1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What major category of information warfare/cyberterror does "data hiding" fall into?
Technological facilitation
Which of the following is not a wave in the development of warfare as identified by Alvin Toffler?
Answers:
Information wave
Agrarian wave
Renaissance wave
Industrial wave
Renaissance wave
T/F
Despite its contention that modern technological advancements are incompatible with fundamentalist Islam culture, al Qaeda has become a primary foe in the digital terrorism area.
True
Which of the following is one of the four categories that encompasses cyberterrorism and/or information warfare?
Answers:
Stenography
Promotion
Unauthorized intrusions
Cryptography
Promotion
Using a cell phone to encourage a flash mob is a form of:
cyber and technological facilitation.
Which of the following is not true?
Answers:
1.Al Qaeda leaders have claimed to be actively planning a "cyber jihad" against the United States.
2.U.S. officials have found evidence of al Qaeda researching digital switches that run critical infrastructure.
3.Al Qaeda produced the computer virus "Stuxnet."
4.U.S. officials have found evidence of al Qaeda using LOphtCrack.
Al Qaeda produced the computer virus "Stuxnet."
The greatest threat to civil aviation security is:
heavy reliance on other types of infrastructure.
What major category of information warfare/cyberterror does "recruiting" fall into?
Technological facilitation
T/F
The Internet is the best tool for propaganda and recruitment among terrorists.
True
T/F
According to the Russian perspective, cybercrime and cyberterrorism are acceptable techniques of information warfare.
True
T/F
The United States is likely the nation that is most vulnerable to digital terrorism.
True
T/F
It is estimated that 100 million attacks against U.S. businesses and governments take place each day.
True
T/F
An unauthorized intrusion is easy to identify once it has occurred.
False
T/F
A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker.
True
T/F
Critical infrastructure is not an attractive target to terrorists.
False
T/F
The nation of Japan currently poses a larger threat to the United States in terms of information warfare than that posed by China.
False
Which of the following is least true?
Answers:
1.Cyberterrorism is premeditated.
2.Cyberterrorism is a politically or ideologically motivated attack.
3.Cyberterrorism may include prolonged loss of infrastructure.
4.Cyberterrorism is defined by the group perpetrating it.
Cyberterrorism is defined by the group perpetrating it.
Which of the following is not true?
Answers:
1.The Russians view cyber capabilities as tools of information warfare.
2.The Russians view information warfare from a holistic approach.
3.The Russians carry out cyber operations alongside psychological operations.
4.The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.
The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.
Distributed denial-of-service attacks are an example of:
information attacks.
The type of attack the hacker group "Anonymous" carried out against the private intelligence industry provider Stratfor is considered:
unauthorized intrusions.
What major category of information warfare/cyberterror does "cryptography" fall into?
Technological facilitation
Website defacement is a form of:
information attack
Which of the following is least true?
1.Information warfare is considered necessary to the Chinese government to support its objectives and strategy.
2.China views cyberspace as a way of compensating for its deficiency in conventional warfare.
3.Cyber warfare is incorporated in military training in China.
4.The Chinese government restricts the use of cyber warfare to the Chinese military.
the Chinese government restricts the use of cyber warfare to the Chinese military.
T/F
Information attacks are the use of cyber communication to distribute or coordinate plans for a terrorist attack, incite an attack, or otherwise assist in the facilitation of terrorism
False
T/F
A cryptographic key is necessary to read encoded material.
True
Which of the following is not a component of information warfare?Answers:
Psychological operations
Physical destruction
Propaganda
Security measures
Propaganda
Which is not a category of cyberterrorism?
Answers:
Physical attacks
Promotion
Technological facilitation
Information attacks
Physical attacks
Which of the following is not one of the five essential components of infrastructure?
Answers:
Communication networks
People
Information networks
Government
Government
What major category of information warfare/cyberterror does "website defacement" fall into?
What major category of information warfare/cyberterror do "cyber-plagues" fall into?
Information attacks
T/F
A virus is a piece of code that attaches itself to other instructions within a computer.
True
T/F
Infrastructure attacks are those attacks designed to destroy a system that includes critical data.
True
T/F
Data hiding is difficult to accomplish, but relatively easy to discover in Internet files.
False
T/F
Information warfare is always a component of cyberterrorism.
False
Requesting funds for a terrorist organization through a chat room is an example of:
direct solicitation