Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cybercrime and Society
Exam 4: Political Hacking
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
_______________ is something that can 'increase the striking potential of a unit without increasing its personnel.'?
Question 2
Multiple Choice
This form of hacktivism involves exposing collections of private information on an individual, often with the goal of shaming, silencing, or coercing the person.?
Question 3
Multiple Choice
This act considerably strengthened penalties under the Computer Fraud and Abuse Act of 1986, including the provision for the life imprisonment of convicted 'cyberterrorists'.?
Question 4
Multiple Choice
All of these components are involved in the definition of cyberterrorism except that _________________.?
Question 5
Multiple Choice
_______________ is an "infrastructure or asset the incapacitation or destruction of which would have a debilitating impact on the national security or economic or social welfare of a nation."?
Question 6
Multiple Choice
Which individual leaked the video now titled "Collateral Murder" that showed a US Apache helicopter gunning down Iraqi civilians and two Reuters journalists?
Question 7
Multiple Choice
Some argue that the media and political figures attempt to generate public concern about cybercrime in order to secure sectional interests. Becker (1963) would label this behaviour as _______________.?
Question 8
Multiple Choice
This process allows communications to be encoded prior to transmission so that they will be unreadable if intercepted.?
Question 9
Multiple Choice
This form of hacktivism is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists.?
Question 10
Multiple Choice
Which hacker most likely coined the term "hacktivism"?
Question 11
Multiple Choice
In 2010, Anonymous launched a DDoS campaign against various credit card and payment processing companies like Visa, PayPal, and Mastercard. This campaign was launched in retaliation for these companies cutting off donations to which organization?
Question 12
Multiple Choice
Terrorist groups make use of the internet in support of their conventional, terrestrially based activities. Which of the following is one of the ways the textbook describes the internet being used to facilitate terrorist activities?