Deck 14: Political Cybercrime

ملء الشاشة (f)
exit full mode
سؤال
Which of the following cybercrimes can be classified as political cybercrime?

A) Hacktivism
B) Cyberterrorism
C) Cyberwarfare
D) Both B and C
E) All of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Political cybercriminals engage in ___________.

A) hacking
B) malware distribution
C) denial of service (DoS) attacks
D) distributed denial of service (DDoS) attacks
E) all of the above
سؤال
Which of the following cybercrimes have hacktivists equated with online civil disobedience?

A) Website defacement
B) Malware distribution
C) Redirecting websites
D) Data theft and disclosure
E) All of the above
سؤال
_________ refers to the use of coercive tactics to provoke fear and cause harm or damage with the intention of replacing a capitalist regime with a socialist or communist regime.

A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
سؤال
________refers to the use of threats or acts of violence against a particular group that is motivated by notions of racial supremacy or antigovernment and antiregulatory beliefs.

A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
سؤال
________ refers to the use of coercive tactics to resolve a specific issue that a group believes warrants immediate attention.

A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
سؤال
________ refers to the use of the Internet to target critical infrastructure with the intention of provoking fear and causing damage, serious bodily harm, or death to effect some form of change in the government or population in furtherance of a political, religious, or ideological goal.

A) Cyberwarfare
B) Cyberterrorism
C) Cyberespionage
D) Hacktivism
E) Wardriving
سؤال
A _________ is an illegal act conducted by a state to obtain justice for an attack committed against it.

A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
سؤال
A _______ is a legal act conducted by a harmed country in response to an attack.

A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
سؤال
_______ holds that the international system creates opportunities for states to both cooperate and engage in self-help and it is up to the state to determine whether to take advantage of these opportunities.

A) Realism
B) Security dilemma
C) Liberalism
D) Brinkmanship
E) None of the above
سؤال
A _________ engages in cybercrime in furtherance of self-perceived justice to draw attention to his or her cause.
سؤال
________ involves actions that constitute a nonviolent intentional breach of law.
سؤال
________ is the practice of spying or using spies, typically by a government, to obtain economic, political, or military information.
سؤال
________ refer to groups with both the capability and the intent to persistently and effectively target a specific entity.
سؤال
_______ refers to engaging in coercive tactics to cause fear, destruction, harm, or death with the intention of effecting some form of change in the government or population in pursuit of a political, ideological, or religious goal.
سؤال
_______ involves the use of coercive acts in pursuit of what individuals believe to be divinely commanded purposes, representing extremists' interpretations of their faith.
سؤال
________ refers to the use of coercive tactics by an ethnic or religious group that believes it is, or in fact is, persecuted by a majority to create an independent homeland.
سؤال
The _______ ultimately holds that countries misinterpret the actions of another nation to improve security as a threat.
سؤال
________ is the doctrine of military strategy holding that the full-scale use of force by two opposing sides effectively results in the destruction of both in an attack.
سؤال
_______ refers to the process of engaging in continual escalation of actions to the point of a catastrophic outcome with the intention of gaining a favorable outcome.
سؤال
The tactics, targets, and even modus operandi of political cybercriminals may be similar in nature.
سؤال
One type of cybervigilante is a hacktivist.
سؤال
An example of cyberterrorism is terrorists' use of the Internet.
سؤال
Cyberwarfare has occurred.
سؤال
Hackback is a tactic that can be used by actors that is in accordance with existing laws.
سؤال
Collective punishment targets those who are not responsible for the illicit behavior.
سؤال
Cyberoffensive tactics are measures that can detect vulnerabilities, patch them, detect attempted cyberattacks, and mitigate their impact with the necessary human and technical resources.
سؤال
Cyberdefensive tactics involve proactive responses designed to penetrate enemy systems and cause harm or damage.
سؤال
Just war theory focuses on elucidating agents' intentions and strategic decisions with respect to their preferences or the perceived utility and costs of particular actions.
سؤال
Speech directed to incite, or which is likely to incite, imminent lawless, violent action is protected under the First Amendment to the U.S. Constitution.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Political Cybercrime
1
Which of the following cybercrimes can be classified as political cybercrime?

A) Hacktivism
B) Cyberterrorism
C) Cyberwarfare
D) Both B and C
E) All of the above
E
2
Political cybercriminals engage in ___________.

A) hacking
B) malware distribution
C) denial of service (DoS) attacks
D) distributed denial of service (DDoS) attacks
E) all of the above
E
3
Which of the following cybercrimes have hacktivists equated with online civil disobedience?

A) Website defacement
B) Malware distribution
C) Redirecting websites
D) Data theft and disclosure
E) All of the above
E
4
_________ refers to the use of coercive tactics to provoke fear and cause harm or damage with the intention of replacing a capitalist regime with a socialist or communist regime.

A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
________refers to the use of threats or acts of violence against a particular group that is motivated by notions of racial supremacy or antigovernment and antiregulatory beliefs.

A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ refers to the use of coercive tactics to resolve a specific issue that a group believes warrants immediate attention.

A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
________ refers to the use of the Internet to target critical infrastructure with the intention of provoking fear and causing damage, serious bodily harm, or death to effect some form of change in the government or population in furtherance of a political, religious, or ideological goal.

A) Cyberwarfare
B) Cyberterrorism
C) Cyberespionage
D) Hacktivism
E) Wardriving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
A _________ is an illegal act conducted by a state to obtain justice for an attack committed against it.

A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
A _______ is a legal act conducted by a harmed country in response to an attack.

A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
_______ holds that the international system creates opportunities for states to both cooperate and engage in self-help and it is up to the state to determine whether to take advantage of these opportunities.

A) Realism
B) Security dilemma
C) Liberalism
D) Brinkmanship
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
A _________ engages in cybercrime in furtherance of self-perceived justice to draw attention to his or her cause.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ involves actions that constitute a nonviolent intentional breach of law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
________ is the practice of spying or using spies, typically by a government, to obtain economic, political, or military information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
________ refer to groups with both the capability and the intent to persistently and effectively target a specific entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
_______ refers to engaging in coercive tactics to cause fear, destruction, harm, or death with the intention of effecting some form of change in the government or population in pursuit of a political, ideological, or religious goal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
_______ involves the use of coercive acts in pursuit of what individuals believe to be divinely commanded purposes, representing extremists' interpretations of their faith.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
________ refers to the use of coercive tactics by an ethnic or religious group that believes it is, or in fact is, persecuted by a majority to create an independent homeland.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
The _______ ultimately holds that countries misinterpret the actions of another nation to improve security as a threat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
________ is the doctrine of military strategy holding that the full-scale use of force by two opposing sides effectively results in the destruction of both in an attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
_______ refers to the process of engaging in continual escalation of actions to the point of a catastrophic outcome with the intention of gaining a favorable outcome.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
The tactics, targets, and even modus operandi of political cybercriminals may be similar in nature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
One type of cybervigilante is a hacktivist.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
An example of cyberterrorism is terrorists' use of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
Cyberwarfare has occurred.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
Hackback is a tactic that can be used by actors that is in accordance with existing laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Collective punishment targets those who are not responsible for the illicit behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Cyberoffensive tactics are measures that can detect vulnerabilities, patch them, detect attempted cyberattacks, and mitigate their impact with the necessary human and technical resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
Cyberdefensive tactics involve proactive responses designed to penetrate enemy systems and cause harm or damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Just war theory focuses on elucidating agents' intentions and strategic decisions with respect to their preferences or the perceived utility and costs of particular actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
Speech directed to incite, or which is likely to incite, imminent lawless, violent action is protected under the First Amendment to the U.S. Constitution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.