Exam 8: Defending a Virtual World: Cybersecurity and Homeland Security
Exam 1: Understanding the Homeland Security Enterprise: Coordination and Partnerships22 Questions
Exam 2: Going Global: International Ties in Homeland Security19 Questions
Exam 3: Laws, Legal Processes, and Enforcement Mechanisms: Criminal Justice Dimensions of Homeland Security19 Questions
Exam 4: Toward a Smarter Defense: Big Data and Risk Assessments in Homeland Security19 Questions
Exam 5: Privacy, Liberty, and Security: Finding a Balance20 Questions
Exam 6: Advancing Economic and Societal Resilience: Critical Infrastructure Protection21 Questions
Exam 7: The Flying Edge: Aviation Security Evolves20 Questions
Exam 8: Defending a Virtual World: Cybersecurity and Homeland Security20 Questions
Exam 9: Lines and Flows: on National Sovereignty and Border Security19 Questions
Exam 10: UP From the Ashes: Emergency Management and Disaster Recovery21 Questions
Exam 11: Does Moore Mean More: the Promises and Pitfalls of Homeland Security Technologies19 Questions
Exam 12: Like the Plague: Public Health in Homeland Security22 Questions
Exam 13: The Future of Homeland Security: Challenges and Opportunities21 Questions
Select questions type
The primary difference between cybercriminals and other types of criminals is their specific motivations.
Free
(True/False)
4.9/5
(33)
Correct Answer:
False
The CISA is organized into three divisions centered on particular areas of focus within critical infrastructure protection-cyber protection, infrastructure resilience, and _____________________.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
B
________________ refers to the scope of electronic targets that are vulnerable to potential malicious action.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
Hacktivists are hackers who use their skills for the purposes of political and social activism.
(True/False)
4.9/5
(31)
Cybercriminolgy is a relatively new academic discipline, where do you see the field moving in the next few years? Why?
(Essay)
4.8/5
(34)
Explain some of the PPP arrangements that can exist in the realm of cybersecurity.
(Essay)
4.8/5
(40)
_________________ refers to the study of cybercrime from a criminological perspective.
(Multiple Choice)
4.8/5
(23)
Why is it important to treat cybersecurity and critical infrastructure protection in an integrated fashion?
(Essay)
4.8/5
(44)
Every federal agency has employees working on cybersecurity initiatives.
(True/False)
4.8/5
(36)
Which of the following is not one of the five pillars identified in the DHS cybersecurity strategy?
(Multiple Choice)
4.8/5
(34)
There are no jurisdictional challenges to investigating and prosecuting cybercriminals.
(True/False)
4.8/5
(40)
There is virtually no criminal action today that does not have at least some link to online activity.
(True/False)
4.8/5
(38)
Which one of the following threats would NOT be considered to be a category of cybersecurity threats?
(Multiple Choice)
4.8/5
(35)
Discuss the advances have been made to manage the growing interconnections among computer networks and critical infrastructure.
(Essay)
4.9/5
(30)
__________________ is defined as efforts to protect the confidentiality, integrity, and availability of information technology infrastructure.
(Multiple Choice)
4.9/5
(35)
DHS is responsible for protecting the web servers of all non-military federal agencies.
(True/False)
4.7/5
(25)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)