Deck 4: Political Hacking
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 4: Political Hacking
1
A term commonly used to describe hacking for the purposes of political activism and protest is _______________.?
A) cyberterrorism
B) cultural hacking
C) hacktivism
D) cyberwarfare
A) cyberterrorism
B) cultural hacking
C) hacktivism
D) cyberwarfare
C
2
This form of hacktivism is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists.?
A) Doxxing and leaking
B) Website defacements
C) Email bombs
D) Virtual sit-ins and blockades
A) Doxxing and leaking
B) Website defacements
C) Email bombs
D) Virtual sit-ins and blockades
D
3
This form of hacktivism attempts to ruin and alter online sites as a form of protest.?
A) Website defacement
B) Development of privacy and resistance tools
C) Doxxing and leaking
D) Virtual sit-ins and blockades
A) Website defacement
B) Development of privacy and resistance tools
C) Doxxing and leaking
D) Virtual sit-ins and blockades
A
4
This form of hacktivism involves exposing collections of private information on an individual, often with the goal of shaming, silencing, or coercing the person.?
A) Email bombs
B) Doxxing and leaking
C) Virtual sit-ins and blockades
D) Development of privacy and resistance tools
A) Email bombs
B) Doxxing and leaking
C) Virtual sit-ins and blockades
D) Development of privacy and resistance tools
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
All of these components are involved in the definition of cyberterrorism except that _________________.?
A) the act costs the government at least $10,000 in damages
B) the act is against governmental entities
C) the act is a part of a person or group's political agenda
D) the act involves unlawful attacks or threats against ICTs
A) the act costs the government at least $10,000 in damages
B) the act is against governmental entities
C) the act is a part of a person or group's political agenda
D) the act involves unlawful attacks or threats against ICTs
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
This act considerably strengthened penalties under the Computer Fraud and Abuse Act of 1986, including the provision for the life imprisonment of convicted 'cyberterrorists'.?
A) The Terrorism Act of 2000
B) The Cybercrime Prevention Act of 2012
C) The US PATRIOT Act of 2001
D) The Cyber Security Enhancement Act of 2002
A) The Terrorism Act of 2000
B) The Cybercrime Prevention Act of 2012
C) The US PATRIOT Act of 2001
D) The Cyber Security Enhancement Act of 2002
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Which one of the following is not classified as part of a nation's critical information infrastructure?
A) Telecommunications
B) The Internet
C) Hardware and software
D) Water systems
A) Telecommunications
B) The Internet
C) Hardware and software
D) Water systems
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
In the wake of 9/11, the Bush administration created this federal agency to bolster the protection of critical information infrastructure.?
A) The Department of Defence
B) The Department of Homeland Security
C) The Department of the Interior
D) The Department of Energy
A) The Department of Defence
B) The Department of Homeland Security
C) The Department of the Interior
D) The Department of Energy
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Some argue that the media and political figures attempt to generate public concern about cybercrime in order to secure sectional interests. Becker (1963) would label this behaviour as _______________.?
A) moral entrepreneurship
B) dramatization
C) secondary deviance
D) moral panic
A) moral entrepreneurship
B) dramatization
C) secondary deviance
D) moral panic
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
This process allows communications to be encoded prior to transmission so that they will be unreadable if intercepted.?
A) Formatting
B) Bootstrapping
C) Encryption
D) Compression
A) Formatting
B) Bootstrapping
C) Encryption
D) Compression
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
_______________ is an "infrastructure or asset the incapacitation or destruction of which would have a debilitating impact on the national security or economic or social welfare of a nation."?
A) Critical infrastructure
B) Sensitive infrastructure
C) Vital Infrastructure
D) Necessary infrastructure
A) Critical infrastructure
B) Sensitive infrastructure
C) Vital Infrastructure
D) Necessary infrastructure
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which hacker most likely coined the term "hacktivism"?
A) Kevin Mitnick
B) Omega
C) TheJester
D) Crash Override
A) Kevin Mitnick
B) Omega
C) TheJester
D) Crash Override
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
In 2010, Anonymous launched a DDoS campaign against various credit card and payment processing companies like Visa, PayPal, and Mastercard. This campaign was launched in retaliation for these companies cutting off donations to which organization?
A) WikiLeaks
B) Cult of the Dead Cow
C) Anonymous
D) Zapatistas
A) WikiLeaks
B) Cult of the Dead Cow
C) Anonymous
D) Zapatistas
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which individual leaked the video now titled "Collateral Murder" that showed a US Apache helicopter gunning down Iraqi civilians and two Reuters journalists?
A) Warren Ellis
B) Frank Derringer
C) Warren Zevon
D) Chelsea Manning
A) Warren Ellis
B) Frank Derringer
C) Warren Zevon
D) Chelsea Manning
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
_______________ is something that can 'increase the striking potential of a unit without increasing its personnel.'?
A) force amplifier
B) force multiplier
C) tactical manuever
D) kinetic amplifier
A) force amplifier
B) force multiplier
C) tactical manuever
D) kinetic amplifier
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
_______________ was a hacker from Kosovo who compromised a retail company's system and obtained the names, passwords, email address, and other data of hundreds of thousands of people. He then combed through that data and leaked the information associated with over a thousand military and government employees to the Islamic State.?
A) Ardit Ferizi
B) John Stockton
C) Abu Sayyaf
D) Robert Mueller
A) Ardit Ferizi
B) John Stockton
C) Abu Sayyaf
D) Robert Mueller
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
_______________ works by hiding data within the digital code used to construct images.?
A) Photo-masking
B) Imprintography
C) Stelliography
D) Steganography
A) Photo-masking
B) Imprintography
C) Stelliography
D) Steganography
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Terrorist groups make use of the internet in support of their conventional, terrestrially based activities. Which of the following is one of the ways the textbook describes the internet being used to facilitate terrorist activities?
A) Communication and coordination
B) Propaganda, publicity and recruitment
C) Information gathering
D) All of the above
E) None of the above
A) Communication and coordination
B) Propaganda, publicity and recruitment
C) Information gathering
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
_______________ was a "digital weapon" deployed to sabotage Iranian nuclear enrichment efforts.?
A) Mirai
B) Stuxnet
C) Lovebug
D) AcidBurn
A) Mirai
B) Stuxnet
C) Lovebug
D) AcidBurn
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
According to Rid, the term "cyberwarfare" should may actually reduce the violence involved in other forms of warfare because it involves significant changes and advances in _______________.?
A) sabotage
B) espionage
C) subversion
D) All of the above
E) None of the above
A) sabotage
B) espionage
C) subversion
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck