Deck 15: Cyber Conflict in the Age of Great Power Competition, Ryan C Maness, Rebecca Lorentz, and Brandon Valerian

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not part of Beijing's triadic approach to information control?

A) The Great Firewall
B) The Great Cannon
C) The Great Spear
D) The Social Credit System
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Cyber space includes which of the following?

A) The Internet
B) Cellular technologies
C) Space-based communications
D) All the options given are correct.
سؤال
Which of the following is not one of the three layers of cyber space?

A) The physical layer
B) The syntactic layer
C) The psychological layer
D) The cognitive layer
سؤال
According to chapter 16, adversarial attempts to influence social behaviour, including voting behaviour and security strategies, are most effective when they take advantage of…

A) attribution errors.
B) the availability heuristic.
C) confirmation bias.
D) All these answers are correct.
سؤال
Multinational corporations do much of the work in addressing cyber violations and mitigating the impact of serious malware attacks and are legally allowed to 'hack back' against aggressors.
سؤال
Cyber war is defined in this chapter as 'the use of digital technologies in military interactions or military affairs in the realm of international relations'.
سؤال
As of 2021, the beginnings of a new strategy called 'layered cyber deterrence' were emerging in…

A) Russia.
B) China.
C) the United States.
D) North Korea.
سؤال
More than half of all cyber operations take the form of espionage or intelligence operations that focus on the collection of information from and the dissemination of messages to adversaries.
سؤال
China's cyber strategy against the United States and other democracies has largely consisted of digital espionage that is mainly intended to steal intellectual property.
سؤال
Online radicalization is, in part, a product of the human tendency towards confirmation bias exacerbated by social media algorithms which push belief-affirming and often highly biased content to users.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Cyber Conflict in the Age of Great Power Competition, Ryan C Maness, Rebecca Lorentz, and Brandon Valerian
1
Which of the following is not part of Beijing's triadic approach to information control?

A) The Great Firewall
B) The Great Cannon
C) The Great Spear
D) The Social Credit System
C
2
Cyber space includes which of the following?

A) The Internet
B) Cellular technologies
C) Space-based communications
D) All the options given are correct.
D
3
Which of the following is not one of the three layers of cyber space?

A) The physical layer
B) The syntactic layer
C) The psychological layer
D) The cognitive layer
C
4
According to chapter 16, adversarial attempts to influence social behaviour, including voting behaviour and security strategies, are most effective when they take advantage of…

A) attribution errors.
B) the availability heuristic.
C) confirmation bias.
D) All these answers are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Multinational corporations do much of the work in addressing cyber violations and mitigating the impact of serious malware attacks and are legally allowed to 'hack back' against aggressors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cyber war is defined in this chapter as 'the use of digital technologies in military interactions or military affairs in the realm of international relations'.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
As of 2021, the beginnings of a new strategy called 'layered cyber deterrence' were emerging in…

A) Russia.
B) China.
C) the United States.
D) North Korea.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
More than half of all cyber operations take the form of espionage or intelligence operations that focus on the collection of information from and the dissemination of messages to adversaries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
China's cyber strategy against the United States and other democracies has largely consisted of digital espionage that is mainly intended to steal intellectual property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
Online radicalization is, in part, a product of the human tendency towards confirmation bias exacerbated by social media algorithms which push belief-affirming and often highly biased content to users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.