SlideShare a Scribd company logo
NSEC 1101 Western Kentucky University Midterm Examination
NSEC 1101 Western Kentucky University Midterm ExaminationORDER HERE FOR
ORIGINAL, PLAGIARISM-FREE PAPERS ON NSEC 1101 Western Kentucky University
Midterm ExaminationHi please see attached file and check if you can answer these
questions with the following book as your reference:1. Baker, James E. (2007). In The
Common Defense. New York, N.Y: Cambridge University Press. ISBN: 978-0-521-87763-3.I
don’t have a copy of it.please keep in mind that Regarding numbers 15 and 42 of the
midterm. Question 15 is in the true or false sections but appears in the Fill in the Blank and
number 42 is in the Fill in the Blank section and is a True or Falsequestion; they are in the
wrong sections, pls answer accordingly.please answer these questions with focus and don’t
answer unless 100% sure of the answers please.DONT MAKE A BED LONGER THAN THREE
HOURS JUST DONTNSEC 1101 Western Kentucky University Midterm
Examinationattachment_1Unformatted Attachment PreviewMIDTERM EXAMINATION NSEC
1101 (Spring 2020) NAME: I. 1. 2. (2 points) True/False (2 pts each) Article 41 says the UN
SECURITY COUNCIL decides on FORCEFUL MEASURES. Data, information, and intelligence
are all the same. 3. ______ The Nicaragua case demonstrates the US’s correct application of
collective selfdefense. 4. Electronic surveillance directed at persons within the United States
for law enforcement purposes is subject to the Fourth Amendment. 5. Covert action is not
an intelligence function. 6. Today, the DNI controls and leads all the IC organizations. 7.
Analysis is what makers intelligence actionable. 8. Time is a common element at the
Strategic, Operational, and Tactical levels. 9. The National Security Act of 1947 (as
amended) is a bedrock of intelligence law? 10. 11. The National Security Strategy (NSS) is
POTUS’ national security direction to Executive Branch agencies and institutions. All
dimensions are naturally occurring. 12. ______ The US, Canada and Mexico are in
NORTHCOM. 13. ______ POTUS is Commander in Chief of the country. 14. ______ E.O. 12333
made the death of General Soleimani and Usama Bin Laden unlawful killings. 15. _______ is
the NGO identified in the Geneva Conventions. 16. _____ The Nicaragua case demonstrates
the US’s erroneous application of collective self-defense principles. 17. _______ Placing human
shields around a military object makes it immune from attack. 18. _____ Anticipatory defense
has a higher threshold of action than preemptive attack. II. Fill-in the Blanks Below (2
points for each complete answer). 19. The is a top-secret court. 20. The original leader of the
IC in 1947 was . This individual was changed in 2004, the assumed the IC leadership role.
21. “Nothing in the present charter shall impair the inherent right of individual or collective
self-defense if an armed attack occurs against a member of the United Nations until the
Security Council has taken measures necessary to maintain international please and
security….”, is a quote from . 22. Reynolds is a doctrine of type case. 23. The five intelligence
functions identified by Judge/Professor Baker are: 24. As a dimension, cyber is unique
because it is and . 25. Name three intelligence statues passed by Congress: 26. DNI’s role
under the 2004 Reform Act in the IC is the same as the the NSA of 1947. leader under 27.
The National Security Strategy (NSS) is POTUS’ national security direction to agencies and
institutions. 28. International law says a state is defined by having 29. A threat is plus . 30.
The IC is 31. PC is . . 32. The legal documents that are the ultimate guides of the NSS are and .
33. The is a problem that arose over the concern that law enforcement and intelligence
personnel might misuse FISA. 34. _____________ provides combat ready SEALS and Rangers to
geographic combatant commands. 35. The US combat operations chain of command is
POTUS, _____________, Commander Geographic Combatant Command. 36. The four principles
of the method and means of warfare are
________________________________________________________________________
________________________________________________________________________ ___________. 37. An example of
perfidy is ___________________________________________________. 38. The US involvement in the
____________________ War/conflict was a correct application of self-defense. 39. Self-defense by
protection of nationals is problematic because of _______________ and _______________ countries
interactions. 40. _________________ self-defense is objective and ____________ self-defense is
subjective. 41. Imminent attack is
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________ _______________________. 42. _____
Anticipatory defense has a higher threshold of action than preemptive attack. 43. The three
core elements of anticipatory self-defense are
________________________________________________________________________
________________________________________________________________________ ___________. 44. Jus en bello
is_______________________________________. Jus ad bellum is
__________________________________________________________. 45. The Security Council is responsible
for ________________________________________________________________________
________________________________________________________________________
________________________________________________________________________ _________________. 46. The
“Land of Un” means ________________________________________________________________________
________________________________________________________________________ ___________. 47. Humanitarian
intervention is _________________________________________. An example of it is
___________________________________________________________________. 48. ____________________ is
generally considered to prohibit the unilateral use of force. III. Multiple Choice (2 points
each) 49. “[THERE MUST BE SHOWN] A NECESSITY FOR SELF DEFENSE, INSTANT,
OVERWHELMING, LEAVING NO CHOICE OF MEANS, AND NO MOMENT FOR
DELIBERATION; [AND, FURTHER, THE ACTION TAKEN MUST INVOLVE] NOTHING
UNREASONABLE OR EXCESSIVE, SINCE THE ACT JUSTIFIED BY THAT NECESSITY OF SELF
DEFENSE MUST BE LIMITED BY THAT NECESSITY AND KEPT CLEARLY WITHIN IT.” This
quote comes from the: A. B. C. D. E. Reynolds Case Totten Case Caroline Case Hamdan Case
None of the Above. 50. The National Security Act of 1947 prohibits: a. POTUS form making
war. b. Covert action. c. The CIA from undertaking CONUS security functions d. All of the
Above e. None of the Above 51. The “INTs” most closely associated with the Katz and Keith
cases are: a. MASINT and TECHINT b. HUMINT and OSINT c. TECHINT and GEOINT d. All of
the Above e. None of the Above 52. National Security Law a. Authorizes and prohibits with
subjective guidelines b. Prohibits only and is not substantive in nature c. Can provide
procedural and substantive guidelines d. All of the above e. None of the Above 53. The
National Security Act of 1947 prohibits: a. POTUS from making war. b. Covert action. c. The
CIA from undertaking CONUS security functions d. All of the Above e. None of the
AboveNSEC 1101 Western Kentucky University Midterm Examination

More Related Content

Similar to NSEC 1101 Western Kentucky University Midterm Examination.docx

The USS Cole was attacked by suicide bombers in the.docx
The USS Cole was attacked by suicide bombers in the.docxThe USS Cole was attacked by suicide bombers in the.docx
The USS Cole was attacked by suicide bombers in the.docx
sdfghj21
 
Effect based operation
Effect based operationEffect based operation
Effect based operation
Wahid haque
 
A framework for deception
A framework for deceptionA framework for deception
A framework for deception
UltraUploader
 
Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...
Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...
Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...
Dawn Jones
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
dondiw
 
2a Criminal homework help.docx
2a Criminal homework help.docx2a Criminal homework help.docx
2a Criminal homework help.docx
sdfghj21
 
Jeff ifrah get familiarize yourself with variety of laws
Jeff ifrah  get familiarize yourself with variety of lawsJeff ifrah  get familiarize yourself with variety of laws
Jeff ifrah get familiarize yourself with variety of laws
Jeff Ifrah
 
The final project for this course will allow you to see yourself i
The final project for this course will allow you to see yourself iThe final project for this course will allow you to see yourself i
The final project for this course will allow you to see yourself i
mosyrettcc
 
STAT 6509 Group Project 6-12 revision_3
STAT 6509 Group Project 6-12 revision_3STAT 6509 Group Project 6-12 revision_3
STAT 6509 Group Project 6-12 revision_3
Christina Huang
 
The final project for this course will allow you to see yourself in 
The final project for this course will allow you to see yourself in The final project for this course will allow you to see yourself in 
The final project for this course will allow you to see yourself in 
chestnutkaitlyn
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8
John Paul Tabakian
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
Lillian Ekwosi-Egbulem
 
V450550H455 Homeland Security Policy and PracticeSpring 20
V450550H455 Homeland Security Policy and PracticeSpring 20V450550H455 Homeland Security Policy and PracticeSpring 20
V450550H455 Homeland Security Policy and PracticeSpring 20
tidwellerin392
 

Similar to NSEC 1101 Western Kentucky University Midterm Examination.docx (13)

The USS Cole was attacked by suicide bombers in the.docx
The USS Cole was attacked by suicide bombers in the.docxThe USS Cole was attacked by suicide bombers in the.docx
The USS Cole was attacked by suicide bombers in the.docx
 
Effect based operation
Effect based operationEffect based operation
Effect based operation
 
A framework for deception
A framework for deceptionA framework for deception
A framework for deception
 
Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...
Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...
Essay Linking Sentences Examples - How To Begin A New Paragraph. Useful ...
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
2a Criminal homework help.docx
2a Criminal homework help.docx2a Criminal homework help.docx
2a Criminal homework help.docx
 
Jeff ifrah get familiarize yourself with variety of laws
Jeff ifrah  get familiarize yourself with variety of lawsJeff ifrah  get familiarize yourself with variety of laws
Jeff ifrah get familiarize yourself with variety of laws
 
The final project for this course will allow you to see yourself i
The final project for this course will allow you to see yourself iThe final project for this course will allow you to see yourself i
The final project for this course will allow you to see yourself i
 
STAT 6509 Group Project 6-12 revision_3
STAT 6509 Group Project 6-12 revision_3STAT 6509 Group Project 6-12 revision_3
STAT 6509 Group Project 6-12 revision_3
 
The final project for this course will allow you to see yourself in 
The final project for this course will allow you to see yourself in The final project for this course will allow you to see yourself in 
The final project for this course will allow you to see yourself in 
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
V450550H455 Homeland Security Policy and PracticeSpring 20
V450550H455 Homeland Security Policy and PracticeSpring 20V450550H455 Homeland Security Policy and PracticeSpring 20
V450550H455 Homeland Security Policy and PracticeSpring 20
 

More from stirlingvwriters

Speak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docxSpeak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docx
stirlingvwriters
 
What is the logic behind How.docx
What is the logic behind How.docxWhat is the logic behind How.docx
What is the logic behind How.docx
stirlingvwriters
 
Thinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docxThinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docx
stirlingvwriters
 
The student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docxThe student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docx
stirlingvwriters
 
To help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docxTo help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docx
stirlingvwriters
 
TITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docxTITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docx
stirlingvwriters
 
This assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docxThis assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docx
stirlingvwriters
 
Upton Souls of Black.docx
Upton Souls of Black.docxUpton Souls of Black.docx
Upton Souls of Black.docx
stirlingvwriters
 
What is a In this.docx
What is a In this.docxWhat is a In this.docx
What is a In this.docx
stirlingvwriters
 
There are many possible sources of literature for.docx
There are many possible sources of literature for.docxThere are many possible sources of literature for.docx
There are many possible sources of literature for.docx
stirlingvwriters
 
You enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docxYou enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docx
stirlingvwriters
 
Write a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docxWrite a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docx
stirlingvwriters
 
View the video on Law at Discuss various.docx
View the video on Law at Discuss various.docxView the video on Law at Discuss various.docx
View the video on Law at Discuss various.docx
stirlingvwriters
 
Your software has gone live and is in the production.docx
Your software has gone live and is in the production.docxYour software has gone live and is in the production.docx
Your software has gone live and is in the production.docx
stirlingvwriters
 
This learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docxThis learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docx
stirlingvwriters
 
This is a school community relations My chosen school.docx
This is a school community relations My chosen school.docxThis is a school community relations My chosen school.docx
This is a school community relations My chosen school.docx
stirlingvwriters
 
Write 3 Only one resource is I.docx
Write 3 Only one resource is I.docxWrite 3 Only one resource is I.docx
Write 3 Only one resource is I.docx
stirlingvwriters
 
Sociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docxSociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docx
stirlingvwriters
 
Step Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docxStep Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docx
stirlingvwriters
 
You are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docxYou are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docx
stirlingvwriters
 

More from stirlingvwriters (20)

Speak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docxSpeak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docx
 
What is the logic behind How.docx
What is the logic behind How.docxWhat is the logic behind How.docx
What is the logic behind How.docx
 
Thinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docxThinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docx
 
The student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docxThe student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docx
 
To help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docxTo help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docx
 
TITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docxTITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docx
 
This assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docxThis assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docx
 
Upton Souls of Black.docx
Upton Souls of Black.docxUpton Souls of Black.docx
Upton Souls of Black.docx
 
What is a In this.docx
What is a In this.docxWhat is a In this.docx
What is a In this.docx
 
There are many possible sources of literature for.docx
There are many possible sources of literature for.docxThere are many possible sources of literature for.docx
There are many possible sources of literature for.docx
 
You enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docxYou enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docx
 
Write a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docxWrite a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docx
 
View the video on Law at Discuss various.docx
View the video on Law at Discuss various.docxView the video on Law at Discuss various.docx
View the video on Law at Discuss various.docx
 
Your software has gone live and is in the production.docx
Your software has gone live and is in the production.docxYour software has gone live and is in the production.docx
Your software has gone live and is in the production.docx
 
This learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docxThis learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docx
 
This is a school community relations My chosen school.docx
This is a school community relations My chosen school.docxThis is a school community relations My chosen school.docx
This is a school community relations My chosen school.docx
 
Write 3 Only one resource is I.docx
Write 3 Only one resource is I.docxWrite 3 Only one resource is I.docx
Write 3 Only one resource is I.docx
 
Sociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docxSociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docx
 
Step Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docxStep Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docx
 
You are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docxYou are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docx
 

Recently uploaded

Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 

Recently uploaded (20)

Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 

NSEC 1101 Western Kentucky University Midterm Examination.docx

  • 1. NSEC 1101 Western Kentucky University Midterm Examination NSEC 1101 Western Kentucky University Midterm ExaminationORDER HERE FOR ORIGINAL, PLAGIARISM-FREE PAPERS ON NSEC 1101 Western Kentucky University Midterm ExaminationHi please see attached file and check if you can answer these questions with the following book as your reference:1. Baker, James E. (2007). In The Common Defense. New York, N.Y: Cambridge University Press. ISBN: 978-0-521-87763-3.I don’t have a copy of it.please keep in mind that Regarding numbers 15 and 42 of the midterm. Question 15 is in the true or false sections but appears in the Fill in the Blank and number 42 is in the Fill in the Blank section and is a True or Falsequestion; they are in the wrong sections, pls answer accordingly.please answer these questions with focus and don’t answer unless 100% sure of the answers please.DONT MAKE A BED LONGER THAN THREE HOURS JUST DONTNSEC 1101 Western Kentucky University Midterm Examinationattachment_1Unformatted Attachment PreviewMIDTERM EXAMINATION NSEC 1101 (Spring 2020) NAME: I. 1. 2. (2 points) True/False (2 pts each) Article 41 says the UN SECURITY COUNCIL decides on FORCEFUL MEASURES. Data, information, and intelligence are all the same. 3. ______ The Nicaragua case demonstrates the US’s correct application of collective selfdefense. 4. Electronic surveillance directed at persons within the United States for law enforcement purposes is subject to the Fourth Amendment. 5. Covert action is not an intelligence function. 6. Today, the DNI controls and leads all the IC organizations. 7. Analysis is what makers intelligence actionable. 8. Time is a common element at the Strategic, Operational, and Tactical levels. 9. The National Security Act of 1947 (as amended) is a bedrock of intelligence law? 10. 11. The National Security Strategy (NSS) is POTUS’ national security direction to Executive Branch agencies and institutions. All dimensions are naturally occurring. 12. ______ The US, Canada and Mexico are in NORTHCOM. 13. ______ POTUS is Commander in Chief of the country. 14. ______ E.O. 12333 made the death of General Soleimani and Usama Bin Laden unlawful killings. 15. _______ is the NGO identified in the Geneva Conventions. 16. _____ The Nicaragua case demonstrates the US’s erroneous application of collective self-defense principles. 17. _______ Placing human shields around a military object makes it immune from attack. 18. _____ Anticipatory defense has a higher threshold of action than preemptive attack. II. Fill-in the Blanks Below (2 points for each complete answer). 19. The is a top-secret court. 20. The original leader of the IC in 1947 was . This individual was changed in 2004, the assumed the IC leadership role. 21. “Nothing in the present charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs against a member of the United Nations until the
  • 2. Security Council has taken measures necessary to maintain international please and security….”, is a quote from . 22. Reynolds is a doctrine of type case. 23. The five intelligence functions identified by Judge/Professor Baker are: 24. As a dimension, cyber is unique because it is and . 25. Name three intelligence statues passed by Congress: 26. DNI’s role under the 2004 Reform Act in the IC is the same as the the NSA of 1947. leader under 27. The National Security Strategy (NSS) is POTUS’ national security direction to agencies and institutions. 28. International law says a state is defined by having 29. A threat is plus . 30. The IC is 31. PC is . . 32. The legal documents that are the ultimate guides of the NSS are and . 33. The is a problem that arose over the concern that law enforcement and intelligence personnel might misuse FISA. 34. _____________ provides combat ready SEALS and Rangers to geographic combatant commands. 35. The US combat operations chain of command is POTUS, _____________, Commander Geographic Combatant Command. 36. The four principles of the method and means of warfare are ________________________________________________________________________ ________________________________________________________________________ ___________. 37. An example of perfidy is ___________________________________________________. 38. The US involvement in the ____________________ War/conflict was a correct application of self-defense. 39. Self-defense by protection of nationals is problematic because of _______________ and _______________ countries interactions. 40. _________________ self-defense is objective and ____________ self-defense is subjective. 41. Imminent attack is ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ _______________________. 42. _____ Anticipatory defense has a higher threshold of action than preemptive attack. 43. The three core elements of anticipatory self-defense are ________________________________________________________________________ ________________________________________________________________________ ___________. 44. Jus en bello is_______________________________________. Jus ad bellum is __________________________________________________________. 45. The Security Council is responsible for ________________________________________________________________________ ________________________________________________________________________ ________________________________________________________________________ _________________. 46. The “Land of Un” means ________________________________________________________________________ ________________________________________________________________________ ___________. 47. Humanitarian intervention is _________________________________________. An example of it is ___________________________________________________________________. 48. ____________________ is generally considered to prohibit the unilateral use of force. III. Multiple Choice (2 points each) 49. “[THERE MUST BE SHOWN] A NECESSITY FOR SELF DEFENSE, INSTANT, OVERWHELMING, LEAVING NO CHOICE OF MEANS, AND NO MOMENT FOR DELIBERATION; [AND, FURTHER, THE ACTION TAKEN MUST INVOLVE] NOTHING UNREASONABLE OR EXCESSIVE, SINCE THE ACT JUSTIFIED BY THAT NECESSITY OF SELF DEFENSE MUST BE LIMITED BY THAT NECESSITY AND KEPT CLEARLY WITHIN IT.” This
  • 3. quote comes from the: A. B. C. D. E. Reynolds Case Totten Case Caroline Case Hamdan Case None of the Above. 50. The National Security Act of 1947 prohibits: a. POTUS form making war. b. Covert action. c. The CIA from undertaking CONUS security functions d. All of the Above e. None of the Above 51. The “INTs” most closely associated with the Katz and Keith cases are: a. MASINT and TECHINT b. HUMINT and OSINT c. TECHINT and GEOINT d. All of the Above e. None of the Above 52. National Security Law a. Authorizes and prohibits with subjective guidelines b. Prohibits only and is not substantive in nature c. Can provide procedural and substantive guidelines d. All of the above e. None of the Above 53. The National Security Act of 1947 prohibits: a. POTUS from making war. b. Covert action. c. The CIA from undertaking CONUS security functions d. All of the Above e. None of the AboveNSEC 1101 Western Kentucky University Midterm Examination