Exam 5: Threats to Cybersecurity by Hacktivists and Nation States
Exam 1: Cyberspace, the Internet, and the World Wide Web40 Questions
Exam 2: What Is Cybersecurity40 Questions
Exam 3: Threat Factors Computers As Targets40 Questions
Exam 4: Threats to Cybersecurity by Criminals and Organized Crime40 Questions
Exam 5: Threats to Cybersecurity by Hacktivists and Nation States40 Questions
Exam 6: National Security: Cyberwarfare and Cyberespionage40 Questions
Exam 7: Cyberterrorism39 Questions
Exam 8: An Evolving Threat: the Deep Web40 Questions
Exam 9: Cybersecurity Operations40 Questions
Exam 10: Cyber Security Policies and Legal Issues40 Questions
Exam 11: What the Future Holds40 Questions
Select questions type
All of the following are examples of social engineering except ______.
(Multiple Choice)
4.7/5
(39)
International threats are those that originate from inside the company or organization.
(True/False)
4.8/5
(39)
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.
(Multiple Choice)
4.9/5
(28)
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.
(Multiple Choice)
4.9/5
(36)
Threats to cybersecurity originate from all of the following sources except ______.
(Multiple Choice)
4.8/5
(33)
Which of the following was NOT identified as one of the main forms of international threats?
(Multiple Choice)
4.9/5
(35)
Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?
(Essay)
5.0/5
(41)
The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."
(True/False)
4.9/5
(43)
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.
(Multiple Choice)
4.7/5
(36)
Hackers who are motivated by personal gain or a certain cause are often referred to as ______.
(Multiple Choice)
4.9/5
(42)
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.
(Multiple Choice)
4.8/5
(50)
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.
(Multiple Choice)
4.8/5
(37)
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
(True/False)
4.8/5
(33)
Which of the following is NOT considered a main type of insider threat?
(Multiple Choice)
4.9/5
(40)
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.
(True/False)
5.0/5
(31)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)