Deck 5: Threats to Cybersecurity by Hacktivists and Nation States

Full screen (f)
exit full mode
Question
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.

A) decrypt your phone calls and text messages
B) encrypt your hard drive
C) use a password manager
D) use two-factor identification
Use Space or
up arrow
down arrow
to flip the card.
Question
Cyber terrorism attacks often take the form of ______.

A) denial-of-service attacks
B) worms
C) phishing
D) spamming
Question
According to the text, cyberthreats originate mainly from all of the following entities except ______.

A) hackers
B) military units
C) local governments
D) terrorists
Question
Hackers who are motivated by personal gain or a certain cause are often referred to as ______.

A) red hats
B) black hats
C) white hats
D) green hats
Question
Which of the following is NOT considered a main type of insider threat?

A) malicious
B) exploited
C) careless
D) feared
Question
All of the following were identified as vulnerable infrastructures except ______.

A) telecommunications
B) energy
C) education
D) transportation
Question
Groups with displeasure of government are often motivated by all of the following except ______.

A) freedom
B) individuality
C) aristocracy
D) privacy
Question
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

A) cyberthreat
B) cyberwarfare
C) cybersecurity
D) cyberattack
Question
Threats to cybersecurity originate from all of the following sources except ______.

A) individual
B) local
C) national
D) international
Question
One of the most persistent threats for the United States in terms of cyberattacks originates in ______.

A) North Korea
B) Israel
C) Russia
D) China
Question
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

A) foreign governments
B) spies
C) insiders
D) hacktivists
Question
The most serious insider cybercrimes include all of the following except ______.

A) extortion
B) terrorism
C) embezzlement
D) harassment
Question
The "bad guy" hackers are known as ______.

A) red hats
B) white hats
C) black hats
D) green hats
Question
The least common but most costly is ______ insider threat.

A) malicious
B) careless
C) exploited
D) feared
Question
Which of the following characteristics of hackers is not true?

A) The members meet each other quite often.
B) It is male-dominated.
C) They work anonymously.
D) They have several public identities.
Question
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

A) feared
B) exploited
C) malicious
D) careless
Question
Threats that originate from inside the company or organization are referred to as ______.

A) individual threats
B) local threats
C) national threats
D) foreign threats
Question
Which of the following was NOT identified as one of the main forms of international threats?

A) nation-states hacking or spying on trade and other secret information
B) advanced hackers aiming at large corporations
C) hacking or spying on city and local governments
D) terrorists looking to identify and exploit vulnerabilities in our infrastructures
Question
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.

A) insider
B) outsider
C) national government
D) foreign government
Question
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

A) cyberwarfare
B) cyberbullying
C) cyberterrorism
D) cyberespionage
Question
______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data.

A) Gray hats
B) Black hats
C) White hats
D) Green hats
Question
The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."
Question
Advanced hackers are typically motivated by financial or political goals.
Question
International threats are those that originate from inside the company or organization.
Question
Insiders are people who are current or former employees of a company, contractors, or friends of employees.
Question
All of the following are examples of social engineering except ______.

A) vishing
B) phishing
C) spam
D) impersonation
Question
Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.
Question
Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?
Question
Identify and explain international threats and the three main forms associated with those threats. Are there any recent examples of international threats that fall within the three forms?
Question
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.
Question
Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
Question
Which of the following laws does not apply to hackers?

A) Hackers are evil people.
B) Security is not about security.
C) The greatest damages are caused by simple failures.
D) Most hackers use weak points to get access.
Question
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
Question
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.

A) black hats
B) gray hats
C) white hats
D) green hats
Question
Explain displeasure with the government and why groups such as Anonymous launch cyberattacks. Why do they launch cyberattacks? Do you agree with the work of such hacktivist groups? Why or why not?
Question
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

A) bad hackers
B) careless hackers
C) ethical hackers
D) friendly hackers
Question
Explain hackernomics and identify five laws that apply to hackers.
Question
Malicious insiders may delete or expose sensitive information by incident-either by pressing a wrong key or by other errors.
Question
Identify and discuss the three main types of insider threats.
Question
Some of the most common insider cybersecurity crimes are cyberbullying and cyberharassment.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Threats to Cybersecurity by Hacktivists and Nation States
1
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.

A) decrypt your phone calls and text messages
B) encrypt your hard drive
C) use a password manager
D) use two-factor identification
A
2
Cyber terrorism attacks often take the form of ______.

A) denial-of-service attacks
B) worms
C) phishing
D) spamming
A
3
According to the text, cyberthreats originate mainly from all of the following entities except ______.

A) hackers
B) military units
C) local governments
D) terrorists
C
4
Hackers who are motivated by personal gain or a certain cause are often referred to as ______.

A) red hats
B) black hats
C) white hats
D) green hats
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT considered a main type of insider threat?

A) malicious
B) exploited
C) careless
D) feared
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following were identified as vulnerable infrastructures except ______.

A) telecommunications
B) energy
C) education
D) transportation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Groups with displeasure of government are often motivated by all of the following except ______.

A) freedom
B) individuality
C) aristocracy
D) privacy
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

A) cyberthreat
B) cyberwarfare
C) cybersecurity
D) cyberattack
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Threats to cybersecurity originate from all of the following sources except ______.

A) individual
B) local
C) national
D) international
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
One of the most persistent threats for the United States in terms of cyberattacks originates in ______.

A) North Korea
B) Israel
C) Russia
D) China
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

A) foreign governments
B) spies
C) insiders
D) hacktivists
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
The most serious insider cybercrimes include all of the following except ______.

A) extortion
B) terrorism
C) embezzlement
D) harassment
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
The "bad guy" hackers are known as ______.

A) red hats
B) white hats
C) black hats
D) green hats
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
The least common but most costly is ______ insider threat.

A) malicious
B) careless
C) exploited
D) feared
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following characteristics of hackers is not true?

A) The members meet each other quite often.
B) It is male-dominated.
C) They work anonymously.
D) They have several public identities.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

A) feared
B) exploited
C) malicious
D) careless
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Threats that originate from inside the company or organization are referred to as ______.

A) individual threats
B) local threats
C) national threats
D) foreign threats
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following was NOT identified as one of the main forms of international threats?

A) nation-states hacking or spying on trade and other secret information
B) advanced hackers aiming at large corporations
C) hacking or spying on city and local governments
D) terrorists looking to identify and exploit vulnerabilities in our infrastructures
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.

A) insider
B) outsider
C) national government
D) foreign government
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

A) cyberwarfare
B) cyberbullying
C) cyberterrorism
D) cyberespionage
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data.

A) Gray hats
B) Black hats
C) White hats
D) Green hats
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Advanced hackers are typically motivated by financial or political goals.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
International threats are those that originate from inside the company or organization.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Insiders are people who are current or former employees of a company, contractors, or friends of employees.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
All of the following are examples of social engineering except ______.

A) vishing
B) phishing
C) spam
D) impersonation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Identify and explain international threats and the three main forms associated with those threats. Are there any recent examples of international threats that fall within the three forms?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following laws does not apply to hackers?

A) Hackers are evil people.
B) Security is not about security.
C) The greatest damages are caused by simple failures.
D) Most hackers use weak points to get access.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.

A) black hats
B) gray hats
C) white hats
D) green hats
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Explain displeasure with the government and why groups such as Anonymous launch cyberattacks. Why do they launch cyberattacks? Do you agree with the work of such hacktivist groups? Why or why not?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

A) bad hackers
B) careless hackers
C) ethical hackers
D) friendly hackers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Explain hackernomics and identify five laws that apply to hackers.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Malicious insiders may delete or expose sensitive information by incident-either by pressing a wrong key or by other errors.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Identify and discuss the three main types of insider threats.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Some of the most common insider cybersecurity crimes are cyberbullying and cyberharassment.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.