Deck 7: Cyberterrorism

ملء الشاشة (f)
exit full mode
سؤال
Which of the following was NOT identified as one of the components of the motivation element?

A) economical
B) ideological
C) social
D) political
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
According to the text, the United States ranks ______ in pro-IS tweets.

A) first
B) second
C) third
D) fourth
سؤال
All of the following are components of the impact element except ______.

A) mass disruption
B) serious interference with critical service operations
C) economic gain
D) causes fear, death, or bodily injury
سؤال
Which of the following cyberterror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?

A) information and communication
B) education
C) emergency systems
D) banking and finance
سؤال
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target except ______.

A) critical national information infrastructure
B) critical infrastructure
C) civilian population
D) civilian homes
سؤال
The Islamic State is also referred to as all of the following except ______.

A) Islamic State of Iraq and Syria
B) Islamic State in Iraq and the Levant
C) Islamic Electronic Army
D) Daesh
سؤال
According to the text, the domain is ______.

A) cyberspace
B) critical infrastructure
C) critical national information infrastructure
D) civilian population
سؤال
According to the conceptual framework of cyberterrorism, the method of action is ______.

A) unlawful means
B) mass disruption
C) serious interference
D) network warfare
سؤال
Which of the following was NOT identified as sectors of critical infrastructure?

A) chemical sector
B) government sector
C) education sector
D) food and agriculture sector
سؤال
The most famous use of the Internet by Boko Haram was in utilizing which of the following to show coverage of the kidnapping of the Chibok?

A) Facebook
B) Twitter
C) YouTube
D) Instagram
سؤال
The terrorist organization Boko Haram, also known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, is from ______.

A) Ethiopia
B) Kenya
C) Nigeria
D) Nairobi
سؤال
Which of the following groups was not highlighted in this chapter?

A) the Islamic State
B) Boko Haram
C) al-Qaeda
D) People's Liberation Army
سؤال
Which of the following cyber terror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?

A) transportation
B) sports arenas
C) water supply systems
D) gas and oil
سؤال
Which of the following was identified as a tool of attack in the conceptual framework of defining cyberterrorism?

A) economical operation
B) psychological operation
C) sociological operation
D) political operation
سؤال
Boko Haram has become more active on social media since 2015 when it established a/an ______ account.

A) Facebook
B) Instagram
C) Twitter
D) Snapchat
سؤال
Cyberterror attacks may be conducted in a variety of ways, including ______.

A) destroying machinery
B) interfering with information technology
C) creating hardware to prevent intrusions
D) using computers to override control systems
سؤال
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements except ______.

A) target
B) results
C) motivation
D) impact
سؤال
An intentional act, committed via computer or communication system and motivated by political, religious, or ideological objectives, against information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as ______.

A) cyberespionage
B) cyberterrorism
C) cyberwarfare
D) cybersabotage
سؤال
The electrical grid is a significant target because it is not just a U.S. infrastructure. It is also known as the ______.

A) U.S.-Mexico grid
B) South American grid
C) North American grid
D) U.S.-Canada grid
سؤال
According to the text, which of the following entities also contributes to the misunderstanding of what constitutes cyberterrorism?

A) the government
B) the media
C) the people
D) all of these
سؤال
Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to ______.

A) mitigate
B) prepare
C) respond
D) recover
سؤال
Helping people and the community return to normal, if possible, is a part of ______.

A) mitigation
B) preparedness
C) response
D) recovery
سؤال
Why is it difficult to define cyberterrorism?
سؤال
Barry Collin, while working as a research analyst at Palo Alto's Institute for Security and Intelligence in the 1980s, first coined the term cyberterrorism.
سؤال
Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.
سؤال
The term terrorism refers to a tactic.
سؤال
Differentiate cybercrime from cyberterrorism.
سؤال
There is a universal definition of terrorism in the United States and in the international community.
سؤال
Efforts to identify threats, determine vulnerabilities, and identify required resources is known as ______.

A) mitigation
B) preparedness
C) response
D) recovery
سؤال
Cyberspace is a place in which computers function and data moves.
سؤال
In order to examine the threat aspect of risk assessment, it should be understood that risk can come from two sources: natural disasters and man-made disasters.
سؤال
There is no concern that cyberterrorists will use the electrical grid system to attack critical infrastructure, as they do not have the means to do so.
سؤال
Stephen E. Flynn, a professor of Homeland Security at Northeastern University in Boston, Massachusetts, identified the electrical grid as one of the top homeland security concerns. What makes the electric grid a top concern?
سؤال
What is the difference between critical infrastructures and key assets? Provide one example.
سؤال
One main element of that terrorism tactic is to create fear in a population.
سؤال
Which of the following was identified as a sector of critical infrastructures?

A) national monuments sector
B) education sector
C) financial services sector
D) corporate sector
سؤال
Al-Qaeda has been known to recruit individuals with information technology or computer backgrounds.
سؤال
Using social media to recruit supporters has resulted in zero terror attacks in the United States and in the international community.
سؤال
According to some researchers, as technology rapidly advances, cyberterrorism may soon manifest as a deadly threat-a threat that left unexamined could leave law enforcement unprepared to detect, prevent, and respond. Given the technological advances, what, in your opinion, can be done to improve the efforts of detecting, preventing, and responding to cyberterrorism?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Cyberterrorism
1
Which of the following was NOT identified as one of the components of the motivation element?

A) economical
B) ideological
C) social
D) political
A
2
According to the text, the United States ranks ______ in pro-IS tweets.

A) first
B) second
C) third
D) fourth
D
3
All of the following are components of the impact element except ______.

A) mass disruption
B) serious interference with critical service operations
C) economic gain
D) causes fear, death, or bodily injury
C
4
Which of the following cyberterror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?

A) information and communication
B) education
C) emergency systems
D) banking and finance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
5
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target except ______.

A) critical national information infrastructure
B) critical infrastructure
C) civilian population
D) civilian homes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
6
The Islamic State is also referred to as all of the following except ______.

A) Islamic State of Iraq and Syria
B) Islamic State in Iraq and the Levant
C) Islamic Electronic Army
D) Daesh
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
7
According to the text, the domain is ______.

A) cyberspace
B) critical infrastructure
C) critical national information infrastructure
D) civilian population
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
8
According to the conceptual framework of cyberterrorism, the method of action is ______.

A) unlawful means
B) mass disruption
C) serious interference
D) network warfare
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following was NOT identified as sectors of critical infrastructure?

A) chemical sector
B) government sector
C) education sector
D) food and agriculture sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
10
The most famous use of the Internet by Boko Haram was in utilizing which of the following to show coverage of the kidnapping of the Chibok?

A) Facebook
B) Twitter
C) YouTube
D) Instagram
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
11
The terrorist organization Boko Haram, also known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, is from ______.

A) Ethiopia
B) Kenya
C) Nigeria
D) Nairobi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following groups was not highlighted in this chapter?

A) the Islamic State
B) Boko Haram
C) al-Qaeda
D) People's Liberation Army
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following cyber terror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?

A) transportation
B) sports arenas
C) water supply systems
D) gas and oil
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following was identified as a tool of attack in the conceptual framework of defining cyberterrorism?

A) economical operation
B) psychological operation
C) sociological operation
D) political operation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
15
Boko Haram has become more active on social media since 2015 when it established a/an ______ account.

A) Facebook
B) Instagram
C) Twitter
D) Snapchat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
16
Cyberterror attacks may be conducted in a variety of ways, including ______.

A) destroying machinery
B) interfering with information technology
C) creating hardware to prevent intrusions
D) using computers to override control systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
17
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements except ______.

A) target
B) results
C) motivation
D) impact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
18
An intentional act, committed via computer or communication system and motivated by political, religious, or ideological objectives, against information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as ______.

A) cyberespionage
B) cyberterrorism
C) cyberwarfare
D) cybersabotage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
19
The electrical grid is a significant target because it is not just a U.S. infrastructure. It is also known as the ______.

A) U.S.-Mexico grid
B) South American grid
C) North American grid
D) U.S.-Canada grid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
20
According to the text, which of the following entities also contributes to the misunderstanding of what constitutes cyberterrorism?

A) the government
B) the media
C) the people
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
21
Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to ______.

A) mitigate
B) prepare
C) respond
D) recover
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
22
Helping people and the community return to normal, if possible, is a part of ______.

A) mitigation
B) preparedness
C) response
D) recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
23
Why is it difficult to define cyberterrorism?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
24
Barry Collin, while working as a research analyst at Palo Alto's Institute for Security and Intelligence in the 1980s, first coined the term cyberterrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
25
Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
26
The term terrorism refers to a tactic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
27
Differentiate cybercrime from cyberterrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
28
There is a universal definition of terrorism in the United States and in the international community.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
29
Efforts to identify threats, determine vulnerabilities, and identify required resources is known as ______.

A) mitigation
B) preparedness
C) response
D) recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
30
Cyberspace is a place in which computers function and data moves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
31
In order to examine the threat aspect of risk assessment, it should be understood that risk can come from two sources: natural disasters and man-made disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
32
There is no concern that cyberterrorists will use the electrical grid system to attack critical infrastructure, as they do not have the means to do so.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
33
Stephen E. Flynn, a professor of Homeland Security at Northeastern University in Boston, Massachusetts, identified the electrical grid as one of the top homeland security concerns. What makes the electric grid a top concern?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
34
What is the difference between critical infrastructures and key assets? Provide one example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
35
One main element of that terrorism tactic is to create fear in a population.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following was identified as a sector of critical infrastructures?

A) national monuments sector
B) education sector
C) financial services sector
D) corporate sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
37
Al-Qaeda has been known to recruit individuals with information technology or computer backgrounds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
38
Using social media to recruit supporters has resulted in zero terror attacks in the United States and in the international community.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
39
According to some researchers, as technology rapidly advances, cyberterrorism may soon manifest as a deadly threat-a threat that left unexamined could leave law enforcement unprepared to detect, prevent, and respond. Given the technological advances, what, in your opinion, can be done to improve the efforts of detecting, preventing, and responding to cyberterrorism?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.