1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ISIS and the operators have utilized technological advances such as social media to do all of the following EXCEPT ______.
denounce themselves
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______
economic espionage
The first "software" was the Morse code developed by Samuel F. B. Morse. The Morse code made telegraphing much easier by using ______.
dots and dashes
The Economic Espionage Act of 1996 makes it a ______ to steal or interfere with trade secrets.
federal crime
According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as ______.
cyber warfare
Cyberespionage can be classified into which of the following types?
both economic and political
GhostNet was one of the most successful programs with regard to ______ cyberespionage.
political
China is known to prioritize ______ control over cyberdefense strategies.
political information
Which of the following systems led to the creation of the Morse code?
telegraph system
Economic cyberespionage is typically carried out by all of the following EXCEPT
individual actors
Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?
Moonlight Maze
The Syrian Electronic Army has been responsible for attacks against which of the following?
social media sites, major U.S. newspapers,
telecommunications providers
(all of these)
According to the text, the most pervasive cyberthreat may be ______.
theft of intellectual property
According to the text, cyberattacks focus mainly on the destruction of sensitive information.
False
Historically, power has depended on which of the following strengths?
military
In 2015, a cyberattack was launched against Ukraine by the Russians. The ______ attack to shut down the power grid based in Russia was possibly backed by the Russian government.
KillDisk
In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of ______ Amendment rights in the United States.
first
Political espionage is typically used to gain access to sensitive information and/or to fatally damage a network.
True
Actors route Internet traffic through different countries, making it appear to come from another country.
True
The Syrian Electronic Army was established in 2011 as a result of the protests against the Assad regime.
True