Deck 7: Online Extremism, Cyberterror, and Cyberwarfare
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/9
العب
ملء الشاشة (f)
Deck 7: Online Extremism, Cyberterror, and Cyberwarfare
1
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?
A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
C
2
Which of the following is not a way that extremist groups use the Internet?
A) humor
B) recruitment
C) indoctrination
D) communications
A) humor
B) recruitment
C) indoctrination
D) communications
A
3
Which of the following types of media have not been used by extremist groups to promote their agenda?
A) video games
B) music
C) magazines
D) none of the above
A) video games
B) music
C) magazines
D) none of the above
D
4
Which of the following forms of attack are commonly used by groups to disable websites and online services?
A) denial of service
B) web defacements
C) malware
D) phishing
A) denial of service
B) web defacements
C) malware
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?
A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?
A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?
A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?
A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?
A) cyberwar
B) information warfare
C) physical attacks
D) none of these
A) cyberwar
B) information warfare
C) physical attacks
D) none of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck

