1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Cyberterrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.
true
The Beijing Eagle Union consists of Chinese hackers.
false
The MyDoom virus was directed against the Pentagon.
false
The Stuxnet virus was directed against Iraqi nuclear facilities.
false
Information warfare is any attempt to manipulate information in pursuit of a military or political goal.
true
Radio Free Europe was supported by Western democracies during the Cold War.
true
Usenet and Yahoo! are examples of email services.
false
One technique of disinformation is to produce false or skewed news stories.
true
Hactivists means individuals who work for a cause using hacking techniques.
true
The U.S. Patriot Act specifically deals with cyberterrorism.
true
___________ is the premeditated, politically motivated attack against information computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.
Cyberterrorism
In May 2007, government offices of _________ were subjected to a mass denial-of-service attack because some people opposed the government’s removal of a Russian WWII memorial.
estonia
One example of Chinese hackers whose stated goal is to infiltrate Western computer systems is a group called the ___________.
China Eagle Union
A(n) ________attack on data can include stealing or destroying data.
Economic
The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems.
Stuxnet
Any attempt to manipulate information in pursuit of a military or political goal is ________.
Information warfare
The ________ War was the first modern war in which there was strong and widespread domestic opposition.
vietnam
During the ___________ War, Western democracies invested time and money for radio broadcasts into communist nations.
cold
A propaganda agent can manage multiple online personalities, posting to many different _____________.
Bulletin boards and discussion groups
In 1996 a hacker allegedly associated with the white supremacist movement temporarily disabled a ___________ ISP.
Massachusetts
In 1998, ethnic Tami guerrillas swamped _________ embassies with 800 emails a day.
Sri Lankan
Although the Cyberterrorism Preparedness Act of 2002 was not passed, many of its goals were addressed by the ___________.
Patriot Act
The joint task force representing components of all four U.S armed services is the ____________.
U.S. Cyber Command