Deck 14: Choosing Defense Strategies

ملء الشاشة (f)
exit full mode
سؤال
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:

A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:

A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
سؤال
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?

A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
سؤال
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
سؤال
In which attack did the hacker sign off with the statement "You have yet to see true electronic terrorism.This is a promise."?

A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
سؤال
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:

A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
سؤال
Which is NOT an encryption program discussed by the author?

A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
سؤال
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?

A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
سؤال
Which is LEAST likely to provide access to sensitive data to unauthorized people?

A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
سؤال
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
سؤال
Attempting to acquire information to which one does not have legitimate access is called ____________.
سؤال
Which is a multi-platform packet sniffer?

A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
سؤال
Use of computers and their Internet connectivity to launch terrorist attacks is called:

A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
سؤال
Where did the first known attack by terrorists against a country's computer systems occur?

A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
سؤال
Which permits a user to read sensitive data without ever having physical access to the target system?

A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
سؤال
Which is likely to be a more threatening type of computer attack?

A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
سؤال
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?

A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
سؤال
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
سؤال
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
سؤال
What does the author say is the only reason that there have not been more damaging and more frequent terrorist attacks against computer systems?

A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
سؤال
Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.
سؤال
Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.
سؤال
A form of information warfare where incorrect statements are intentionally provided as facts is known as ____________.
سؤال
____________ is any attempt to manipulate information in pursuit of a military or political goal.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Choosing Defense Strategies
1
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:

A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
D
2
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:

A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
B
3
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?

A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
C
4
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
In which attack did the hacker sign off with the statement "You have yet to see true electronic terrorism.This is a promise."?

A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:

A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which is NOT an encryption program discussed by the author?

A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?

A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which is LEAST likely to provide access to sensitive data to unauthorized people?

A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
Attempting to acquire information to which one does not have legitimate access is called ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which is a multi-platform packet sniffer?

A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
Use of computers and their Internet connectivity to launch terrorist attacks is called:

A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
Where did the first known attack by terrorists against a country's computer systems occur?

A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which permits a user to read sensitive data without ever having physical access to the target system?

A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which is likely to be a more threatening type of computer attack?

A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?

A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
What does the author say is the only reason that there have not been more damaging and more frequent terrorist attacks against computer systems?

A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
A form of information warfare where incorrect statements are intentionally provided as facts is known as ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________ is any attempt to manipulate information in pursuit of a military or political goal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.