Deck 6: National Security: Cyberwarfare and Cyberespionage

ملء الشاشة (f)
exit full mode
سؤال
Historically, power has depended on which of the following strengths?

A) economic
B) educational
C) military
D) leadership
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
According to the text, the most pervasive cyberthreat may be ______.

A) fraud and identity theft
B) theft of intellectual property
C) child pornography
D) financial theft
سؤال
Which of the following countries was not identified as being one of the strong actors in world politics?

A) China
B) Russia
C) United States
D) Mexico
سؤال
According to the text, cyberwarfare generally includes which of the following?

A) cyberespionage and cybersabotage
B) cyberterrorism and cyberespionage
C) cyberharassment and cyberterrorism
D) cybersabotage and cyberharassment
سؤال
Which of the following countries is considered one of the most advanced cyberespionage powers?

A) South Korea
B) China
C) Russia
D) North Korea
سؤال
The first "software" was the Morse code developed by Samuel F. B. Morse. The Morse code made telegraphing much easier by using ______.

A) ciphers
B) different flags
C) dots and dashes
D) special birds
سؤال
The Syrian Electronic Army has been responsible for attacks against which of the following?

A) major U.S. newspapers
B) social media sites
C) telecommunications providers
D) all of these
سؤال
In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of ______ Amendment rights in the United States.

A) First
B) Third
C) Fourth
D) Fifth
سؤال
Which of the following countries is known to be the most advanced with regard to computers, hardware, and software?

A) China
B) Russia
C) United States
D) South Korea
سؤال
Which of the following systems led to the creation of the Morse code?

A) naval flag system
B) telegraph system
C) box cipher system
D) raven system
سؤال
Which of the following was NOT identified as one of the main issues associated with cyberespionage?

A) Malicious software can be developed and used by actors with limited and large resources and without developing specific tools.
B) Hackers across the Internet share tools and techniques, making it very difficult to distinguish between hackers.
C) Nation-states and crime organizations never use independent hackers to avoid being associated with a cyberattack.
D) Actors route Internet traffic through different countries, making it appear to come from another country.
سؤال
China is known to prioritize ______ control over cyberdefense strategies.

A) education information
B) demographic information
C) economic information
D) political information
سؤال
According to the text, China also engages in economic ______ against the United States and other countries.

A) espionage
B) sabotage
C) terrorism
D) treason
سؤال
Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?

A) Zapchast
B) DarkComet
C) Moonlight Maze
D) Blackshades
سؤال
The Syrian Electronic Army has collected information using which of the following cyberattack techniques?

A) Trojan horses
B) botnets
C) worms
D) spam
سؤال
ISIS and the operators have utilized technological advances such as social media to do all of the following except ______.

A) launch attacks
B) propagandize
C) denounce themselves
D) recruit
سؤال
According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as ______.

A) cyberterrorism
B) cyberespionage
C) cybersabotage
D) cyberwarfare
سؤال
The Strategic Support Force intelligence unit is a part of which of the following?

A) Syrian Electronic Army
B) People's Liberation Army
C) National Security Agency
D) General Reconnaissance Bureau
سؤال
In 2015, a cyberattack was launched against Ukraine by the Russians. The ______ attack to shut down the power grid based in Russia was possibly backed by the Russian government.

A) KillDisk
B) DarkComet
C) Rbot
D) Blackshades
سؤال
Cyberespionage can be classified into which of the following types?

A) economic
B) political
C) military
D) both economic and political
سؤال
Cyberspace has increased the power differential between nation-states and between nation-states and non-state actors.
سؤال
The Syrian Electronic Army was established in 2011 as a result of the protests against the Assad regime.
سؤال
Encryption and going dark is a relatively new invention.
سؤال
The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision-maker, is referred to as ______.

A) cyberdomain
B) cyberintelligence
C) cyberactivity
D) cybersecurity
سؤال
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______

A) corporate espionage
B) political espionage
C) economic espionage
D) military espionage
سؤال
Economic cyberespionage is typically carried out by all of the following except ______.

A) state-affiliated actors
B) individual actors
C) nation-states
D) organized crime groups
سؤال
According to the text, cyberattacks focus mainly on the destruction of sensitive information.
سؤال
Identify and example the three main issues associated with cyberespionage.
سؤال
The Economic Espionage Act of 1996 makes it a ______ to steal or interfere with trade secrets.

A) misdemeanor crime
B) infraction
C) federal crime
D) a crime not punishable by law
سؤال
One of the most important inventions was that of a telegraphing code, which was first introduced by the French Claude Chappe in 1792.
سؤال
Given the contentious nature of social media accounts and terrorists efforts to utilize them for propaganda, recruitment, and launching attacks, do you believe that social media websites should shut down accounts associated with terrorists? Why or why not? What are the difficulties in doing so?
سؤال
One of the oldest reasons for threats of harm by nation-states is power.
سؤال
Compare and contrast espionage and sabotage.
سؤال
Nation-states are independent in the global economy and they work alone to accomplish economic growth.
سؤال
Define and explain denial-of-service attacks and the four types associated with these attacks.
سؤال
Political espionage is typically used to gain access to sensitive information and/or to fatally damage a network.
سؤال
Cyberattacks have become a potent political instrument, with the common goal of protection of national sovereignty and power.
سؤال
Actors route Internet traffic through different countries, making it appear to come from another country.
سؤال
Using the information learned in the text, can you think of any recent examples that have hindered cybersecurity? What implications did these have on the security of the United States?
سؤال
GhostNet was one of the most successful programs with regard to ______ cyberespionage.

A) corporate
B) individual
C) political
D) economic
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: National Security: Cyberwarfare and Cyberespionage
1
Historically, power has depended on which of the following strengths?

A) economic
B) educational
C) military
D) leadership
C
2
According to the text, the most pervasive cyberthreat may be ______.

A) fraud and identity theft
B) theft of intellectual property
C) child pornography
D) financial theft
B
3
Which of the following countries was not identified as being one of the strong actors in world politics?

A) China
B) Russia
C) United States
D) Mexico
D
4
According to the text, cyberwarfare generally includes which of the following?

A) cyberespionage and cybersabotage
B) cyberterrorism and cyberespionage
C) cyberharassment and cyberterrorism
D) cybersabotage and cyberharassment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following countries is considered one of the most advanced cyberespionage powers?

A) South Korea
B) China
C) Russia
D) North Korea
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
The first "software" was the Morse code developed by Samuel F. B. Morse. The Morse code made telegraphing much easier by using ______.

A) ciphers
B) different flags
C) dots and dashes
D) special birds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Syrian Electronic Army has been responsible for attacks against which of the following?

A) major U.S. newspapers
B) social media sites
C) telecommunications providers
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of ______ Amendment rights in the United States.

A) First
B) Third
C) Fourth
D) Fifth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following countries is known to be the most advanced with regard to computers, hardware, and software?

A) China
B) Russia
C) United States
D) South Korea
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following systems led to the creation of the Morse code?

A) naval flag system
B) telegraph system
C) box cipher system
D) raven system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following was NOT identified as one of the main issues associated with cyberespionage?

A) Malicious software can be developed and used by actors with limited and large resources and without developing specific tools.
B) Hackers across the Internet share tools and techniques, making it very difficult to distinguish between hackers.
C) Nation-states and crime organizations never use independent hackers to avoid being associated with a cyberattack.
D) Actors route Internet traffic through different countries, making it appear to come from another country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
China is known to prioritize ______ control over cyberdefense strategies.

A) education information
B) demographic information
C) economic information
D) political information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
According to the text, China also engages in economic ______ against the United States and other countries.

A) espionage
B) sabotage
C) terrorism
D) treason
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?

A) Zapchast
B) DarkComet
C) Moonlight Maze
D) Blackshades
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Syrian Electronic Army has collected information using which of the following cyberattack techniques?

A) Trojan horses
B) botnets
C) worms
D) spam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
ISIS and the operators have utilized technological advances such as social media to do all of the following except ______.

A) launch attacks
B) propagandize
C) denounce themselves
D) recruit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as ______.

A) cyberterrorism
B) cyberespionage
C) cybersabotage
D) cyberwarfare
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
The Strategic Support Force intelligence unit is a part of which of the following?

A) Syrian Electronic Army
B) People's Liberation Army
C) National Security Agency
D) General Reconnaissance Bureau
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
In 2015, a cyberattack was launched against Ukraine by the Russians. The ______ attack to shut down the power grid based in Russia was possibly backed by the Russian government.

A) KillDisk
B) DarkComet
C) Rbot
D) Blackshades
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
Cyberespionage can be classified into which of the following types?

A) economic
B) political
C) military
D) both economic and political
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cyberspace has increased the power differential between nation-states and between nation-states and non-state actors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
The Syrian Electronic Army was established in 2011 as a result of the protests against the Assad regime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
Encryption and going dark is a relatively new invention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
The collection and analysis of information that produces timely reporting, with context and relevance to a supported decision-maker, is referred to as ______.

A) cyberdomain
B) cyberintelligence
C) cyberactivity
D) cybersecurity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______

A) corporate espionage
B) political espionage
C) economic espionage
D) military espionage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Economic cyberespionage is typically carried out by all of the following except ______.

A) state-affiliated actors
B) individual actors
C) nation-states
D) organized crime groups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
According to the text, cyberattacks focus mainly on the destruction of sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
Identify and example the three main issues associated with cyberespionage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
The Economic Espionage Act of 1996 makes it a ______ to steal or interfere with trade secrets.

A) misdemeanor crime
B) infraction
C) federal crime
D) a crime not punishable by law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
One of the most important inventions was that of a telegraphing code, which was first introduced by the French Claude Chappe in 1792.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
Given the contentious nature of social media accounts and terrorists efforts to utilize them for propaganda, recruitment, and launching attacks, do you believe that social media websites should shut down accounts associated with terrorists? Why or why not? What are the difficulties in doing so?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
One of the oldest reasons for threats of harm by nation-states is power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Compare and contrast espionage and sabotage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
Nation-states are independent in the global economy and they work alone to accomplish economic growth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
Define and explain denial-of-service attacks and the four types associated with these attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
Political espionage is typically used to gain access to sensitive information and/or to fatally damage a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
Cyberattacks have become a potent political instrument, with the common goal of protection of national sovereignty and power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
Actors route Internet traffic through different countries, making it appear to come from another country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
Using the information learned in the text, can you think of any recent examples that have hindered cybersecurity? What implications did these have on the security of the United States?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
GhostNet was one of the most successful programs with regard to ______ cyberespionage.

A) corporate
B) individual
C) political
D) economic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.