Exam 7: Online Extremism, Cyberterror, and Cyberwarfare
Exam 1: Law Enforcement, Privacy, and Security in Dealing With Cybercrime; Technology and Cybercrime9 Questions
Exam 2: Computer Hackers and Hacking8 Questions
Exam 3: Malware and Automated Computer Attacks10 Questions
Exam 4: Digital Piracy and Intellectual Property Theft6 Questions
Exam 5: Economic Crimes and Online Fraud9 Questions
Exam 6: Child Pornography and Sexual Exploitation; Pornography, Prostitution, and Sex Crimes11 Questions
Exam 7: Online Extremism, Cyberterror, and Cyberwarfare9 Questions
Exam 8: Cybercrime and Criminological Theories7 Questions
Exam 9: Evolution of Digital Forensics6 Questions
Exam 10: Acquisition and Examination of Forensic Evidence8 Questions
Exam 11: Legal Challenges in Digital Forensic Investigations7 Questions
Exam 12: The Future of Cybercrime, Terror, and Policy7 Questions
Select questions type
Which of the following is not a way that extremist groups use the Internet?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
A
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
C
Which of the following forms of attack are commonly used by groups to disable websites and online services?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
A
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?
(Multiple Choice)
5.0/5
(42)
Which of the following types of media have not been used by extremist groups to promote their agenda?
(Multiple Choice)
4.9/5
(34)
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?
(Multiple Choice)
4.7/5
(37)
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?
(Multiple Choice)
4.9/5
(26)
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?
(Multiple Choice)
4.7/5
(43)
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?
(Multiple Choice)
4.9/5
(44)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)