Political Crime and Terrorism MCQs

Political Crime and Terrorism MCQs

Answer these 30 Political Crime and Terrorism MCQs and assess your grip on the subject of Political Crime and Terrorism.
Scroll below and get started!

1: What doctrine suggests that some violations of common law are necessary to serve public utility?

A.   Hezbollah

B.   Parens patria

C.   Raison d’état

D.   Dialectic

2: Criminal acts committed for an ideological purpose are ______.

A.   Political

B.   Ideological

C.   Philosophical

D.   Governmental

3: Terrorism and terrorist acts are considered political crimes.

A.   True

B.   False

4: ______ crimes are violations of law or customs of war.

A.   War

B.   Political

C.   Nuremburg

D.   Government

5: A spy who betrays for personal benefit unrelated to monetary or ideological considerations is called a ______.

A.   Political

B.   Professional

C.   Buccaneer

D.   Egocentric

6: An ideology is a distinctive belief system, idea, or an abstract ideal.

A.   True

B.   False

7: ______ release classified information to the public.

A.   Quasi agents

B.   Escapee spies

C.   Deceived spies

D.   Compromised spies

8: Hacker’s typology of terrorists include crusaders, crazies, and criminals.

A.   True

B.   False

9: What theory best explains political crimes?

A.   Strain

B.   Social disorganization

C.   Differential association

D.   Labeling

10: Which of the following countries uses waterboarding as an interrogation tactic?

A.   France

B.   Germany

C.   Canada

D.   United States

11: Which of the following terms is the clandestine theft of information?

A.   Espionage

B.   Assassination

C.   Terrorism

D.   Whistle blowing

12: Sub rosa criminals are spies who steal secrets.

A.   True

B.   False

13: Laqueur identified the myth that terrorism is a weapon of the poor.

A.   True

B.   False

14: Which of the following refers to crime committed against women and children in the name of traditional male dominance?

A.   Political espionage

B.   Genocide

C.   Patriarchal crime

D.   Political prisoners

15: The mass destruction or annihilation of populations, such as the Jewish Holocaust is called ______.

A.   Patriarchal crime

B.   Political murder

C.   Political atrocity

D.   Genocide

16: _____ is known as a form of drastic resocialization of personality.

A.   All of these

B.   Victim precipitation

C.   Brainwashing

D.   Victim provocation

17: Is cOINTELPRO a secret FBI program, the Counter Intelligence Program, to discredit legitimate social movements?

A.   True

B.   False

18: _____ is political crimes against the government, from protests to terrorism.

A.   IQ

B.   None of these

C.   Gemeinschaft

D.   Crime against government

19: _____ is defined as political crimes by the government, from human rights violations to genocide.

A.   Criminal justice

B.   Crime by government

C.   All of these

D.   Victimology

20: _____ is known as the secret organization within the Reagan White House that was responsible for the Iran–Contra affair.

A.   Enterprise

B.   All of these

C.   Triangulation

D.   Operationalization

21: Is espionage spying; the stealing of secrets?

A.   True

B.   False

22: _____ is the eradication of a group.

A.   All of these

B.   Feminist criminology

C.   Punks

D.   Genocide

23: _____ is defined as in Arabic, “fervor” or “zeal”; a Middle Eastern, Islamic resistance movement.

A.   Ectomorphs

B.   All of these

C.   Hamas

D.   Endomorphs

24: _____ is known as an Islamic, Iranian-backed terrorist group whose name means “party of God.”

A.   Hezbollah

B.   Right to compensation

C.   Notification of rights

D.   None of these

25: Is human rights basic human activities that are guaranteed in democratic societies such as the right to life, liberty, and the pursuit of happiness?

A.   True

B.   False

26: _____ is a distinctive belief system.

A.   None of these

B.   Parens patria

C.   Ideology

D.   Hezbollah

27: _____ is defined as the precedent established at the Nuremberg trials after World War II that says that, if a person has a conflict between morality and immoral orders, one is to obey morality.

A.   Nuremberg principle

B.   Ectomorphs

C.   All of these

D.   Hamas

28: _____ is known as a secret CIA program to investigate activities of domestic groups.

A.   The New Orleans incident

B.   Colonial pirates

C.   None of these

D.   Operation chaos

29: Is patriarchal crime crime committed in the name of male dominance?

A.   False

B.   True

30: _____ is crime committed for ideological reasons.

A.   All of these

B.   Pyramid

C.   Churning

D.   Political crime

31: _____ is defined as machiavelli’s notion that any means are necessary in order to protect the state.

A.   Raison d’état (reason of state)

B.   Life course theory

C.   Social disorganization

D.   All of these

32: _____ is known as a U.S. social movement in the 1980s that attempted to provide refuge for illegal political refugees from Latin America.

A.   Legalization of abortion

B.   None of these

C.   Sanctuary movement

D.   Marijuana legalization

33: Is secret police domestic security police whose purpose it is to protect the existing regime from violent overthrow?

A.   True

B.   False

34: _____ is an acronym for the method of recruiting spies: sex, motivation, ideology, commitment, and ego.

A.   All of these

B.   Cannon

C.   Con artists

D.   SMICE

35: _____ is defined as another name for espionage (literally, “under the rose”).

A.   Sub rosa crime

B.   Social reform

C.   Family counseling

D.   All of these

36: _____ is known as the purposeful targeting of innocents for political purposes in order to spread fear and intimidation.

A.   Drug

B.   Career

C.   None of these

D.   Terrorism

37: Is universal Declaration of Human Rights a United Nations declaration that calls for the respect of human rights?

A.   False

B.   True

38: _____ is the burglary of the Democratic National Headquarters in the Watergate complex by Nixon’s “plumbers group.”

A.   The American Revolution

B.   Watergate

C.   Social disorganization theory

D.   None of these