Exam 5: Threats to Cybersecurity by Hacktivists and Nation States

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are examples of social engineering except ______.

(Multiple Choice)
4.7/5
(39)

The "bad guy" hackers are known as ______.

(Multiple Choice)
4.9/5
(27)

International threats are those that originate from inside the company or organization.

(True/False)
4.8/5
(39)

According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

(Multiple Choice)
4.9/5
(28)

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.

(Multiple Choice)
4.9/5
(36)

Threats to cybersecurity originate from all of the following sources except ______.

(Multiple Choice)
4.8/5
(33)

Which of the following was NOT identified as one of the main forms of international threats?

(Multiple Choice)
4.9/5
(35)

Identify and discuss the three main types of insider threats.

(Essay)
4.7/5
(44)

Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?

(Essay)
5.0/5
(41)

The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."

(True/False)
4.9/5
(43)

The least common but most costly is ______ insider threat.

(Multiple Choice)
4.8/5
(33)

Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.

(Multiple Choice)
4.7/5
(36)

Hackers who are motivated by personal gain or a certain cause are often referred to as ______.

(Multiple Choice)
4.9/5
(42)

A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

(Multiple Choice)
4.8/5
(50)

The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

(Multiple Choice)
4.8/5
(37)

Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.

(True/False)
4.8/5
(33)

Cyber terrorism attacks often take the form of ______.

(Multiple Choice)
4.9/5
(36)

Which of the following laws does not apply to hackers?

(Multiple Choice)
4.9/5
(35)

Which of the following is NOT considered a main type of insider threat?

(Multiple Choice)
4.9/5
(40)

National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.

(True/False)
5.0/5
(31)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)