Exam 8: Defending a Virtual World: Cybersecurity and Homeland Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The primary difference between cybercriminals and other types of criminals is their specific motivations.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

False

The CISA is organized into three divisions centered on particular areas of focus within critical infrastructure protection-cyber protection, infrastructure resilience, and _____________________.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

B

________________ refers to the scope of electronic targets that are vulnerable to potential malicious action.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

Hacktivists are hackers who use their skills for the purposes of political and social activism.

(True/False)
4.9/5
(31)

Cybercriminolgy is a relatively new academic discipline, where do you see the field moving in the next few years? Why?

(Essay)
4.8/5
(34)

Describe the different classifications of hackers.

(Essay)
4.8/5
(42)

Explain some of the PPP arrangements that can exist in the realm of cybersecurity.

(Essay)
4.8/5
(40)

_________________ refers to the study of cybercrime from a criminological perspective.

(Multiple Choice)
4.8/5
(23)

Why is it important to treat cybersecurity and critical infrastructure protection in an integrated fashion?

(Essay)
4.8/5
(44)

Every federal agency has employees working on cybersecurity initiatives.

(True/False)
4.8/5
(36)

Which of the following is not one of the five pillars identified in the DHS cybersecurity strategy?

(Multiple Choice)
4.8/5
(34)

There are no jurisdictional challenges to investigating and prosecuting cybercriminals.

(True/False)
4.8/5
(40)

Summarize how anonymous browsers work.

(Essay)
4.9/5
(40)

What lessons can be learned from studying the Stuxnet virus?

(Essay)
4.8/5
(27)

There is virtually no criminal action today that does not have at least some link to online activity.

(True/False)
4.8/5
(38)

Which one of the following threats would NOT be considered to be a category of cybersecurity threats?

(Multiple Choice)
4.8/5
(35)

The scope of cybersecurity threats that exists today is vast.

(True/False)
4.8/5
(33)

Discuss the advances have been made to manage the growing interconnections among computer networks and critical infrastructure.

(Essay)
4.9/5
(30)

__________________ is defined as efforts to protect the confidentiality, integrity, and availability of information technology infrastructure.

(Multiple Choice)
4.9/5
(35)

DHS is responsible for protecting the web servers of all non-military federal agencies.

(True/False)
4.7/5
(25)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)