Filters
Question type

Study Flashcards

_______________ is something that can 'increase the striking potential of a unit without increasing its personnel.'?


A) force amplifier
B) force multiplier
C) tactical manuever
D) kinetic amplifier

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

B

Terrorist groups make use of the internet in support of their conventional, terrestrially based activities. Which of the following is one of the ways the textbook describes the internet being used to facilitate terrorist activities?


A) Communication and coordination
B) Propaganda, publicity and recruitment
C) Information gathering
D) All of the above
E) None of the above

F) All of the above
G) None of the above

Correct Answer

verifed

verified

This act considerably strengthened penalties under the Computer Fraud and Abuse Act of 1986, including the provision for the life imprisonment of convicted 'cyberterrorists'.?


A) The Terrorism Act of 2000
B) The Cybercrime Prevention Act of 2012
C) The US PATRIOT Act of 2001
D) The Cyber Security Enhancement Act of 2002

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

C

This form of hacktivism is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists.?


A) Doxxing and leaking
B) Website defacements
C) Email bombs
D) Virtual sit-ins and blockades

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

This form of hacktivism involves exposing collections of private information on an individual, often with the goal of shaming, silencing, or coercing the person.?


A) Email bombs
B) Doxxing and leaking
C) Virtual sit-ins and blockades
D) Development of privacy and resistance tools

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

B

Some argue that the media and political figures attempt to generate public concern about cybercrime in order to secure sectional interests. Becker (1963) would label this behaviour as _______________.?


A) moral entrepreneurship
B) dramatization
C) secondary deviance
D) moral panic

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Which individual leaked the video now titled "Collateral Murder" that showed a US Apache helicopter gunning down Iraqi civilians and two Reuters journalists?


A) Warren Ellis
B) Frank Derringer
C) Warren Zevon
D) Chelsea Manning

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

A term commonly used to describe hacking for the purposes of political activism and protest is _______________.?


A) cyberterrorism
B) cultural hacking
C) hacktivism
D) cyberwarfare

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

This process allows communications to be encoded prior to transmission so that they will be unreadable if intercepted.?


A) Formatting
B) Bootstrapping
C) Encryption
D) Compression

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

In the wake of 9/11, the Bush administration created this federal agency to bolster the protection of critical information infrastructure.?


A) The Department of Defence
B) The Department of Homeland Security
C) The Department of the Interior
D) The Department of Energy

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

_______________ was a "digital weapon" deployed to sabotage Iranian nuclear enrichment efforts.?


A) Mirai
B) Stuxnet
C) Lovebug
D) AcidBurn

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

_______________ was a hacker from Kosovo who compromised a retail company's system and obtained the names, passwords, email address, and other data of hundreds of thousands of people. He then combed through that data and leaked the information associated with over a thousand military and government employees to the Islamic State.?


A) Ardit Ferizi
B) John Stockton
C) Abu Sayyaf
D) Robert Mueller

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In 2010, Anonymous launched a DDoS campaign against various credit card and payment processing companies like Visa, PayPal, and Mastercard. This campaign was launched in retaliation for these companies cutting off donations to which organization?


A) WikiLeaks
B) Cult of the Dead Cow
C) Anonymous
D) Zapatistas

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

All of these components are involved in the definition of cyberterrorism except that _________________.?


A) the act costs the government at least $10,000 in damages
B) the act is against governmental entities
C) the act is a part of a person or group's political agenda
D) the act involves unlawful attacks or threats against ICTs

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which hacker most likely coined the term "hacktivism"?


A) Kevin Mitnick
B) Omega
C) TheJester
D) Crash Override

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which one of the following is not classified as part of a nation's critical information infrastructure?


A) Telecommunications
B) The Internet
C) Hardware and software
D) Water systems

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

According to Rid, the term "cyberwarfare" should may actually reduce the violence involved in other forms of warfare because it involves significant changes and advances in _______________.?


A) sabotage
B) espionage
C) subversion
D) All of the above
E) None of the above

F) B) and D)
G) A) and C)

Correct Answer

verifed

verified

_______________ is an "infrastructure or asset the incapacitation or destruction of which would have a debilitating impact on the national security or economic or social welfare of a nation."?


A) Critical infrastructure
B) Sensitive infrastructure
C) Vital Infrastructure
D) Necessary infrastructure

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

_______________ works by hiding data within the digital code used to construct images.?


A) Photo-masking
B) Imprintography
C) Stelliography
D) Steganography

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

This form of hacktivism attempts to ruin and alter online sites as a form of protest.?


A) Website defacement
B) Development of privacy and resistance tools
C) Doxxing and leaking
D) Virtual sit-ins and blockades

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 20

Related Exams

Show Answer