Skip to main content
United States
Jump To
Support
Register or Log In
Support
Register or Log In
Instructors
Browse Products
Getting Started
Students
Browse Products
Getting Started
Chapter 8 Self-test questions
Return to Contemporary Security Studies 5e student resources
Chapter 8 Self-test questions
Poststructural Insights: Making Subjects and Objects of Security
Quiz Content
*
not completed
.
Which of the following is not a correct definition?
Acting subjects: who or what is acting to produce security or insecurity.
correct
incorrect
Substantive content: what being secure looks like and what conditions must exist for us to be able to say we are secure.
correct
incorrect
Referent object: whom or what we act to make secure.
correct
incorrect
Objective security: when a matter is objectively considered a security issue, regardless of interpretation.
correct
incorrect
*
not completed
.
How are US 'military moms' important to a critical reading of security?
Mothers are not passive objects but the specific target of military recruiters who rely on their active engagement to fuel recruitment.
correct
incorrect
Examining the role of 'military moms' reveals the extent of gendered strategizing that is required to raise and sustain a military force.
correct
incorrect
All of these.
correct
incorrect
Mothers are indispensable to the exercise of military power but often overlooked in traditional security analyses.
correct
incorrect
*
not completed
.
What is the value of a post-structuralist critique in security studies?
To enable us to understand the workings of political subjecthoods left out of traditional discourses on security.
correct
incorrect
To examine the base of power and its construction, in greater depth than traditional analysis.
correct
incorrect
To challenge the idea that smart weapons and technology are the active subjects determining security today.
correct
incorrect
All of these.
correct
incorrect
*
not completed
.
In which of these wars did the overwhelming technological superiority of one side lead to rapid defeat of its enemy?
Vietnam War.
correct
incorrect
Thirty Years' War.
correct
incorrect
First World War.
correct
incorrect
1991 Gulf War.
correct
incorrect
*
not completed
.
Which of the following defines a Revolution in Military Affairs?
A coup in which established leaders are ousted by an internal military force.
correct
incorrect
A wholesale shift in the way warfare is conducted and understood.
correct
incorrect
A watershed in technological advancement, such as the creation of nuclear weaponry.
correct
incorrect
A watershed in technological advancement which alters the fundamental characteristics of war.
correct
incorrect
*
not completed
.
For post-structuralists, which of the following is the most important impact of security studies?
Security studies contributes to the literature and builds greater theoretical understanding of the subject.
correct
incorrect
Security studies records the history of modern warfare.
correct
incorrect
Security studies teaches a new generation about the reality of warfare and strategy.
correct
incorrect
Security studies creates and perpetuates claims that shape warfare, defining legitimacy, favouring some subjects and marginalizing others.
correct
incorrect
*
not completed
.
Which of the following phrases is not likely to indicate legitimacy in the new terminology of RMA?
Surgical strike.
correct
incorrect
Indiscriminate attack.
correct
incorrect
Smart bomb.
correct
incorrect
Precision target.
correct
incorrect
*
not completed
.
Which of the following is the best lens through which to investigate the role of child soldiers?
Child soldiers are victims of combat that need re-education and rehabilitation.
correct
incorrect
Children and their mothers are not active subjects in warfare and are best considered as subjects in the private sphere.
correct
incorrect
Children are most often innocent bystanders in war and are best used as signifiers of peace.
correct
incorrect
Children have political subjecthood that is missed when they are considered as passive victims of warfare.
correct
incorrect
*
not completed
.
Which of the following are true of the Great Law of Peace of the Haudenosaunee Confederacy?
The Great Law alerts scholars to the problem of failing to sustain critique.
correct
incorrect
The case of the Great Law illustrates the importance of being critical of practices of research and knowledge production.
correct
incorrect
The Great Law is a challenge for traditional security studies, as it represents a proven non-state approach.
correct
incorrect
All of these.
correct
incorrect
*
not completed
.
Which of the following represent a move away from traditional interpretations of security studies?
Critical questioning.
correct
incorrect
Realist logic.
correct
incorrect
State-centric security analysis.
correct
incorrect
All of the above.
correct
incorrect
Previous Question
Exit Quiz
Next Question
Review & Submit
Submit Quiz
Reset
Are you sure?
You have some unanswered questions. Do you really want to submit?
Back to top
Printed from , all rights reserved. © Oxford University Press, 2024
Select your Country