Deck 7: Online Extremism, Cyberterror, and Cyberwarfare

ملء الشاشة (f)
exit full mode
سؤال
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?

A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is not a way that extremist groups use the Internet?

A) humor
B) recruitment
C) indoctrination
D) communications
سؤال
Which of the following types of media have not been used by extremist groups to promote their agenda?

A) video games
B) music
C) magazines
D) none of the above
سؤال
Which of the following forms of attack are commonly used by groups to disable websites and online services?

A) denial of service
B) web defacements
C) malware
D) phishing
سؤال
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?

A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
سؤال
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?

A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
سؤال
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?

A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
سؤال
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?

A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
سؤال
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?

A) cyberwar
B) information warfare
C) physical attacks
D) none of these
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/9
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Online Extremism, Cyberterror, and Cyberwarfare
1
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?

A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
C
2
Which of the following is not a way that extremist groups use the Internet?

A) humor
B) recruitment
C) indoctrination
D) communications
A
3
Which of the following types of media have not been used by extremist groups to promote their agenda?

A) video games
B) music
C) magazines
D) none of the above
D
4
Which of the following forms of attack are commonly used by groups to disable websites and online services?

A) denial of service
B) web defacements
C) malware
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?

A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?

A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?

A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?

A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?

A) cyberwar
B) information warfare
C) physical attacks
D) none of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.