Security Management L3

Topics: Terrorism, Security, Terrorism Act 2000 Pages: 5 (1133 words) Published: January 18, 2013
Security Managem,entName: Student ID: Counter Terrorism

Date: Total Marks: 25

Assessment Paper
Instructions to candidates: 1. There is no time restriction set for this paper and you may refer to your course text. 2. Clearly print your name in the blank spaces provided on the answer sheet. 3. Read each question carefully, and circle the option letter of your selected answer on the question paper; then transfer your answer to the answer sheet by putting an X through the appropriate answer box or by writing in the answers (if the question requires it). 4. Please answer all the questions and check your answers carefully. 5. On completion submit the answer sheet to Perpetuity Training, 148 Upper New Walk, Leicester, LE1 7QA by the date required.

1. Very generally it is agreed that terrorism is defined by a group which: A. Wishes to kill its political enemies and influence potential allies B. Wishes to politically and ideologically influence others by the use or threat of use of, violence C. Wishes to promote religious ideologies through the use of force or the threat of force. D. Wishes to resist government oppression through the use of irregular warfare 2. It is argued that the term terrorism derives from the reign of terror after the French revolution. In what year was the French Revolution? A. B. C. D. 1564 1694 1794 1894

3. Historically, terrorist groups (although most organisations do not like being referred to as terrorists!) have tended to adhere to either a politically left or right wing ideology. But what do we mean by the term ‘ideology’? A. B. C. D. Right wing beliefs Left wing beliefs Religious beliefs Systems of belief

4. What is state terrorism? A. B. C. D. Terrorism directed against the state The state’s definition of terrorism Terrorism only directed at governments Terrorism committed by the state

5. Modern Terrorists differ from their historical predecessors mainly in: A. B. C. D. The sophistication of their ideologies The sophistication of their targets and timing The sophistication of their attack and planning Their sophistication of their demands

6. What is an IED? A. B. C. D. An improvised explosive detonation An immediate explosive detonation An improvised explosive device An in-car explosive device

7. Which of the following is not normally part of an IED? A. B. C. D. The Timer The Donator The power supply The delivery platform

8. When conducting a terrorism risk assessment we need to consider: A. B. C. D. Assets, threats and vulnerabilities Origins, tactics and membership Aims, abilities and determination Specialty weapons and tactics

9. Who said ‘The war on terror resembles the great clashes of the last century between democracy and totalitarianism’? A. B. C. D. Prime Minister Margaret Thatcher President George W Bush Prime Minister Tony Blair President Barack Obama

10. What is a hard target reconnaissance? A. B. C. D. An examination of the intended target by the terrorist prior to the attack The selection by the terrorist of a difficult target The final briefing to the terrorist attack group before the attack The terrorist debrief after a difficult operation

11. What is defence/security in depth? A. B. C. D. A form of maritime security Impenetrable security measures Environmental security measures Interlocking layers of security

12. The 1996 Manchester bombing was an attack carried out by the Provisional IRA in Manchester, England. The bomb targeted the city's infrastructure and economy and caused widespread damage, estimated by insurers at: A. B. C. D. £7 million £17 million £70 million £700 million

13. In which year was the UK Terrorism Act passed? A. B. C. D. 2005 2006 2007 2008

14. In what year did the Council of Europe Convention on the Prevention of Terrorism (CECPT) come into force? A. B. C. D. 2005 2006 2007 2008

15. One of the most powerful pieces of counter terrorist legislation enacted was in the US, where The Homeland Security Act (HSA). In...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Network Management Essay
  • Security Plan for First Union Bank Essay
  • Data security Essay
  • Analysis of the Federal Information Security Management Act (Fisma) Essay
  • Security Controls Essay
  • Essay about security
  • Main Purpose of security management Essay
  • Essay on Management

Become a StudyMode Member

Sign Up - It's Free