Deck 12: Cyber Terrorism and Information Warfare

Full screen (f)
exit full mode
Question
Radio Free Europe was supported by Western democracies during the Cold War.
Use Space or
up arrow
down arrow
to flip the card.
Question
One technique of disinformation is to pad a message with noise that the enemy will perceive as valuable information.
Question
The U.S.Patriot Act specifically deals with cyberterrorism.
Question
In 1996 a hacker allegedly associated with the white supremacist movement temporarily disabled a ___________ ISP.

A)Massachusetts
B)New York
C)Sri Lankan
D)None of the above
Question
Usenet and Yahoo! are examples of email services.
Question
The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems.

A)MyDoom
B)Stuxnet
C)Persian
D)None of the above
Question
Cyberterrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.
Question
Information warfare is any attempt to manipulate information in pursuit of a military or political goal.
Question
Chinese hackers whose stated goal is to infiltrate Western computer systems are called the ___________.

A)Eastern Alliance
B)China Eagle Union
C)Shanghai Express
D)None of the above
Question
___________ is the premeditated,politically motivated attack against information computer systems,computer programs,and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

A)Cyberterrorism
B)Ecoterrorism
C)Cyberespionage
D)None of the above
Question
A propaganda agent can manage multiple online personalities,posting to many different _____________.

A)Bulletin boards and email accounts
B)Bulletin boards and discussion groups
C)Discussion groups and email accounts
D)None of the above
Question
A(n)________attack on data can include stealing or destroying data.

A)Money center
B)Memory
C)Economic
D)Hardware
Question
The Stuxnet virus was directed against Iraqi nuclear facilities.
Question
The ________ War was the first modern war in which there was strong and widespread domestic opposition.

A)Korean
B)Persian Gulf
C)Iraqi
D)Vietnam
Question
In May 2007,government offices of _________ were subjected to a mass denial-of-service attack because some people opposed the government's removal of a Russian WWII memorial.

A)Estonia
B)Latvia
C)Lithuania
D)None of the above
Question
During the ___________ War,Western democracies invested time and money for radio broadcasts into communist nations.

A)Korean
B)Vietnam
C)Cold
D)None of the above
Question
Hactivists means individuals who work for a cause using cyberterrorism.
Question
The Beijing Eagle Union consists of Chinese hackers.
Question
The MyDoom virus was directed against the Pentagon.
Question
Any attempt to manipulate information in pursuit of a military or political goal is ________.

A)Cyberterrorism
B)Economic terrorism
C)Information warfare
D)None of the above
Question
The joint task force representing components of all four U.S armed services is the ____________.

A)U.S.Cyber Command
B)Patriot Command
C)Cyber Terror Association
D)None of the above
Question
Although the Cyberterrorism Preparedness Act of 2002 was not passed,many of its goals were addressed by the ___________.

A)CIA
B)Pentagon
C)Patriot Act
D)None of the above
Question
In 1998,ethnic Tami guerrillas swamped _________ embassies with 800 emails a day.

A)Chinese
B)Iraqi
C)Sri Lankan
D)None of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Cyber Terrorism and Information Warfare
1
Radio Free Europe was supported by Western democracies during the Cold War.
True
2
One technique of disinformation is to pad a message with noise that the enemy will perceive as valuable information.
True
3
The U.S.Patriot Act specifically deals with cyberterrorism.
True
4
In 1996 a hacker allegedly associated with the white supremacist movement temporarily disabled a ___________ ISP.

A)Massachusetts
B)New York
C)Sri Lankan
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
Usenet and Yahoo! are examples of email services.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems.

A)MyDoom
B)Stuxnet
C)Persian
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
Cyberterrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
Information warfare is any attempt to manipulate information in pursuit of a military or political goal.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
Chinese hackers whose stated goal is to infiltrate Western computer systems are called the ___________.

A)Eastern Alliance
B)China Eagle Union
C)Shanghai Express
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
___________ is the premeditated,politically motivated attack against information computer systems,computer programs,and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

A)Cyberterrorism
B)Ecoterrorism
C)Cyberespionage
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
A propaganda agent can manage multiple online personalities,posting to many different _____________.

A)Bulletin boards and email accounts
B)Bulletin boards and discussion groups
C)Discussion groups and email accounts
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
A(n)________attack on data can include stealing or destroying data.

A)Money center
B)Memory
C)Economic
D)Hardware
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
The Stuxnet virus was directed against Iraqi nuclear facilities.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
The ________ War was the first modern war in which there was strong and widespread domestic opposition.

A)Korean
B)Persian Gulf
C)Iraqi
D)Vietnam
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
In May 2007,government offices of _________ were subjected to a mass denial-of-service attack because some people opposed the government's removal of a Russian WWII memorial.

A)Estonia
B)Latvia
C)Lithuania
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
During the ___________ War,Western democracies invested time and money for radio broadcasts into communist nations.

A)Korean
B)Vietnam
C)Cold
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
Hactivists means individuals who work for a cause using cyberterrorism.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
The Beijing Eagle Union consists of Chinese hackers.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
The MyDoom virus was directed against the Pentagon.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
Any attempt to manipulate information in pursuit of a military or political goal is ________.

A)Cyberterrorism
B)Economic terrorism
C)Information warfare
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
The joint task force representing components of all four U.S armed services is the ____________.

A)U.S.Cyber Command
B)Patriot Command
C)Cyber Terror Association
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
Although the Cyberterrorism Preparedness Act of 2002 was not passed,many of its goals were addressed by the ___________.

A)CIA
B)Pentagon
C)Patriot Act
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
In 1998,ethnic Tami guerrillas swamped _________ embassies with 800 emails a day.

A)Chinese
B)Iraqi
C)Sri Lankan
D)None of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.