Exam 5: Threats to Cybersecurity by Hacktivists and Nation States

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Insiders are people who are current or former employees of a company, contractors, or friends of employees.

Free
(True/False)
4.8/5
(43)
Correct Answer:
Verified

True

Identify and explain international threats and the three main forms associated with those threats. Are there any recent examples of international threats that fall within the three forms?

Free
(Essay)
5.0/5
(37)
Correct Answer:
Verified

A strong answer will include the following, along with an explanation of the form of threat.
-nation-states hacking or spying on trade and other secret information-a significant threat to the United States, for example, would be China
-advanced hackers aiming at large corporations-typically motivated by financial and political goals
-terrorists looking to identify and exploit vulnerabilities in our infrastructures and to infiltrate military and government systems-cyberterrorism

______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data.

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

A

Groups with displeasure of government are often motivated by all of the following except ______.

(Multiple Choice)
4.8/5
(43)

Malicious insiders may delete or expose sensitive information by incident-either by pressing a wrong key or by other errors.

(True/False)
4.7/5
(29)

Explain displeasure with the government and why groups such as Anonymous launch cyberattacks. Why do they launch cyberattacks? Do you agree with the work of such hacktivist groups? Why or why not?

(Essay)
4.8/5
(45)

Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.

(True/False)
4.9/5
(41)

Threats that originate from inside the company or organization are referred to as ______.

(Multiple Choice)
4.8/5
(35)

According to the text, cyberthreats originate mainly from all of the following entities except ______.

(Multiple Choice)
4.9/5
(40)

Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

(Multiple Choice)
4.9/5
(38)

The most serious insider cybercrimes include all of the following except ______.

(Multiple Choice)
4.9/5
(36)

Some of the most common insider cybersecurity crimes are cyberbullying and cyberharassment.

(True/False)
4.8/5
(42)

One of the most persistent threats for the United States in terms of cyberattacks originates in ______.

(Multiple Choice)
4.9/5
(35)

Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.

(True/False)
4.8/5
(35)

All of the following were identified as vulnerable infrastructures except ______.

(Multiple Choice)
4.8/5
(47)

Which of the following characteristics of hackers is not true?

(Multiple Choice)
4.8/5
(41)

Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.

(Multiple Choice)
4.8/5
(39)

Explain hackernomics and identify five laws that apply to hackers.

(Essay)
4.9/5
(32)

Advanced hackers are typically motivated by financial or political goals.

(True/False)
4.8/5
(31)

People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)