Deck 7: Cyberterrorism
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
Play
Full screen (f)
Deck 7: Cyberterrorism
1
Which of the following was NOT identified as one of the components of the motivation element?
A) economical
B) ideological
C) social
D) political
A) economical
B) ideological
C) social
D) political
A
2
According to the text, the United States ranks ______ in pro-IS tweets.
A) first
B) second
C) third
D) fourth
A) first
B) second
C) third
D) fourth
D
3
All of the following are components of the impact element except ______.
A) mass disruption
B) serious interference with critical service operations
C) economic gain
D) causes fear, death, or bodily injury
A) mass disruption
B) serious interference with critical service operations
C) economic gain
D) causes fear, death, or bodily injury
C
4
Which of the following cyberterror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?
A) information and communication
B) education
C) emergency systems
D) banking and finance
A) information and communication
B) education
C) emergency systems
D) banking and finance
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target except ______.
A) critical national information infrastructure
B) critical infrastructure
C) civilian population
D) civilian homes
A) critical national information infrastructure
B) critical infrastructure
C) civilian population
D) civilian homes
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
The Islamic State is also referred to as all of the following except ______.
A) Islamic State of Iraq and Syria
B) Islamic State in Iraq and the Levant
C) Islamic Electronic Army
D) Daesh
A) Islamic State of Iraq and Syria
B) Islamic State in Iraq and the Levant
C) Islamic Electronic Army
D) Daesh
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
According to the text, the domain is ______.
A) cyberspace
B) critical infrastructure
C) critical national information infrastructure
D) civilian population
A) cyberspace
B) critical infrastructure
C) critical national information infrastructure
D) civilian population
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
According to the conceptual framework of cyberterrorism, the method of action is ______.
A) unlawful means
B) mass disruption
C) serious interference
D) network warfare
A) unlawful means
B) mass disruption
C) serious interference
D) network warfare
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following was NOT identified as sectors of critical infrastructure?
A) chemical sector
B) government sector
C) education sector
D) food and agriculture sector
A) chemical sector
B) government sector
C) education sector
D) food and agriculture sector
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
The most famous use of the Internet by Boko Haram was in utilizing which of the following to show coverage of the kidnapping of the Chibok?
A) Facebook
B) Twitter
C) YouTube
D) Instagram
A) Facebook
B) Twitter
C) YouTube
D) Instagram
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
The terrorist organization Boko Haram, also known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, is from ______.
A) Ethiopia
B) Kenya
C) Nigeria
D) Nairobi
A) Ethiopia
B) Kenya
C) Nigeria
D) Nairobi
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following groups was not highlighted in this chapter?
A) the Islamic State
B) Boko Haram
C) al-Qaeda
D) People's Liberation Army
A) the Islamic State
B) Boko Haram
C) al-Qaeda
D) People's Liberation Army
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following cyber terror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?
A) transportation
B) sports arenas
C) water supply systems
D) gas and oil
A) transportation
B) sports arenas
C) water supply systems
D) gas and oil
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following was identified as a tool of attack in the conceptual framework of defining cyberterrorism?
A) economical operation
B) psychological operation
C) sociological operation
D) political operation
A) economical operation
B) psychological operation
C) sociological operation
D) political operation
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Boko Haram has become more active on social media since 2015 when it established a/an ______ account.
A) Facebook
B) Instagram
C) Twitter
D) Snapchat
A) Facebook
B) Instagram
C) Twitter
D) Snapchat
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
Cyberterror attacks may be conducted in a variety of ways, including ______.
A) destroying machinery
B) interfering with information technology
C) creating hardware to prevent intrusions
D) using computers to override control systems
A) destroying machinery
B) interfering with information technology
C) creating hardware to prevent intrusions
D) using computers to override control systems
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements except ______.
A) target
B) results
C) motivation
D) impact
A) target
B) results
C) motivation
D) impact
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
An intentional act, committed via computer or communication system and motivated by political, religious, or ideological objectives, against information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as ______.
A) cyberespionage
B) cyberterrorism
C) cyberwarfare
D) cybersabotage
A) cyberespionage
B) cyberterrorism
C) cyberwarfare
D) cybersabotage
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
The electrical grid is a significant target because it is not just a U.S. infrastructure. It is also known as the ______.
A) U.S.-Mexico grid
B) South American grid
C) North American grid
D) U.S.-Canada grid
A) U.S.-Mexico grid
B) South American grid
C) North American grid
D) U.S.-Canada grid
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
According to the text, which of the following entities also contributes to the misunderstanding of what constitutes cyberterrorism?
A) the government
B) the media
C) the people
D) all of these
A) the government
B) the media
C) the people
D) all of these
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to ______.
A) mitigate
B) prepare
C) respond
D) recover
A) mitigate
B) prepare
C) respond
D) recover
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
Helping people and the community return to normal, if possible, is a part of ______.
A) mitigation
B) preparedness
C) response
D) recovery
A) mitigation
B) preparedness
C) response
D) recovery
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Why is it difficult to define cyberterrorism?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
Barry Collin, while working as a research analyst at Palo Alto's Institute for Security and Intelligence in the 1980s, first coined the term cyberterrorism.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
The term terrorism refers to a tactic.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
Differentiate cybercrime from cyberterrorism.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
There is a universal definition of terrorism in the United States and in the international community.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
Efforts to identify threats, determine vulnerabilities, and identify required resources is known as ______.
A) mitigation
B) preparedness
C) response
D) recovery
A) mitigation
B) preparedness
C) response
D) recovery
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
Cyberspace is a place in which computers function and data moves.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
In order to examine the threat aspect of risk assessment, it should be understood that risk can come from two sources: natural disasters and man-made disasters.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
There is no concern that cyberterrorists will use the electrical grid system to attack critical infrastructure, as they do not have the means to do so.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
Stephen E. Flynn, a professor of Homeland Security at Northeastern University in Boston, Massachusetts, identified the electrical grid as one of the top homeland security concerns. What makes the electric grid a top concern?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
What is the difference between critical infrastructures and key assets? Provide one example.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
One main element of that terrorism tactic is to create fear in a population.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following was identified as a sector of critical infrastructures?
A) national monuments sector
B) education sector
C) financial services sector
D) corporate sector
A) national monuments sector
B) education sector
C) financial services sector
D) corporate sector
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
Al-Qaeda has been known to recruit individuals with information technology or computer backgrounds.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
Using social media to recruit supporters has resulted in zero terror attacks in the United States and in the international community.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
According to some researchers, as technology rapidly advances, cyberterrorism may soon manifest as a deadly threat-a threat that left unexamined could leave law enforcement unprepared to detect, prevent, and respond. Given the technological advances, what, in your opinion, can be done to improve the efforts of detecting, preventing, and responding to cyberterrorism?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck