Exam 7: Online Extremism, Cyberterror, and Cyberwarfare

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is not a way that extremist groups use the Internet?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

A

What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

C

Which of the following forms of attack are commonly used by groups to disable websites and online services?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

A

What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?

(Multiple Choice)
5.0/5
(42)

Which of the following types of media have not been used by extremist groups to promote their agenda?

(Multiple Choice)
4.9/5
(34)

The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?

(Multiple Choice)
4.7/5
(37)

What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?

(Multiple Choice)
4.9/5
(26)

What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?

(Multiple Choice)
4.7/5
(43)

What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?

(Multiple Choice)
4.9/5
(44)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)