Exam 12: Cyber Terrorism and Information Warfare
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
B
Although the Cyberterrorism Preparedness Act of 2002 was not passed,many of its goals were addressed by the ___________.
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
C
Information warfare is any attempt to manipulate information in pursuit of a military or political goal.
Free
(True/False)
4.8/5
(30)
Correct Answer:
True
A(n)________attack on data can include stealing or destroying data.
(Multiple Choice)
4.8/5
(34)
The ________ War was the first modern war in which there was strong and widespread domestic opposition.
(Multiple Choice)
4.8/5
(41)
Chinese hackers whose stated goal is to infiltrate Western computer systems are called the ___________.
(Multiple Choice)
4.8/5
(40)
One technique of disinformation is to pad a message with noise that the enemy will perceive as valuable information.
(True/False)
4.8/5
(38)
Radio Free Europe was supported by Western democracies during the Cold War.
(True/False)
4.8/5
(36)
The joint task force representing components of all four U.S armed services is the ____________.
(Multiple Choice)
4.8/5
(30)
The Stuxnet virus was directed against Iraqi nuclear facilities.
(True/False)
4.8/5
(35)
Hactivists means individuals who work for a cause using cyberterrorism.
(True/False)
4.9/5
(28)
In 1996 a hacker allegedly associated with the white supremacist movement temporarily disabled a ___________ ISP.
(Multiple Choice)
4.8/5
(34)
In May 2007,government offices of _________ were subjected to a mass denial-of-service attack because some people opposed the government's removal of a Russian WWII memorial.
(Multiple Choice)
4.9/5
(30)
Cyberterrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.
(True/False)
4.8/5
(27)
Any attempt to manipulate information in pursuit of a military or political goal is ________.
(Multiple Choice)
4.8/5
(39)
A propaganda agent can manage multiple online personalities,posting to many different _____________.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 23
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)