In cyber conflict it is difficult to distinguish military and civilian targets because __________.
a. Cyber attacks cannot be used precisely against specific targets.
b. Civilian traffic typically runs on military-maintained networks.
c. Military and civilian targets share much of the same infrastructure.
d. The civilian/military distinction is often irrelevant to those committing cyber attacks.
What role does the state play in the patterns and cycles of violence that the World Bank identifies?
a. Some states have an unlimited ability to control drug trafficking.
b. Political competition, including elections, reduces criminal gangs.
c. States with significant government interference may tend to see more political violence.
d. States can help countries emerging from violent internal conflict improve living conditions for their people.
What is the difference between jus ad bellum and jus in bello?
a. Jus ad bellum regulates actual warfighting, jus in bello regulates when a state may go to war.
b. Jus ad bellum regulates when a state may go to war, jus in bello regulates actual warfighting.
c. Jus ad bellum dictates the rules of surrender and reconciliation while jus in bello dictates the rules of actual warfighting.
d. Jus ad bellum dictates the rules of actual warfighting while jus in bello dictates the rules of surrender and reconciliation.
What might explain the decrease in civil wars despite the increase in the number of states?
a. the collapse of the Soviet Union and the end of the Cold War
b. Previous civil wars may have ended with the breakup of larger states into smaller ones.
c. New states lack the legacy of colonialism that frequently led to civil war.
d. Newer states tend to be democracies, which decreases the likelihood of civil war.
According to Lin, which nation is believed to be an actor who has perpetrated acts of cyber exploitation?
a. Iraq
b. Japan
c. Germany
d. United States