Deck 14: Choosing Defense Strategies
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 14: Choosing Defense Strategies
1
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:
A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
D
2
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:
A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
B
3
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?
A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
C
4
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
In which attack did the hacker sign off with the statement "You have yet to see true electronic terrorism.This is a promise."?
A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:
A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Which is NOT an encryption program discussed by the author?
A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?
A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
Which is LEAST likely to provide access to sensitive data to unauthorized people?
A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Attempting to acquire information to which one does not have legitimate access is called ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
Which is a multi-platform packet sniffer?
A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
Use of computers and their Internet connectivity to launch terrorist attacks is called:
A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
Where did the first known attack by terrorists against a country's computer systems occur?
A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
Which permits a user to read sensitive data without ever having physical access to the target system?
A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Which is likely to be a more threatening type of computer attack?
A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?
A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
What does the author say is the only reason that there have not been more damaging and more frequent terrorist attacks against computer systems?
A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
A form of information warfare where incorrect statements are intentionally provided as facts is known as ____________.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
____________ is any attempt to manipulate information in pursuit of a military or political goal.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck