Internatıonal Securıty Ara 4. Deneme Sınavı
Toplam 20 Soru1.Soru
Which of the followings is among the nuclear weapons states are the Treaty on the Non-Proliferation of Nuclear Weapons?
South Korea. |
Japan. |
Germany. |
Canada. |
Pakistan. |
The nuclear weapons states are the Treaty on the Non-Proliferation of Nuclear Weapons (NPT)-designated nuclear weapon states (China, France, Russia, United Kingdom, and United States) and other states with nuclear weapons (India, North Korea, and Pakistan). Therefore, the correct option is E.
2.Soru
Which of the followings refers to a state's right of self-defense against a threat when it has reasonable doubt and adequate information that another state’s attack?
Sufficient gravity. |
Preemptive strike. |
Domestic jurisdiction. |
Defensive force. |
Proliferation. |
the critical legal question here is, whether a state when it has reasonable doubt and adequate information that another state’s attack against itself is imminent can first act and use its right of self-defense. In other words, if the threat of an attack in imminent, does this justify the state to use force preemptively? This issue, which in the literature of International Relations is known as “preemptive strike” or “preventive strike,” is still controversial (Bellier, 2006); however, the actual law (with the exception of recent grave situations such as terrorism) is in conformity with the approach that the UN Charter should be interpreted rather narrowly. Therefore, the correct option is B.
3.Soru
Which of the following names outlines the"six principles of political realism"?
Morgenthau |
Machiavelli |
Thucydides |
Thomas Hobbes |
Sun Tzu |
Morgenthau outlines the “six principles of political realism” as follows:
• Politics is governed by objective laws which have their root in human nature.
• The key to understanding international politics is the concept of interest defined in terms of power.
• The forms and nature of state power will vary in time, place and context but the concept of interest remains consistent.
• Universal moral principles do not guide state behavior, although this does not rule out an awareness of the moral significance of political action.
• Moral aspirations are specific to a particular nation; there is no universally agreed set of moral principles.
• The political sphere is autonomous
4.Soru
"Threats outside the range of conventional warfare and attacks that are difficult to respond to in kind"
Which of the following belongs to this definition?
Irregular warfare |
Asymmetrical warfare |
Psychological warfare |
Information warfare |
Cyber warfare |
Asymmetrical warfare is defined as threats outside the range of conventional warfare
and attacks that are difficult to respond to in kind such as suicide bombings.
5.Soru
When did the Non-Proliferation Treaty (NPT) come into force?
1970 |
1975 |
1980 |
1985 |
1990 |
The Non-Proliferation Treaty (NPT) came into force in 1970. The correct answer is A.
6.Soru
Which of the followings refers to combination of conventional and irregular warfare?
Nano-warfare. |
Asymmetrical warfare. |
Hybrid warfare. |
Cyber warfare. |
Information warfare. |
Hybrid warfare combines both conventional (state-tostate) and irregular warfare (terrorism, insurgency, and counterterrorism). Therefore, the correct option is C.
7.Soru
Which one is NOT true about humanitarian intervention?
It comprises use of force, particularly military elements. |
It must lack the consent of the government of the target state. |
It takes place where there is actual or impending grievous suffering or loss of life. |
The Security Council authorization is required. |
Internal agent should carry out humani- tarian intervention. |
uments among definitions, some common points could be derived from these conceptualization efforts on humanitarian intervention (Weiss, 2002; Pattison, 2010: 25-27; Shimko, 2010):
1.It comprises use of force, particularly mili- tary elements.
2.Humanitarian intervention must lack the consent of the government of the target state.
3.It takes place where there is actual or im- pending grievous suffering or loss of life.
4. External agent should carry out humani- tarian intervention.
5. Humanitarian intervention must have a humanitarian intention.
6. The Security Council authorization is required.
8.Soru
Which of the following is the activity that includes measures to address ongoing conflicts and usually comprises diplomatic action and mediation to bring hostile parties to a negotiated agreement?
Peacemaking |
Responsibility to protect |
Humanitarian intervention |
State sovereignty |
Self-determination |
Peacemaking includes measures to address ongoing conflicts and usually comprises diplomatic action and mediation to bring hostile parties to a negotiated agreement.
9.Soru
Which of the following is NOT classified under Critical Approach?
Feminist Security Studies |
Peace Research |
Copenhagen School |
Constructivist Security Studies |
Post-structuralism |
It is possible to classify ISS under two main approaches: Traditionalist and Critical. Military-oriented and state-centered conception of Security Studies (SS) and Peace Research are classified under the traditionalist approach whereas the Feminist Security Studies, the Copenhagen School, Post-structuralism, and Constructivist Security Studies under the Critical approach (Buzan and Hansen, 2009: 3).
10.Soru
Which of the followings is among the characteristics of the critical security approach?
It conceives threats as socially-constructed notions. |
It focuses on the problem of national security. |
It has a statist perspective. |
It emphasizes the concepts such as war, defense, strategy, and geopolitics. |
It mostly chooses a narrow or mono-sectoral agenda. |
The critical security approaches, on the other hand, aim to widen the concept of security through the issue linkage and bringing into discussion new types of threats, actors, and referent objects. The critical security approaches hold that threats and referent objects are socially-constructed. The critical ISS has developed over the past two decades with new debates on broadening and deepening the scope of security and its referent objects. It adopts diverse sets of theories and some form of post-positivist approach of security that shifts the ontological foundations of understanding of security towards on an emphasis on processes of construction, ideas, and identities. Critical approaches claim the logic of appropriateness in relation to norms and expectations, the logic of exceptionalism in securitization theory, the logic of practicality, the dynamics of discourse, or the potential paths towards security as emancipation. Therefore, the correct option is A.
11.Soru
What is the form of warfare which is a violent struggle among states and non-state actors for legitimacy and influence over the relevant populations?
Irregular warfare |
Hybrid warfare |
Cyber warfare |
Psychological warfare |
Asymmetrical warfare |
Irregular warfare is a violent struggle among states and non-state actors
for legitimacy and influence over the relevant populations.
Asymmetrical warfare is defined as threats outside the range of conventional warfare and attacks that are difficult to respond to in kind such as suicide bombings.
Psychological warfare is planned psychological activities designed to influence behavior, perceptions, and attitudes affecting the achievement of political and military objectives.
Information warfare is a type of battle for the control of the digital space involving the whole society. The basic strategies of Information Warfare are to deny access to information, disrupt/ destroy information, steal data and manipulate data to change its context or its perception.
Cyber warfare is an extension of policy by actions taken in cyberspace state or non-state actors that either is conducted in response to a perceived threat against a nation’s security or constitute a serious threat to a nation’s security. It occurs when nationstate engages in cyber operations and use the Internet as a new battlefield in conflict.
Hybrid warfare combines both conventional (state-tostate) and irregular warfare (terrorism, insurgency, and counterterrorism). Nano-warfare is a newly emerging field in strategy to use nanotechnologies and molecular manufacturing for future horrifically effective weapons.
12.Soru
Upon the Suez Crisis, which of the following was launched by the UN General Assembly in 1956?
UN Emergency Force (UNEF-I) |
UN Truce Supervision Organization (UNTSO) |
UN Disengagement Observer Force (UNDOF) |
UN Peacekeeping Force in Cyprus (UNFICYP) |
UN Interim Force in Lebanon (UNIFIL) |
Upon the Suez Crisis, the UN Emergency Force (UNEF-I) was launched by the UN General Assembly in 1956. The correct answer is A.
13.Soru
Who coined the term peacebuilding in his report, An Agenda for Peace?
Kofi Annan |
Boutros Ghali |
Ban Ki-Moon |
Javier Pèrez de Cuèllar |
António Guterres |
Peacebuilding was coined by Boutros Ghali in his “An Agenda for Peace” report released in 1992.
14.Soru
"The state is not only the referent object of security but it also includes human individuals, institutions and groups."
Which of the following is about the above-defined key concept in Critical Security Studies?
Referent Object |
Deepening |
Positivism |
Post-positivism |
Traditional Security Studies |
Key Concepts in Critical Security Studies
Referent Object: It is an object that is taken as the focus for analysis in security studies. As to this concept, there are two main approaches to the security: state-centric security (the state is the referent object) and human-centric approach (human is the referent object).
Traditional Security Studies: It refers to Realist, Liberal, Peace Studies and Strategic Studies perspectives in the study of security. All of them prioritize the state as the referent object of security and focus on military threats to the security of the state.
Broadening: The broadening security agenda refers to Barry Buzan’s sectoral analysis that the security agenda includes not only military sector issues but also political, economic, societal and environmental issues.
Deepening: The state is not only the referent object of security but it also includes human individuals, institutions and groups.
Positivism: It claims that social sciences can be built upon the same model as natural sciences. Scientific principles such as objectivity, verification/falsification, and generalization can adapt to the study of society.
Post-Positivism: It rejects the idea that it is possible to analyze the natural world and the social world in the same way. There is no objective view
15.Soru
Which of the following is an example of peace enforcement missions where the UN troops had to physically fight?
UN Truce Supervision Organization (UNTSO) |
UN Operation in Somalia (UNOSOM II) |
UN Disengagement Observer Force (UNDOF) |
UN Emergency Force (UNEF-I) |
UN Interim Force in Lebanon (UNIFIL) |
The following two missions were the peace enforcement missions where the UN troops had to physically fight: 1) The UN Operation in Congo (UNOC): started on July 14, 1960 with the Security Council Resolution 143 and continued until June 1964; 2) The UN Operation in Somali (UNOSOM II): started on March 26, 1993 with the Security Council Resolution 814 and continued until March 1995 under the leadership of the USA. The correct answer is B.
16.Soru
In which of the following terms realism defines international relations?
Power |
Security |
Identity |
Human nature |
Survival |
Realism defines international relations in terms of power.
17.Soru
Critical Security Studies _____ .
Which of the following best completes the sentece above?
rejects mainstream approaches such as realism and neorealism |
stemmed from a conference book on security |
focuses on referent subject of securiy, 'who or what to secure' |
is proven to be irrelevant to the study of security to human emancipation |
contributes to security studies by limiting the concept of security |
Critical Security Studies is an academic discipline within security studies which rejects mainstream approaches such as realism and neorealism.
In May 1994, a small conference was held at York University in Toronto entitled Strategies and Conflict: Critical Approaches to Security Studies. It brought together from around the world a variety of scholars with interests in security and with concern about new security studies in the early post-Cold War era. This conference title was used as the title of the book, edited by Keith Krause and Michael C. Williams. In their 1997 book, Critical Security Studies: Concept and Cases, Krause and Williams suggested a broad definition of critical security studies which covered all “new approaches” from Constructivism through Feminism and “Copenhagen School” to Poststructuralism.
Krause and Williams helped shape critical security studies as a pluralistic field. In addition, they pose such questions to open a broad and complex agenda for security studies. Questioning the referent object of security, ‘who or what is to be secured’, Krause and Williams challenged the traditional state-centric understanding of security and instead put forward the individual as the object of security.
The term Critical Security Studies is also used to refer to the coherent theoretical school created mostly by the endeavor of Professors Ken Booth and Richard Wyn Jones, Andrew Linklater and their colleagues from the Aberystwyth University. Booth and Wyn Jones developed a brand of ‘Critical Security Studies’ that challenged the definition of security in terms of military threats to the state, and instead linked the study of security to human emancipation.
Critical Security Studies contributes to security studies by broadening and deepening the concept of security. T
18.Soru
Which of the following is an example of an event pointing the need for a change towards global security?
Road accidents |
9/11 Attacks |
Refugees |
International relations |
Charismatic leaders |
September 11 and the wider threat of terrorism has highlighted the emergence of new security challenges that are particularly problematic because they arise from non-state actors and exploit the greater interconnectedness of the modern world. International security may, therefore, have given way to ‘global’ security.
19.Soru
Which one is true about The Period of League of Nations?
It is also known as Antecedents. |
It is one of the earliest evidences of collective military action. |
It was founded in 1920 as a result of the Paris Peace Conference ending the First Great War. |
It has been carried out since the founding of the UN. |
It is phase of Maturity in Evolution of Peace Operations. |
The League of Nations was founded in 1920 as a result of the Paris Peace Conference ending the First Great War.
20.Soru
Which of the followings refers to a violent struggle among states and non-state actors for legitimacy and influence over the relevant populations?
Information warfare. |
Irregular warfare. |
Cyber warfare. |
Asymmetrical warfare. |
Psychological warfare. |
Irregular warfare is a violent struggle among states and non-state actors for legitimacy and influence over the relevant populations. Therefore, the correct option is B.
-
- 1.SORU ÇÖZÜLMEDİ
- 2.SORU ÇÖZÜLMEDİ
- 3.SORU ÇÖZÜLMEDİ
- 4.SORU ÇÖZÜLMEDİ
- 5.SORU ÇÖZÜLMEDİ
- 6.SORU ÇÖZÜLMEDİ
- 7.SORU ÇÖZÜLMEDİ
- 8.SORU ÇÖZÜLMEDİ
- 9.SORU ÇÖZÜLMEDİ
- 10.SORU ÇÖZÜLMEDİ
- 11.SORU ÇÖZÜLMEDİ
- 12.SORU ÇÖZÜLMEDİ
- 13.SORU ÇÖZÜLMEDİ
- 14.SORU ÇÖZÜLMEDİ
- 15.SORU ÇÖZÜLMEDİ
- 16.SORU ÇÖZÜLMEDİ
- 17.SORU ÇÖZÜLMEDİ
- 18.SORU ÇÖZÜLMEDİ
- 19.SORU ÇÖZÜLMEDİ
- 20.SORU ÇÖZÜLMEDİ