Deck 6: National Security: Cyberwarfare and Cyberespionage

Full screen (f)
exit full mode
Question
Historically, power has depended on which of the following strengths?

A) economic
B) educational
C) military
D) leadership
Use Space or
up arrow
down arrow
to flip the card.
Question
According to the text, the most pervasive cyberthreat may be ______.

A) fraud and identity theft
B) theft of intellectual property
C) child pornography
D) financial theft
Question
Which of the following countries was not identified as being one of the strong actors in world politics?

A) China
B) Russia
C) United States
D) Mexico
Question
According to the text, cyberwarfare generally includes which of the following?

A) cyberespionage and cybersabotage
B) cyberterrorism and cyberespionage
C) cyberharassment and cyberterrorism
D) cybersabotage and cyberharassment
Question
Which of the following countries is considered one of the most advanced cyberespionage powers?

A) South Korea
B) China
C) Russia
D) North Korea
Question
The first "software" was the Morse code developed by Samuel F. B. Morse. The Morse code made telegraphing much easier by using ______.

A) ciphers
B) different flags
C) dots and dashes
D) special birds
Question
The Syrian Electronic Army has been responsible for attacks against which of the following?

A) major U.S. newspapers
B) social media sites
C) telecommunications providers
D) all of these
Question
In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of ______ Amendment rights in the United States.

A) First
B) Third
C) Fourth
D) Fifth
Question
Which of the following countries is known to be the most advanced with regard to computers, hardware, and software?

A) China
B) Russia
C) United States
D) South Korea
Question
Which of the following systems led to the creation of the Morse code?

A) naval flag system
B) telegraph system
C) box cipher system
D) raven system
Question
Which of the following was NOT identified as one of the main issues associated with cyberespionage?

A) Malicious software can be developed and used by actors with limited and large resources and without developing specific tools.
B) Hackers across the Internet share tools and techniques, making it very difficult to distinguish between hackers.
C) Nation-states and crime organizations never use independent hackers to avoid being associated with a cyberattack.
D) Actors route Internet traffic through different countries, making it appear to come from another country.
Question
China is known to prioritize ______ control over cyberdefense strategies.

A) education information
B) demographic information
C) economic information
D) political information
Question
According to the text, China also engages in economic ______ against the United States and other countries.

A) espionage
B) sabotage
C) terrorism
D) treason
Question
Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?

A) Zapchast
B) DarkComet
C) Moonlight Maze
D) Blackshades
Question
The Syrian Electronic Army has collected information using which of the following cyberattack techniques?

A) Trojan horses
B) botnets
C) worms
D) spam
Question
ISIS and the operators have utilized technological advances such as social media to do all of the following except ______.

A) launch attacks
B) propagandize
C) denounce themselves
D) recruit
Question
According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as ______.

A) cyberterrorism
B) cyberespionage
C) cybersabotage
D) cyberwarfare
Question
The Strategic Support Force intelligence unit is a part of which of the following?

A) Syrian Electronic Army
B) People's Liberation Army
C) National Security Agency
D) General Reconnaissance Bureau
Question
In 2015, a cyberattack was launched against Ukraine by the Russians. The ______ attack to shut down the power grid based in Russia was possibly backed by the Russian government.

A) KillDisk
B) DarkComet
C) Rbot
D) Blackshades
Question
Cyberespionage can be classified into which of the following types?

A) economic
B) political
C) military
D) both economic and political
Question
Cyberspace has increased the power differential between nation-states and between nation-states and non-state actors.
Question
The Syrian Electronic Army was established in 2011 as a result of the protests against the Assad regime.
Question
Encryption and going dark is a relatively new invention.
Question
The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision-maker, is referred to as ______.

A) cyberdomain
B) cyberintelligence
C) cyberactivity
D) cybersecurity
Question
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______

A) corporate espionage
B) political espionage
C) economic espionage
D) military espionage
Question
Economic cyberespionage is typically carried out by all of the following except ______.

A) state-affiliated actors
B) individual actors
C) nation-states
D) organized crime groups
Question
According to the text, cyberattacks focus mainly on the destruction of sensitive information.
Question
Identify and example the three main issues associated with cyberespionage.
Question
The Economic Espionage Act of 1996 makes it a ______ to steal or interfere with trade secrets.

A) misdemeanor crime
B) infraction
C) federal crime
D) a crime not punishable by law
Question
One of the most important inventions was that of a telegraphing code, which was first introduced by the French Claude Chappe in 1792.
Question
Given the contentious nature of social media accounts and terrorists efforts to utilize them for propaganda, recruitment, and launching attacks, do you believe that social media websites should shut down accounts associated with terrorists? Why or why not? What are the difficulties in doing so?
Question
One of the oldest reasons for threats of harm by nation-states is power.
Question
Compare and contrast espionage and sabotage.
Question
Nation-states are independent in the global economy and they work alone to accomplish economic growth.
Question
Define and explain denial-of-service attacks and the four types associated with these attacks.
Question
Political espionage is typically used to gain access to sensitive information and/or to fatally damage a network.
Question
Cyberattacks have become a potent political instrument, with the common goal of protection of national sovereignty and power.
Question
Actors route Internet traffic through different countries, making it appear to come from another country.
Question
Using the information learned in the text, can you think of any recent examples that have hindered cybersecurity? What implications did these have on the security of the United States?
Question
GhostNet was one of the most successful programs with regard to ______ cyberespionage.

A) corporate
B) individual
C) political
D) economic
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: National Security: Cyberwarfare and Cyberespionage
1
Historically, power has depended on which of the following strengths?

A) economic
B) educational
C) military
D) leadership
C
2
According to the text, the most pervasive cyberthreat may be ______.

A) fraud and identity theft
B) theft of intellectual property
C) child pornography
D) financial theft
B
3
Which of the following countries was not identified as being one of the strong actors in world politics?

A) China
B) Russia
C) United States
D) Mexico
D
4
According to the text, cyberwarfare generally includes which of the following?

A) cyberespionage and cybersabotage
B) cyberterrorism and cyberespionage
C) cyberharassment and cyberterrorism
D) cybersabotage and cyberharassment
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following countries is considered one of the most advanced cyberespionage powers?

A) South Korea
B) China
C) Russia
D) North Korea
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
The first "software" was the Morse code developed by Samuel F. B. Morse. The Morse code made telegraphing much easier by using ______.

A) ciphers
B) different flags
C) dots and dashes
D) special birds
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
The Syrian Electronic Army has been responsible for attacks against which of the following?

A) major U.S. newspapers
B) social media sites
C) telecommunications providers
D) all of these
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of ______ Amendment rights in the United States.

A) First
B) Third
C) Fourth
D) Fifth
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following countries is known to be the most advanced with regard to computers, hardware, and software?

A) China
B) Russia
C) United States
D) South Korea
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following systems led to the creation of the Morse code?

A) naval flag system
B) telegraph system
C) box cipher system
D) raven system
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following was NOT identified as one of the main issues associated with cyberespionage?

A) Malicious software can be developed and used by actors with limited and large resources and without developing specific tools.
B) Hackers across the Internet share tools and techniques, making it very difficult to distinguish between hackers.
C) Nation-states and crime organizations never use independent hackers to avoid being associated with a cyberattack.
D) Actors route Internet traffic through different countries, making it appear to come from another country.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
China is known to prioritize ______ control over cyberdefense strategies.

A) education information
B) demographic information
C) economic information
D) political information
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
According to the text, China also engages in economic ______ against the United States and other countries.

A) espionage
B) sabotage
C) terrorism
D) treason
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?

A) Zapchast
B) DarkComet
C) Moonlight Maze
D) Blackshades
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
The Syrian Electronic Army has collected information using which of the following cyberattack techniques?

A) Trojan horses
B) botnets
C) worms
D) spam
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
ISIS and the operators have utilized technological advances such as social media to do all of the following except ______.

A) launch attacks
B) propagandize
C) denounce themselves
D) recruit
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as ______.

A) cyberterrorism
B) cyberespionage
C) cybersabotage
D) cyberwarfare
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
The Strategic Support Force intelligence unit is a part of which of the following?

A) Syrian Electronic Army
B) People's Liberation Army
C) National Security Agency
D) General Reconnaissance Bureau
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
In 2015, a cyberattack was launched against Ukraine by the Russians. The ______ attack to shut down the power grid based in Russia was possibly backed by the Russian government.

A) KillDisk
B) DarkComet
C) Rbot
D) Blackshades
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Cyberespionage can be classified into which of the following types?

A) economic
B) political
C) military
D) both economic and political
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Cyberspace has increased the power differential between nation-states and between nation-states and non-state actors.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
The Syrian Electronic Army was established in 2011 as a result of the protests against the Assad regime.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Encryption and going dark is a relatively new invention.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision-maker, is referred to as ______.

A) cyberdomain
B) cyberintelligence
C) cyberactivity
D) cybersecurity
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______

A) corporate espionage
B) political espionage
C) economic espionage
D) military espionage
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Economic cyberespionage is typically carried out by all of the following except ______.

A) state-affiliated actors
B) individual actors
C) nation-states
D) organized crime groups
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
According to the text, cyberattacks focus mainly on the destruction of sensitive information.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Identify and example the three main issues associated with cyberespionage.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
The Economic Espionage Act of 1996 makes it a ______ to steal or interfere with trade secrets.

A) misdemeanor crime
B) infraction
C) federal crime
D) a crime not punishable by law
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
One of the most important inventions was that of a telegraphing code, which was first introduced by the French Claude Chappe in 1792.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Given the contentious nature of social media accounts and terrorists efforts to utilize them for propaganda, recruitment, and launching attacks, do you believe that social media websites should shut down accounts associated with terrorists? Why or why not? What are the difficulties in doing so?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
One of the oldest reasons for threats of harm by nation-states is power.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Compare and contrast espionage and sabotage.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Nation-states are independent in the global economy and they work alone to accomplish economic growth.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Define and explain denial-of-service attacks and the four types associated with these attacks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Political espionage is typically used to gain access to sensitive information and/or to fatally damage a network.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Cyberattacks have become a potent political instrument, with the common goal of protection of national sovereignty and power.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Actors route Internet traffic through different countries, making it appear to come from another country.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Using the information learned in the text, can you think of any recent examples that have hindered cybersecurity? What implications did these have on the security of the United States?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
GhostNet was one of the most successful programs with regard to ______ cyberespionage.

A) corporate
B) individual
C) political
D) economic
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.