cybersecurity 12

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Cyberterrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.

true

2
New cards

The Beijing Eagle Union consists of Chinese hackers.

false

3
New cards

The MyDoom virus was directed against the Pentagon.

false

4
New cards

The Stuxnet virus was directed against Iraqi nuclear facilities.

false

5
New cards

Information warfare is any attempt to manipulate information in pursuit of a military or political goal.

true

6
New cards

Radio Free Europe was supported by Western democracies during the Cold War.

true

7
New cards

Usenet and Yahoo! are examples of email services.

false

8
New cards

One technique of disinformation is to produce false or skewed news stories.

true

9
New cards

Hactivists means individuals who work for a cause using hacking techniques.

true

10
New cards

The U.S. Patriot Act specifically deals with cyberterrorism.

true

11
New cards

___________ is the premeditated, politically motivated attack against information computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

Cyberterrorism

12
New cards

In May 2007, government offices of _________ were subjected to a mass denial-of-service attack because some people opposed the government’s removal of a Russian WWII memorial.

estonia

13
New cards

One example of Chinese hackers whose stated goal is to infiltrate Western computer systems is a group called the ___________.

China Eagle Union

14
New cards

A(n) ________attack on data can include stealing or destroying data.

Economic

15
New cards

The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems.

Stuxnet

16
New cards

Any attempt to manipulate information in pursuit of a military or political goal is ________.

Information warfare

17
New cards

The ________ War was the first modern war in which there was strong and widespread domestic opposition.

vietnam

18
New cards

During the ___________ War, Western democracies invested time and money for radio broadcasts into communist nations.

cold

19
New cards

A propaganda agent can manage multiple online personalities, posting to many different _____________.

Bulletin boards and discussion groups

20
New cards

In 1996 a hacker allegedly associated with the white supremacist movement temporarily disabled a ___________ ISP.

Massachusetts

21
New cards

In 1998, ethnic Tami guerrillas swamped _________ embassies with 800 emails a day.

Sri Lankan

22
New cards

Although the Cyberterrorism Preparedness Act of 2002 was not passed, many of its goals were addressed by the ___________.

Patriot Act

23
New cards

The joint task force representing components of all four U.S armed services is the ____________.

U.S. Cyber Command