Skip to main content
United States
Jump To
Support
Register or Log In
Support
Register or Log In
Instructors
Browse Products
Getting Started
Students
Browse Products
Getting Started
Return to Global Politics Student Resources
Chapter 8 Exam
Pursuing Security
Quiz Content
*
not completed
.
Social theorist ___________ described security as an "essentially contested concept".
Jane Addams
correct
incorrect
W. B. Gallie
correct
incorrect
Peter L. Berger
correct
incorrect
Roland Barthes
correct
incorrect
*
not completed
.
____________, as a security logic, is when the state seeks to preserve and protect itself by any and all means necessary.
Alea iacta est
correct
incorrect
Carte blanche
correct
incorrect
Magna Carta
correct
incorrect
Acta non verba
correct
incorrect
*
not completed
.
A central assumption of the ______________ system is that no central global authority exists to maintain order and ensure justice.
Holy Roman Empire
correct
incorrect
Arabic civilization
correct
incorrect
Byzantine Empire
correct
incorrect
Westphalian
correct
incorrect
*
not completed
.
In recent years Japan's foreign policies have shifted toward _________ and ______________.
projecting strength; increasing military capabilities
correct
incorrect
multilateralism; alliance formation
correct
incorrect
self-reliance; normal nationalism
correct
incorrect
diplomacy; peace building
correct
incorrect
*
not completed
.
Which of the following is
not
a feature of the security dilemma?
absence of reliable information flow between states
correct
incorrect
an armed race between states
correct
incorrect
protracted conflicts between states
correct
incorrect
interactions among IGOs
correct
incorrect
*
not completed
.
________________ is a situation where states misinterpret largely defensive actions and capabilities by other states as threats.
Bad intelligence
correct
incorrect
Security dilemma
correct
incorrect
Militarism
correct
incorrect
Diversion
correct
incorrect
*
not completed
.
According to ____________, states must assume and act according to "worst-case scenario" possibilities.
Robert Jervis
correct
incorrect
John Mearsheimer
correct
incorrect
David Heather
correct
incorrect
John Ikenberry
correct
incorrect
*
not completed
.
After the Cold War, the _____________ approach to security became increasing unsatisfactory.
traditional liberalist
correct
incorrect
traditional constructivist
correct
incorrect
traditional realist
correct
incorrect
traditional feminist
correct
incorrect
*
not completed
.
According to political scientist ______________, security is embedded in the interaction of localizing and globalizing forces.
Von Hippel
correct
incorrect
Heather David
correct
incorrect
Koen De Ceuster
correct
incorrect
James Rosenau
correct
incorrect
*
not completed
.
The __________, developed a theory of securitization, which critically evaluates how security threats are identified and prioritized across various dimensions such as military, political, social, economic, environmental.
Copenhagen School
correct
incorrect
the Paris School
correct
incorrect
Aberystwyth School
correct
incorrect
National War College
correct
incorrect
*
not completed
.
Climate change was famously labeled by __________ as the "mother of all security problems."
The New Yorker
correct
incorrect
National Geographic
correct
incorrect
Time magazine
correct
incorrect
Fortune magazine
correct
incorrect
*
not completed
.
Security of the individual within the global context of intrastate violence, civilian casualties, and human rights violations were focal points of both scholars and policymakers in the _____________.
1990s
correct
incorrect
2000s
correct
incorrect
1960s
correct
incorrect
1970s
correct
incorrect
*
not completed
.
Which of the following most closely adheres to the Copenhagen School's focus on securitization?
liberal approaches to security studies
correct
incorrect
realist approaches to security studies
correct
incorrect
feminist and gender-focused approaches to security studies
correct
incorrect
world system approaches to security studies
correct
incorrect
*
not completed
.
One of the earliest statements concerning human security appeared in the ____________________.
1995 UN Report on Poverty
correct
incorrect
World Development Report 1990: Poverty
correct
incorrect
UN's 1994 Human Development Report
correct
incorrect
1987 Report of the World Commission on Environment and Development: Our Common Future
correct
incorrect
*
not completed
.
The chapter references three types of freedom as it relates to an important UN Report. Which one of the following was not highlighted?
freedom of speech
correct
incorrect
freedom from want
correct
incorrect
freedom from fear
correct
incorrect
freedom to take action on one's own behalf
correct
incorrect
*
not completed
.
The Uppsala Conflict Data Programme (Sweden) outlined only _________ wholly inter-state conflicts in 2017.
five
correct
incorrect
two
correct
incorrect
ten
correct
incorrect
one
correct
incorrect
*
not completed
.
The containment doctrine was a key strategy of mutually assured destruction advanced by____________.
George F. Kennan
correct
incorrect
Irving Kristol
correct
incorrect
Yale Richmond
correct
incorrect
Seymour Martin Lipset
correct
incorrect
*
not completed
.
The "poor man's atomic bomb" is used to describe ______________.
biological weapons
correct
incorrect
suicide boomers
correct
incorrect
chemical weapons
correct
incorrect
radiative weapons
correct
incorrect
Previous Question
Submit Quiz
Next Question
Reset
Exit Quiz
Review & Submit
Submit Quiz
Are you sure?
You have some unanswered questions. Do you really want to submit?
Back to top
Printed from , all rights reserved. © Oxford University Press, 2024
Select your Country