Exam 4: Political Hacking
Exam 1: Cybercrime and the Internet an Introduction13 Questions
Exam 2: Researching and Theorizing Cybercrime18 Questions
Exam 3: Hackers, Crackers, and Viral Coders18 Questions
Exam 4: Political Hacking20 Questions
Exam 5: Virtual Pirates21 Questions
Exam 6: Cyber-Frauds, Scams and Cons19 Questions
Exam 7: Illegal, Harmful and Offensive Content Online: From Hate Speech to the Dangers of Pornography18 Questions
Exam 8: Child Pornography and Child Sex Abuse Imagery22 Questions
Exam 9: The Victimization of Individuals Online: Cyberstalking and Paedophilia19 Questions
Exam 10: Policing the Internet17 Questions
Exam 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control18 Questions
Exam 12: Looking Toward the Future of Cybercrime6 Questions
Select questions type
_______________ is something that can 'increase the striking potential of a unit without increasing its personnel.'?
Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
B
This form of hacktivism involves exposing collections of private information on an individual, often with the goal of shaming, silencing, or coercing the person.?
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
B
This act considerably strengthened penalties under the Computer Fraud and Abuse Act of 1986, including the provision for the life imprisonment of convicted 'cyberterrorists'.?
Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
C
All of these components are involved in the definition of cyberterrorism except that _________________.?
(Multiple Choice)
4.7/5
(42)
_______________ is an "infrastructure or asset the incapacitation or destruction of which would have a debilitating impact on the national security or economic or social welfare of a nation."?
(Multiple Choice)
4.9/5
(32)
Which individual leaked the video now titled "Collateral Murder" that showed a US Apache helicopter gunning down Iraqi civilians and two Reuters journalists?
(Multiple Choice)
4.8/5
(36)
Some argue that the media and political figures attempt to generate public concern about cybercrime in order to secure sectional interests. Becker (1963) would label this behaviour as _______________.?
(Multiple Choice)
4.8/5
(41)
This process allows communications to be encoded prior to transmission so that they will be unreadable if intercepted.?
(Multiple Choice)
4.9/5
(42)
This form of hacktivism is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists.?
(Multiple Choice)
4.7/5
(41)
In 2010, Anonymous launched a DDoS campaign against various credit card and payment processing companies like Visa, PayPal, and Mastercard. This campaign was launched in retaliation for these companies cutting off donations to which organization?
(Multiple Choice)
4.8/5
(29)
Terrorist groups make use of the internet in support of their conventional, terrestrially based activities. Which of the following is one of the ways the textbook describes the internet being used to facilitate terrorist activities?
(Multiple Choice)
5.0/5
(41)
According to Rid, the term "cyberwarfare" should may actually reduce the violence involved in other forms of warfare because it involves significant changes and advances in _______________.?
(Multiple Choice)
4.9/5
(31)
_______________ works by hiding data within the digital code used to construct images.?
(Multiple Choice)
4.7/5
(37)
In the wake of 9/11, the Bush administration created this federal agency to bolster the protection of critical information infrastructure.?
(Multiple Choice)
4.9/5
(26)
This form of hacktivism attempts to ruin and alter online sites as a form of protest.?
(Multiple Choice)
4.9/5
(32)
_______________ was a hacker from Kosovo who compromised a retail company's system and obtained the names, passwords, email address, and other data of hundreds of thousands of people. He then combed through that data and leaked the information associated with over a thousand military and government employees to the Islamic State.?
(Multiple Choice)
4.8/5
(32)
Which one of the following is not classified as part of a nation's critical information infrastructure?
(Multiple Choice)
4.8/5
(30)
_______________ was a "digital weapon" deployed to sabotage Iranian nuclear enrichment efforts.?
(Multiple Choice)
4.9/5
(26)
A term commonly used to describe hacking for the purposes of political activism and protest is _______________.?
(Multiple Choice)
4.8/5
(40)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)