Deck 5: Threats to Cybersecurity by Hacktivists and Nation States

ملء الشاشة (f)
exit full mode
سؤال
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.

A) decrypt your phone calls and text messages
B) encrypt your hard drive
C) use a password manager
D) use two-factor identification
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Cyber terrorism attacks often take the form of ______.

A) denial-of-service attacks
B) worms
C) phishing
D) spamming
سؤال
According to the text, cyberthreats originate mainly from all of the following entities except ______.

A) hackers
B) military units
C) local governments
D) terrorists
سؤال
Hackers who are motivated by personal gain or a certain cause are often referred to as ______.

A) red hats
B) black hats
C) white hats
D) green hats
سؤال
Which of the following is NOT considered a main type of insider threat?

A) malicious
B) exploited
C) careless
D) feared
سؤال
All of the following were identified as vulnerable infrastructures except ______.

A) telecommunications
B) energy
C) education
D) transportation
سؤال
Groups with displeasure of government are often motivated by all of the following except ______.

A) freedom
B) individuality
C) aristocracy
D) privacy
سؤال
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

A) cyberthreat
B) cyberwarfare
C) cybersecurity
D) cyberattack
سؤال
Threats to cybersecurity originate from all of the following sources except ______.

A) individual
B) local
C) national
D) international
سؤال
One of the most persistent threats for the United States in terms of cyberattacks originates in ______.

A) North Korea
B) Israel
C) Russia
D) China
سؤال
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

A) foreign governments
B) spies
C) insiders
D) hacktivists
سؤال
The most serious insider cybercrimes include all of the following except ______.

A) extortion
B) terrorism
C) embezzlement
D) harassment
سؤال
The "bad guy" hackers are known as ______.

A) red hats
B) white hats
C) black hats
D) green hats
سؤال
The least common but most costly is ______ insider threat.

A) malicious
B) careless
C) exploited
D) feared
سؤال
Which of the following characteristics of hackers is not true?

A) The members meet each other quite often.
B) It is male-dominated.
C) They work anonymously.
D) They have several public identities.
سؤال
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

A) feared
B) exploited
C) malicious
D) careless
سؤال
Threats that originate from inside the company or organization are referred to as ______.

A) individual threats
B) local threats
C) national threats
D) foreign threats
سؤال
Which of the following was NOT identified as one of the main forms of international threats?

A) nation-states hacking or spying on trade and other secret information
B) advanced hackers aiming at large corporations
C) hacking or spying on city and local governments
D) terrorists looking to identify and exploit vulnerabilities in our infrastructures
سؤال
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.

A) insider
B) outsider
C) national government
D) foreign government
سؤال
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

A) cyberwarfare
B) cyberbullying
C) cyberterrorism
D) cyberespionage
سؤال
______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data.

A) Gray hats
B) Black hats
C) White hats
D) Green hats
سؤال
The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."
سؤال
Advanced hackers are typically motivated by financial or political goals.
سؤال
International threats are those that originate from inside the company or organization.
سؤال
Insiders are people who are current or former employees of a company, contractors, or friends of employees.
سؤال
All of the following are examples of social engineering except ______.

A) vishing
B) phishing
C) spam
D) impersonation
سؤال
Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.
سؤال
Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?
سؤال
Identify and explain international threats and the three main forms associated with those threats. Are there any recent examples of international threats that fall within the three forms?
سؤال
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.
سؤال
Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
سؤال
Which of the following laws does not apply to hackers?

A) Hackers are evil people.
B) Security is not about security.
C) The greatest damages are caused by simple failures.
D) Most hackers use weak points to get access.
سؤال
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
سؤال
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.

A) black hats
B) gray hats
C) white hats
D) green hats
سؤال
Explain displeasure with the government and why groups such as Anonymous launch cyberattacks. Why do they launch cyberattacks? Do you agree with the work of such hacktivist groups? Why or why not?
سؤال
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

A) bad hackers
B) careless hackers
C) ethical hackers
D) friendly hackers
سؤال
Explain hackernomics and identify five laws that apply to hackers.
سؤال
Malicious insiders may delete or expose sensitive information by incident-either by pressing a wrong key or by other errors.
سؤال
Identify and discuss the three main types of insider threats.
سؤال
Some of the most common insider cybersecurity crimes are cyberbullying and cyberharassment.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Threats to Cybersecurity by Hacktivists and Nation States
1
Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.

A) decrypt your phone calls and text messages
B) encrypt your hard drive
C) use a password manager
D) use two-factor identification
A
2
Cyber terrorism attacks often take the form of ______.

A) denial-of-service attacks
B) worms
C) phishing
D) spamming
A
3
According to the text, cyberthreats originate mainly from all of the following entities except ______.

A) hackers
B) military units
C) local governments
D) terrorists
C
4
Hackers who are motivated by personal gain or a certain cause are often referred to as ______.

A) red hats
B) black hats
C) white hats
D) green hats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT considered a main type of insider threat?

A) malicious
B) exploited
C) careless
D) feared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
All of the following were identified as vulnerable infrastructures except ______.

A) telecommunications
B) energy
C) education
D) transportation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
Groups with displeasure of government are often motivated by all of the following except ______.

A) freedom
B) individuality
C) aristocracy
D) privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

A) cyberthreat
B) cyberwarfare
C) cybersecurity
D) cyberattack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
Threats to cybersecurity originate from all of the following sources except ______.

A) individual
B) local
C) national
D) international
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
One of the most persistent threats for the United States in terms of cyberattacks originates in ______.

A) North Korea
B) Israel
C) Russia
D) China
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.

A) foreign governments
B) spies
C) insiders
D) hacktivists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
The most serious insider cybercrimes include all of the following except ______.

A) extortion
B) terrorism
C) embezzlement
D) harassment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
The "bad guy" hackers are known as ______.

A) red hats
B) white hats
C) black hats
D) green hats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
The least common but most costly is ______ insider threat.

A) malicious
B) careless
C) exploited
D) feared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following characteristics of hackers is not true?

A) The members meet each other quite often.
B) It is male-dominated.
C) They work anonymously.
D) They have several public identities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

A) feared
B) exploited
C) malicious
D) careless
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
Threats that originate from inside the company or organization are referred to as ______.

A) individual threats
B) local threats
C) national threats
D) foreign threats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following was NOT identified as one of the main forms of international threats?

A) nation-states hacking or spying on trade and other secret information
B) advanced hackers aiming at large corporations
C) hacking or spying on city and local governments
D) terrorists looking to identify and exploit vulnerabilities in our infrastructures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
Human behavior that departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies, is the manifestation of a/an ______ threat.

A) insider
B) outsider
C) national government
D) foreign government
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

A) cyberwarfare
B) cyberbullying
C) cyberterrorism
D) cyberespionage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data.

A) Gray hats
B) Black hats
C) White hats
D) Green hats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
Advanced hackers are typically motivated by financial or political goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
International threats are those that originate from inside the company or organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
Insiders are people who are current or former employees of a company, contractors, or friends of employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
All of the following are examples of social engineering except ______.

A) vishing
B) phishing
C) spam
D) impersonation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Identify and explain international threats and the three main forms associated with those threats. Are there any recent examples of international threats that fall within the three forms?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following laws does not apply to hackers?

A) Hackers are evil people.
B) Security is not about security.
C) The greatest damages are caused by simple failures.
D) Most hackers use weak points to get access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.

A) black hats
B) gray hats
C) white hats
D) green hats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Explain displeasure with the government and why groups such as Anonymous launch cyberattacks. Why do they launch cyberattacks? Do you agree with the work of such hacktivist groups? Why or why not?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

A) bad hackers
B) careless hackers
C) ethical hackers
D) friendly hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
Explain hackernomics and identify five laws that apply to hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
Malicious insiders may delete or expose sensitive information by incident-either by pressing a wrong key or by other errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
Identify and discuss the three main types of insider threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
Some of the most common insider cybersecurity crimes are cyberbullying and cyberharassment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.