A) force amplifier
B) force multiplier
C) tactical manuever
D) kinetic amplifier
Correct Answer
verified
Multiple Choice
A) Communication and coordination
B) Propaganda, publicity and recruitment
C) Information gathering
D) All of the above
E) None of the above
Correct Answer
verified
Multiple Choice
A) The Terrorism Act of 2000
B) The Cybercrime Prevention Act of 2012
C) The US PATRIOT Act of 2001
D) The Cyber Security Enhancement Act of 2002
Correct Answer
verified
Multiple Choice
A) Doxxing and leaking
B) Website defacements
C) Email bombs
D) Virtual sit-ins and blockades
Correct Answer
verified
Multiple Choice
A) Email bombs
B) Doxxing and leaking
C) Virtual sit-ins and blockades
D) Development of privacy and resistance tools
Correct Answer
verified
Multiple Choice
A) moral entrepreneurship
B) dramatization
C) secondary deviance
D) moral panic
Correct Answer
verified
Multiple Choice
A) Warren Ellis
B) Frank Derringer
C) Warren Zevon
D) Chelsea Manning
Correct Answer
verified
Multiple Choice
A) cyberterrorism
B) cultural hacking
C) hacktivism
D) cyberwarfare
Correct Answer
verified
Multiple Choice
A) Formatting
B) Bootstrapping
C) Encryption
D) Compression
Correct Answer
verified
Multiple Choice
A) The Department of Defence
B) The Department of Homeland Security
C) The Department of the Interior
D) The Department of Energy
Correct Answer
verified
Multiple Choice
A) Mirai
B) Stuxnet
C) Lovebug
D) AcidBurn
Correct Answer
verified
Multiple Choice
A) Ardit Ferizi
B) John Stockton
C) Abu Sayyaf
D) Robert Mueller
Correct Answer
verified
Multiple Choice
A) WikiLeaks
B) Cult of the Dead Cow
C) Anonymous
D) Zapatistas
Correct Answer
verified
Multiple Choice
A) the act costs the government at least $10,000 in damages
B) the act is against governmental entities
C) the act is a part of a person or group's political agenda
D) the act involves unlawful attacks or threats against ICTs
Correct Answer
verified
Multiple Choice
A) Kevin Mitnick
B) Omega
C) TheJester
D) Crash Override
Correct Answer
verified
Multiple Choice
A) Telecommunications
B) The Internet
C) Hardware and software
D) Water systems
Correct Answer
verified
Multiple Choice
A) sabotage
B) espionage
C) subversion
D) All of the above
E) None of the above
Correct Answer
verified
Multiple Choice
A) Critical infrastructure
B) Sensitive infrastructure
C) Vital Infrastructure
D) Necessary infrastructure
Correct Answer
verified
Multiple Choice
A) Photo-masking
B) Imprintography
C) Stelliography
D) Steganography
Correct Answer
verified
Multiple Choice
A) Website defacement
B) Development of privacy and resistance tools
C) Doxxing and leaking
D) Virtual sit-ins and blockades
Correct Answer
verified
Showing 1 - 20 of 20
Related Exams