Deck 14: Choosing Defense Strategies

Full screen (f)
exit full mode
Question
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:

A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
Use Space or
up arrow
down arrow
to flip the card.
Question
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:

A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
Question
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?

A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
Question
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
Question
In which attack did the hacker sign off with the statement "You have yet to see true electronic terrorism.This is a promise."?

A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
Question
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:

A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
Question
Which is NOT an encryption program discussed by the author?

A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
Question
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?

A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
Question
Which is LEAST likely to provide access to sensitive data to unauthorized people?

A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
Question
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
Question
Attempting to acquire information to which one does not have legitimate access is called ____________.
Question
Which is a multi-platform packet sniffer?

A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
Question
Use of computers and their Internet connectivity to launch terrorist attacks is called:

A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
Question
Where did the first known attack by terrorists against a country's computer systems occur?

A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
Question
Which permits a user to read sensitive data without ever having physical access to the target system?

A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
Question
Which is likely to be a more threatening type of computer attack?

A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
Question
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?

A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
Question
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
Question
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
Question
What does the author say is the only reason that there have not been more damaging and more frequent terrorist attacks against computer systems?

A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
Question
Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.
Question
Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.
Question
A form of information warfare where incorrect statements are intentionally provided as facts is known as ____________.
Question
____________ is any attempt to manipulate information in pursuit of a military or political goal.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Choosing Defense Strategies
1
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:

A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
D
2
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:

A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
B
3
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?

A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
C
4
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
In which attack did the hacker sign off with the statement "You have yet to see true electronic terrorism.This is a promise."?

A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:

A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Which is NOT an encryption program discussed by the author?

A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?

A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
Which is LEAST likely to provide access to sensitive data to unauthorized people?

A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Attempting to acquire information to which one does not have legitimate access is called ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
Which is a multi-platform packet sniffer?

A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
Use of computers and their Internet connectivity to launch terrorist attacks is called:

A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
Where did the first known attack by terrorists against a country's computer systems occur?

A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
Which permits a user to read sensitive data without ever having physical access to the target system?

A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Which is likely to be a more threatening type of computer attack?

A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?

A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
What does the author say is the only reason that there have not been more damaging and more frequent terrorist attacks against computer systems?

A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
A form of information warfare where incorrect statements are intentionally provided as facts is known as ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
____________ is any attempt to manipulate information in pursuit of a military or political goal.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.