Deck 15: Cyber Conflict in the Age of Great Power Competition, Ryan C Maness, Rebecca Lorentz, and Brandon Valerian
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
العب
ملء الشاشة (f)
Deck 15: Cyber Conflict in the Age of Great Power Competition, Ryan C Maness, Rebecca Lorentz, and Brandon Valerian
1
Which of the following is not part of Beijing's triadic approach to information control?
A) The Great Firewall
B) The Great Cannon
C) The Great Spear
D) The Social Credit System
A) The Great Firewall
B) The Great Cannon
C) The Great Spear
D) The Social Credit System
C
2
Cyber space includes which of the following?
A) The Internet
B) Cellular technologies
C) Space-based communications
D) All the options given are correct.
A) The Internet
B) Cellular technologies
C) Space-based communications
D) All the options given are correct.
D
3
Which of the following is not one of the three layers of cyber space?
A) The physical layer
B) The syntactic layer
C) The psychological layer
D) The cognitive layer
A) The physical layer
B) The syntactic layer
C) The psychological layer
D) The cognitive layer
C
4
According to chapter 16, adversarial attempts to influence social behaviour, including voting behaviour and security strategies, are most effective when they take advantage of…
A) attribution errors.
B) the availability heuristic.
C) confirmation bias.
D) All these answers are correct.
A) attribution errors.
B) the availability heuristic.
C) confirmation bias.
D) All these answers are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Multinational corporations do much of the work in addressing cyber violations and mitigating the impact of serious malware attacks and are legally allowed to 'hack back' against aggressors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cyber war is defined in this chapter as 'the use of digital technologies in military interactions or military affairs in the realm of international relations'.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
As of 2021, the beginnings of a new strategy called 'layered cyber deterrence' were emerging in…
A) Russia.
B) China.
C) the United States.
D) North Korea.
A) Russia.
B) China.
C) the United States.
D) North Korea.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
More than half of all cyber operations take the form of espionage or intelligence operations that focus on the collection of information from and the dissemination of messages to adversaries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
China's cyber strategy against the United States and other democracies has largely consisted of digital espionage that is mainly intended to steal intellectual property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
Online radicalization is, in part, a product of the human tendency towards confirmation bias exacerbated by social media algorithms which push belief-affirming and often highly biased content to users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck

