. Fewer

In the United States, all intelligence is now defined as national intelligence. What are the three subsets of national intelligence? A. Foreign, domestic, and homeland security. B. Domestic, terrorism, homeland security. C. Foreign, national security, terrorism. D. US Coast Guard, terrorism, national security.

A. Foreign, domestic, and homeland security

Which of the following is NOT a part of the agent acquisition cycle? A. Identification B. Termination C. Assessment D. Recruitment E. Handling

A. Identification

According to "The Man Who Knew" video, how did an early CIA report identify Osama Bin Laden? A. Islamic Extremist Financier B. Islamic Extremist General C. Islamic Extremist Organizer D. Islamic Extremist King E. Islamic Extremist Terrorist

A. Islamic Extremist Financier

Although the syllabus is a general outline of the course semester, what is the current scheduled date of the final exam? A. May 7, 2021 B. March 15, 2021 C. March 17, 2021 D. May 5, 2021 E. April 27, 2021

A. May 7, 2021

What was the most common motivator for spies? A. Money B. Ideology C. Authority D. Security E. Ego

A. Money

What does MICE stand for? A. Money, ideology, compromise, and ego B. Money, integrity, compromise, and efficiency C. Motive, ideology, control, and ego D. Motive, integrity, control, and efficiency E. None of the above

A. Money, ideology, compromise, and ego

What act established the intelligence community in the United States? A. National Security Act of 1947 B. National Defense Act of 1954 C. National Defense Authorization Act of 2004 D. Cybersecurity and Defense Act of 1974 E. National Security Act of 1949

A. National Security Act of 1947

What are black sites? A. Prisons for High-Level Prisoners B. Terrorist sites that havent been fully mapped yet C. Terrorist training grounds D. A facility for illegal drug production E. A website for illegal activity

A. Prisons for High-Level Prisoners

Which type of intelligence addresses ongoing national security interests? A. Strategic B. Anticipatory C. Operational D. Longitudinal E. Ad hocs

A. Strategic

One of the main points of James Bamford's talk was... A. The NSA needs to be able to prove that the information they gather is valuable and prevents widespread terrorism B. The NSA budget should be larger to prevent catastrophic events C. One of the biggest agencies in the US government that no one knows about D. NSA utilizes information gathering to only target foreign leaders E. All of the above

A. The NSA needs to be able to prove that the information they gather is valuable and prevents widespread terrorism

What is the purpose of writing a Case Study Term Paper for this course? A. To examine the occurrences of an intelligence operation, reasons for the undertaking, methods employed, goals achieved, and reviewing the aftermath. B. To prepare an outline for the conduct of a future successful intelligence operation that an intelligence agency may reference from. C. To identify the major components of foreign intelligence communities and the issues faced by foreign intelligence communities. D. To simply lay down the facts of an intelligence case study so that readers can make their own determinations of the practices and results. E. To determine the utility of our intelligence agencies and whether they have served a substantive national security role for the U.S.

A. To examine the occurrences of an intelligence operation, reasons for the undertaking, methods employed, goals achieved, and reviewing the aftermath.

Approximately how much of the intelligence community does the Department of Defense, under the leadership of the secretary of defense, control? A. 10-15% B. 75-80% C. 25% D. 50% E. 100%

B. 75-80%

Who did the FBI find hiding on the Indian border in Faisalabad, Pakistan? A. Osama Bin Laden B. Abu Zubaydah C. Ayman al-Zawahri D. Sirajuddin Haqqani E. Abubakar Shekau

B. Abu Zubaydah

Richard Betts identifies common proposals which should be avoided when seeking solutions to obviate intelligence errors. All of these are correct EXCEPT: A. Incentives--attracting better talent into the analytic bureaucracy by raising salaries and providing more high-ranking positions to which analysts can aspire. B. Anticipation and explication--anticipating the cognitive barriers to decision makers' utilization of their products, and exposing to consumers the idiosyncrasies of various agencies' assessments. C. Assuming the worst--acting on the most threatening possible interpretations and operationalizing worst-case scenario analysis. D. Consolidation--coming to a compromise of views in order to gain agreement and compensating for inadequacy by contracting the intelligence process. E. Multiple advocacy--procuring as much data as possible to empirically support all of the various viewpoints, especially under a condition of great uncertainty.

B. Anticipation and explication--anticipating the cognitive barriers to decision makers' utilization of their products, and exposing to consumers the idiosyncrasies of various agencies' assessments.

What international crisis could have placed Cuba in the crosshairs of an American military strike? A. The Cuban Missile Crisis B. Brothers to the Rescue C. Bay of Pigs D. All of the above E. None of the above

B. Brothers to the Rescue

How was 'Doc' able to extract information about Zarqawi? A. He used the 'fear up (mild)' technique, offering to change the circumstances of his imprisonment. B. Doc used a technique of boosting Abu Haydr's ego, and coercing him into believing Doc's stature in the intelligence operation was higher. C. Doc used the 'futility technique' approach by expressing to Abu Haydr that Zarqawi's units have been captured. D. Doc used a series of rapid fire questioning, eventually overwhelming Haydr into giving up information. E. The interrogator convinced Haydr that he would be sent to the brutal prison at Abu Ghraib

B. Doc used a technique of boosting Abu Haydr's ego, and coercing him into believing Doc's stature in the intelligence operation was higher.

According to the PowerPoint on "What Were Tolstoy's Issues with Science?" What is the main aim of theory in empirical political science? A. Generalization B. Explanation C. Hypothesis D. Dependent Variable E. Independent Variable

B. Explanation

Richard K. Betts mentions in his essay, Why Intelligence Failures are Inevitable, that the problem of intelligence failure can be summed up into three distinct categories. What are those three categories? A. Funding, lack of cooperation between IC, and ever-changing circumstances B. Failure in perspective, pathologies of communication, and paradoxes of perception C. Lack of well-developed intelligence theory, threat of public outcry, and high turnover rate of senior level positions D. Strictness of intelligence laws, the dynamics of interpretation, and clearance levels E. None of the above

B. Failure in perspective, pathologies of communication, and paradoxes of perception

The US is a member of a "semi-intelligence alliance" that closely engages in intelligence-sharing with each other than other nations. Of the following countries, which is NOT a member of this intelligence-sharing network? A. New Zealand B. France C. Australia D. United Kingdom E. Canada

B. France

The weakest part of our intelligence capabilities is our ____, according to Bill Gertz A. Cyber Intelligence B. Human Intelligence C. Critical Intelligence D. Imagery Intelligence E. Signals Intelligence

B. Human Intelligence

The National Security Act of 1947 was a major restructuring of U.S. military and intelligence agencies following World War II in the belief that better coordination might have been more effective. Which agency/department was NOT created by this act? A. Department of Defense (DOD) B. National Security Agency (NSA) C. Central Intelligence Agency (CIA) D. National Security Council (NSC) E. None of the above

B. National Security Agency (NSA)

What is the main problem that has occurred in defense spending in terms of intelligence analysis persuading policy making? A. Intelligence has a reoccurring tendency to only produce "worst-case" scenarios to policy makers. B. Operational evaluations can be a "double-edged sword," where pessimistic analyses can be both beneficial and harmful in differing strategic situations. C. Policy makers have continuously ignored Intelligence officials as few operational analyses have been proven effective. D. Intelligence analysis has been reserved solely for policy makers, as intelligence officials focus on collection as the main priority for security threats. E. All of the above

B. Operational evaluations can be a "double-edged sword" where pessimistic analyses can be both beneficial and harmful in differing strategic situations.

What was the actual cause of the delayed unification of Russian armies during Napoleon's invasion into Russia? A. Napoleon strategically cut supply and communications using advanced army and intelligence tactics. B. Personal desires of the second army's general caused the army to avoid linking with the first one to maintain command. C. Russian forces could not rejoin and were forced to continuously retreat as Napoleon's forces were following. D. Intelligence granted Russian generals an insight into a possible flank attack that could decimate the second army. E. The Russian Emperor demanded the two armies remain split as to draw Napoleon into the heart of Russia.

B. Personal desires of the second army's general caused the army to avoid linking with the first one to maintain command.

Who is most often responsible for "intelligence failures"? A. Analysts B. Policymakers C. Collectors of raw information D. Sources E. All of the above

B. Policymakers

Which of the following is not one of the levels of classification? A. Top secret B. Presidential C. Secret D. Confidential E. They are all levels of classification

B. Presidential

Which is not one of the four categories of intelligence? A. Collection B. Technical C. Analysis D. Covert Action E. Counter-Intelligence

B. Technical

The surveillance program in place prior to September 11, 2001, known as THINTHREAD, served what purpose? A. To examine foreign threats that could potentially affect U.S. national security by wiretapping communications in high risk countries. B. The program monitored foreign to domestic email and phone calls on a mass scale, but offered encryption in order to protect the everyday U.S. citizen. C. The program collected solely web data that related to terrorist threats, then relayed that information to military forces. D. THINTHREAD was used to analyze email and phone calls throughout the United States, and send that information to a network of special authorities in the Intelligence Community. E. None of the above

B. The program monitored foreign to domestic email and phone calls on a mass scale, but offered encryption in order to protect the everyday U.S. citizen.

.Which country was considered the operational base for al-Qaeda? A. Pakistan B. Yemen C. Egypt D. Libya E. Turkey

B. Yemen

What is traffic analysis used for? A. knowing how an organization runs by seeing who walks through the door. B. gaining an inference on organization's structure from message routing, volume, call signs, and operator chatter C. analyzing how countries move goods and people in and out D. analysis on troop movements using aerial reconnaissance E. gaining insight on a government's power structure

B. gaining an inference on organization's structure from message routing, volume, call signs, and operator chatter

The U.S. Intelligence Community has how many members? A. 10 B. 12 C. 17 D. 20 E. None of the above

C. 17

During which event did John P. O'Neill believe al-Qaeda would strike following the 1998 embassy bombings? A. 1996 Olympics B. July 4th, 2000 C. 2000 New Year Celebration D. Christmas 1999 E. Election Day 2001

C. 2000 New Year Celebration

What were the first two intelligence entities created in the United States? A. Central Intelligence Agency and Office of Strategic Services B. Coordinator of Information and National Security Agency C. Coordinator of Information and Office of Strategic Services D. Military Intelligence Services and National Security Agency E. American Intelligence Agency and Office of Strategic Services

C. Coordinator of Information and Office of Strategic Services

Which of the following emotion-based Army intelligence interrogation techniques is inaccurately described? A. Fear down approach - Calming the source who is already in a state of fear and convincing him that he will be properly, humanely treated. B. Fear up approach - Exploiting the source's preexisting fears, especially with those who exhibit a greater than normal amount of fear or nervousness. C. Emotional love/hate approach - Two interrogators will perform opposing personalities and attitudes toward the source. D. Futility technique approach - Indicating to the source that there is no point in resistance and that cooperation will guarantee a quick end to the interrogation and/or detainment. E. "We know all" approach - Convincing the source that the interrogators know everything about his background information, tactical situation, and unit's operational strength and disposition.

C. Emotional love/hate approach - Two interrogators will perform opposing personalities and attitudes toward the source.

Which of the following is not a basic tactic used by Hans Schraff to obtain information? A. Establish your identity B. We already know everything illusion C. Fear Down Pride Up D. Respecting boundaries and not pushing for information E. Friendliness

C. Fear Down Pride Up

The "communication between policymakers and intelligence community is imperfect" is a characteristic of which phase of the intelligence process? A. Dissemination B. Consumption C. Feedback D. Collection E. Analysis

C. Feedback

Theories are _____. A. Questions B. Specific C. Generalizations D. Assumptions E. Explanatory variables

C. Generalizations

Which of the following ethnic groups makes up most of the minority of the Japanese population? A. Chinese B. Brazilian C. Korean D. Taiwanese E. American

C. Korean

What is does Bill Gertz's list as the biggest problem of U.S. intelligence agencies? A. Lack of contacts B. Lack of resources C. Lack of accountability D. Lack of agents E. Lack of quality intelligence

C. Lack of accountability

Who was the "man who knew" of the looming threat that the future of Al Qaeda presented? A. Joe Cantamessa B. Michael Kirk C. Louis Freeh D. John O'Neill E. Robert Bryant

C. Louis Freeh

Which of the following areas are not an option to consider for your Case Study Term Paper? A. Intelligence Failure Case Study B. Intelligence Success Case Study C. Overt Operations Case Study D. Counter-Intelligence Case Study E. Covert Operations Case Study

C. Overt Operations Case Study

What is the process of developing the US Intelligence budget? A. Budgeting, Planning, Programming, Execution B. Budgeting, Programming, Planning, Execution C. Planning, Programming, Budgeting, Execution D. Programming, Budgeting, Planning, Execution E. Voting, Planning, Budgeting, Execution

C. Planning, Programming, Budgeting, Execution

What terrorist was known for wanting to destroy the World Trade Center before Osama bin Laden? A. Abdullah Ahmed Abdullah B. Mohammed Atef C. Ramzi Yousef D. Al Qaeda E. John O' Neill

C. Ramzi Yousef

What was the name of the network of systems that could capture, sort, and isolate critical information from massive amounts of phone and email data? A. Operation Olympic Games B. Trailblazer Project C. THINTHREAD D. TURBULENCE E. Stuxnet

C. THINTHREAD

One of the major themes Mark Lowenthal says contributes greatly to the development of the U.S. Intelligence System is "the global scope of intelligence interests." What is the main idea behind this theme? A. The expansion of covert actions to include things such as UAVs (unmanned aerial vehicles) to deal with growing, oversea terroristic threats B. The Cold War's large scope of influence redefined major factors of development in the most basic forms and practices of U.S. Intelligence C. The U.S. collects and analyzes information on every region of the world to ensure they will not be used as a pawn by the enemies of the United States D. Congress' growing amount of oversight for the intelligence community E. All the above

C. The U.S. collects and analyzes information on every region of the world to ensure they will not be used as a pawn by the enemies of the United States

Which statement is an accurate description of the various phases and activities of the intelligence process as discussed by Lowenthal? A. Collection analysts are referred to as all-source analysts as they must employ the full range of collection methods (e.g. SIGINT, IMINT, HUMINT, OSINT, etc.). B. In the US, the magnitude of processing and exploitation far outruns collection such that much more intelligence is processed and exploited than can ever be collected. C. The US IC has a system of competitive analysis whereby several different intelligence analytical components address the same issue. D. The process of dissemination involves moving the raw intelligence information from the collectors to the consumers for the latter's own analysis and evaluation. E. Intelligence analysts are primarily responsible for defining intelligence requirements and collection priorities so that collection is driven by analytic needs.

C. The US IC has a system of competitive analysis whereby several different intelligence analytical components address the same issue.

Empirical Analysis is not ______. A. Ought-questions B. Concerned with countries, empires, and government structures C. Is-questions D. Concerned with values, ideals, and preferences. E. Concerned with relationships, society, and culture

D. Concerned with values, ideals, and preferences.

Which country is not included in the "Five Eyes"? A. UK B. New Zealand C. US D. Germany E. Australia

D. Germany

What was the motivation for DIA analyst Ana Belen Montes to spy for Cuba? A. Money B. Authority C. Revenge D. Ideology E. Ego

D. Ideology

What country did trade immediately get cut off for when Egypt nationalized ownership of the Suez Canal? A. Ethiopia B. Kenya C. Djibouti D. Israel E. Saudi Arabia

D. Israel

What was the original purpose for the creation of the NSA? A. It was created during the Cold War to surveil important diplomatic missions. B. It was created during the First World War after the reveal of the Zimmerman Telegram. C. It was created during the Suez Crisis to spy on possible movements by the British and French. D. It was created after the Second World War to prevent another surprise attack like Pearl Harbor. E. The NSA was created after 9/11.

D. It was created after the Second World War to prevent another surprise attack like Pearl Harbor

When was Napoleon's invasion of Russia? A. January 12, 1812 B. July 12, 1812 C. January 18, 1812 D. June 12, 1812 E. June 18. 1812

D. June 12, 1812

All intelligence is now defined as what type of intelligence? A. Tactical Intelligence B. Strategic Intelligence C. Physical Intelligence D. National Intelligence E. Politicized Intelligence

D. National Intelligence

In 1940, Frank B. Rowlett was in charge of a team trying to crack the most secret diplomatic cipher of the Empire of Japan, what was the name American cryptanalysts gave to the machine? A. ORANGE B. BLACK C. YELLOW D. PURPLE E. BLUE

D. PURPLE

What are the six influence factors, represented by RASCLS, that could be used to recruit agents to spy for counterintelligence agencies such as the CIA? A. Relationship, Authority, Selectivity, Commitment and Consistency, Liking, and Social Proof. B. Reciprocity, Authority, Selectivity, Commitment and Consistency, Liking, and Specialization. C. Relationship, Attitude, Scarcity, Character, Learnability, and Social Proof. D. Reciprocity, Authority, Scarcity, Commitment and Consistency, Liking, and Social Proof. E. Reactivity, Attitude, Scarcity, Character, Liking, and Social Proof.

D. Reciprocity, Authority, Scarcity, Commitment and Consistency, Liking, and Social Proof.

Why did the US have a late start to developing intelligence? A. The British conducted intelligence on our behalf B. The US had no enemies C. The US military did not know how to conduct intelligence D. There was no perceived threat for 165 years E. Intelligence was considered bad and leaders were unwilling to take par

D. There was no perceived threat for 165 years

How did the United States intelligence community underestimate the threat of ISIS? A. US intelligence community failed to take the expansion of ISIS seriously and failed to make it a top priority B. Obama called ISIS a "JV Team", downplaying the seriousness of the organization C. US intelligence community underestimated ISIS' ability to grow and expand rapidly D. pulling troops out too soon which led to ISIS rebuilding without the threat of the US military E. All of the above

E. All of the above

What do critics tend to say about the classification of intelligence? A. Imposes high costs in a financial way B. Classification system can be abused C. High classifications limit the use of intelligence as a policy tool D. Imposes high costs in a physical way E. All of the above

E. All of the above

What is a service that DOD organizations participate in? A. Conducting general national-level intelligence. B. Providing indications and warning of possible attack. C. Direct intelligence support for all military branches. D. Providing intelligence to tactical units conducting operations in foreign territory. E. All of the above

E. All of the above

What was the result of Abu Zubaydah's torture and treatment? A. He released no further information than what he had released when being questioned by the FBI. B. The CIA believed and stated Zubaydah was a close subordinate of Osama bin Laden and familiar with al-Qaeda plots. C. The CIA begin applying the torture techniques to many different "high value targets" in black sites. D. The ability to say the program was successful allowed the CIA to continue worsening the torture techniques covertly. E. All of the above

E. All of the above

Which of the following are examples of moving intelligence from the producers to the consumers, also known as dissemination? A. President's daily brief B. Worldwide Intelligence Review C. National Intelligence Estimates D. DIA/J2 Executive Highlights E. All of the above

E. All of the above

Which of the following are true regarding intelligence failure? A. most errors can be attributed back to wishful thinking, cavalier disregard of professional analysts, and the premises and preconceptions of policy makers. B. There have only been a few major failures. C. fewer fiascoes have occurred in the acquisition and presentation of facts than in the stages of interpretation and response. D. Authorities often fail to use intelligence properly E. All of the above

E. All of the above

Which of the following contributed to the development of the United States intelligence system? A. threat-based foreign policy B. influence of the Cold War C. global scope of intelligence interests D. consumer-producer relations E. All of the above

E. All of the above

Which of the following is prohibited by law to be used during interrogations? A. Threats B. Mental torture C. Insults D. B & C E. All of the above

E. All of the above

Which of the following is true regarding National Intelligence Estimates? A. NIEs attempt to estimate, not predict, the likely direction an issue will take in the future B. NIEs can take anywhere from a few months to a year or more C. NIEs are drafted on issues that are already on policy makers' agendas D. NIEs should be anticipatory E. All of the above

E. All of the above

Why was the Iranian Revolution an intelligence failure? A. There were not enough Iranian specialists. B. There wasn't enough knowledge on the country and its history. C. The Shah made it look like there was control over things. D. Americans were more concerned with gaining a potential advantage in the Cold War. E. All the above

E. All the above

What was the premise or rationalization for the authorization of "The Program"? A. The President had the constitutional authority under Article II, as Commander-in-Chief, to respond to national security threats. B. Uninhibited metadata collection would root out terrorist conspirators so as to prevent another surprise attack. C. There had already existed judicial precedent and statutory authority for a surveillance program in the 1970s. D. The Program had a built-in function to encrypt any information that was attributable to private citizens so as to protect their rights. E. Both A. and B. are correct.

E. Both A. and B. are correct.

How can John O'Neill's investigation of al-Qaeda and Osama bin Laden be summarily characterized? A. He intensely studied bin Laden, al-Qaeda intentions, plots, activities, and movements, and concluded that they presented a real threat to the US. B. He actively worked in concert with FBI leadership to lobby Congress for reform and funding in order to fully devote resources to stopping bin Laden and al-Qaeda. C. O'Neill managed to only go so far as to recognize patterns of terrorist activities but could not precisely confirm a plot to launch an attack on US soil. D. O'Neill's theory on the present danger posed by al-Qaeda and Osama bin Laden came into fruition with the bombing of the American embassies in East Africa. E. Both A. and D. are correct.

E. Both A. and D. are correct.

Which of the following is not a reason for intelligence agencies to exist? A. To avoid strategic surprise B. To securitize national economies C. To maintain secrecy of information, needs, and methods D. To ensure citizens are following laws E. Both B and D

E. Both B and D

According to President Herbert Hoover's report of his Commission on Organization of the Executive Branch of the Government in 1955, which intelligence organization's creation was attributed to the attack on Pearl Harbor? A. NSA B. FBI C. DIA D. CGI E. CIA

E. CIA

Which three agencies responsible for producing all-source intelligence are the most important of the producers of finished intelligence? A. FBI's Intelligence Branch, DIA's Directorate of Intelligence, and State's Intelligence and Research Bureau B. Office of the DNI, DHS's Office of Intelligence and Analysis, and DEA's Office of National Security Intelligence C. CIA's Directorate of Analysis, DHS's Office of Intelligence and Analysis, and State's Intelligence and Research Bureau D. FBI's Intelligence Branch, DIA's Directorate of Intelligence, and DHS's Office of Intelligence and Analysis E. CIA's Directorate of Analysis, DIA's Directorate of Intelligence, and State's Intelligence and Research Bureau

E. CIA's Directorate of Analysis, DIA's Directorate of Intelligence, and State's Intelligence and Research Bureau

In what country did Edward Snowden meet with journalists? A. Brazil B. Russia C. England D. Belgium E. China

E. China

In the late 1930s, what was the United States' premier source of secret intelligence? A. Traffic analysis B. Eavesdropping C. Diplomacy D. Espionage E. Codebreaking

E. Codebreaking

What information was Edward Snowden sharing with journalists? A. Information on the wrong-doings of American citizens B. Information on Al-Qaeda C. Information that could have prevented 9/11 D. Secrets about the Bush administration's wrongdoings E. Information about The Program

E. Information about The Program

Between May 1998 and May 1999 the CIA gave the US government 10 chances to capture Bin Laden or kill him with military means, what was the reason given as to why this didn't happen? A. concern for international opinion of the US B. policymakers would retaliate C. information was leaked and Bin Laden was tipped off D. lack of resources E. Intelligence was not good enough

E. Intelligence was not good enough

The Tripartite Pact established an axis between which three countries? A. US-France-Great Britain B. Canada-Germany-Australia C. Italy-Germany-Spain D. Japan-China-Russia E. Italy-Japan-Germany

E. Italy-Japan-Germany

Who was the deputy director of the CIA during 9/11? A. Jane Mayer B. John Rizzo C. Mark Rossini D. Ali Soufan E. John McLaughlin

E. John McLaughlin

Which of the following is true about the events leading up to the September 11th Attacks? A. The CIA had no prior knowledge of al-Qaeda before 9/11 B. al-Qaeda only committed one terrorist attack prior to the 9/11 attacks C. The CIA failed to develop sufficient knowledge to prevent the attacks because of budgetary issues. D. The Bin Laden Unit in the CIA was provided a team of 50 special operations individuals to support operations against al- Qaeda E. Most of the failures leading up to the attacks were caused by insufficient action by leaders in the CIA and competing IC Agencies

E. Most of the failures leading up to the attacks were caused by insufficient action by leaders in the CIA and competing IC Agencies

Tolstoy poses the question "when an apple has ripened and falls, why does it fall?" What is the cause he gives for it falling? A. Because it is dried by the sun B. Because its stalk withers C. Because the boy standing below wants to eat it D. Because it grows heavier E. Nothing is the cause. All this is only the coincidence of conditions in which all vital organic and elemental events occur.

E. Nothing is the cause. All this is only the coincidence of conditions in which all vital organic and elemental events occur.

What does SERE stand for? A. Strategize, evasion, rescue, escape. B. Survival, escape, resistance, examine. C. Strategize, employ, resistance, escape. D. Support, evasion, rescue, examine. E. Survival, evasion, resistance, and escape.

E. Survival, evasion, resistance, and escape.

Some intelligence congressional committees have advocated for rebalancing the collection-processing gap, focusing on TPEDs. What does TPED refer to? A. Tasking, processing, exploitation, and delivery. B. Thinking, points of view, exploitation, and dissemination. C. Thinking, processing, examining, and dissection. D. Tasking, production, examining, and dissemination. E. Tasking, processing, exploitation, and dissemination.

E. Tasking, processing, exploitation, and dissemination.

What was the name of the first book published about the NSA, written by James Bamford? A. A Pretext for War B. NSA Secrets C. Secrets of War D. Code Warriors: NSA's Code E. The Puzzle Palace

E. The Puzzle Palace


Related study sets

Environmental Science - Natural Hazards and Resources

View Set

EVP(English Vocabulary Profile American) B1(1/2) Test

View Set

Chapter 2: Choice in a World of Scarcity

View Set

Security Plus Chapter 7-12 Practice Final

View Set