Deck 14: Choosing Defense Strategies
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
العب
ملء الشاشة (f)
Deck 14: Choosing Defense Strategies
1
Putting their own political spin on a conflict or issue is a technique often used by governments and political organizations and is called:
A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
A)disinformation
B)industrial espionage
C)information warfare
D)propaganda
D
2
The author provides information about groups of people flooding Internet sites such as Yahoo news boards with anonymous postings to attempt to sway public opinion as an example of:
A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
A)cyber terrorism.
B)information warfare.
C)industrial espionage.
D)propaganda.
B
3
Which of the following is NOT a recommended strategy for preventing employees from disclosing organizational data?
A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
A)Limit access to portable storage media.
B)Maintain appropriate network security measures.
C)Require frequent polygraph examinations.
D)Shred documents and old storage media.
C
4
Having ____________ installed on a computer can allow others access to information stored on that computer as well as keystrokes entered such as passwords and logon information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
In which attack did the hacker sign off with the statement "You have yet to see true electronic terrorism.This is a promise."?
A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
A)Attack against a Massachusetts ISP by a White Supremacist group
B)Arabian Electronic Jihad attack against Israeli and American Web sites
C)Chinese attacks against NATO computers
D)Disgruntled former consultant leaks raw sewage on a town
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
Breaking into computer systems for purposes that the perpetrator feels are ethically valid is called:
A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
A)Cracking
B)Hacking
C)Hacktivism
D)Terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which is NOT an encryption program discussed by the author?
A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
A)CryptoEx
B)CryptoGram Folder
C)SafeHouse
D)SecureDrive+
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is the best strategy for protecting sensitive data on portable computers from compromise in the event of loss or theft of the computer?
A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
A)Do not have floppy drives on portable computers.
B)Do not have CD writers on portable computers.
C)Encrypt hard drives.
D)Keep all portable computers under lock and key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which is LEAST likely to provide access to sensitive data to unauthorized people?
A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
A)Adware
B)Key loggers
C)Packet sniffers
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
A ____________ is actually software that allows the user to read data transmitted over a network including source and destination addresses and contents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
Attempting to acquire information to which one does not have legitimate access is called ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which is a multi-platform packet sniffer?
A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
A)CommView
B)EtherDetect
C)Ethereal
D)SafeHouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
Use of computers and their Internet connectivity to launch terrorist attacks is called:
A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
A)cyber-espionage
B)cyber-hacking
C)cyber-hacktivism
D)cyber-terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
Where did the first known attack by terrorists against a country's computer systems occur?
A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
A)Australia
B)Kosovo
C)Pakistan
D)Sri Lanka
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which permits a user to read sensitive data without ever having physical access to the target system?
A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
A)Cookies
B)Key loggers
C)Packet sniffers
D)Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which is likely to be a more threatening type of computer attack?
A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
A)A focused attack against specific targets
B)A general and unfocused attack with no specific target
C)An attack against a highly secure system such as the CIA,NSA,or DOD
D)An attack against a low-security logistical military system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which is NOT a way in which a cyber attack is likely to cause economic loss to a company?
A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
A)Destruction of records
B)Misdirecting military services
C)Theft of financial records
D)Virus attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ____________ virus was an example of domestic economic terrorism against the Santa Cruz Organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
____________ is the use of computers and\or Internet connectivity to launch a terrorist attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
What does the author say is the only reason that there have not been more damaging and more frequent terrorist attacks against computer systems?
A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
A)Extensive measures to secure systems make it difficult to succeed.
B)Lack of desire among terrorists to attack computer systems.
C)Terrorist groups do not have the computer skills required.
D)Victims simply are not reporting all the attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
Hacking activities motivated by purposes that the hacker believes are ethically valid is known as ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
Governments,groups,or organizations attempt to put their own political spin on a conflict through the dissemination of ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
A form of information warfare where incorrect statements are intentionally provided as facts is known as ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________ is any attempt to manipulate information in pursuit of a military or political goal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck

