Deck 1: The Threat Environment

ملء الشاشة (f)
exit full mode
سؤال
Methods that security professionals use to try to stop threats include all of the following EXCEPT ________.

A) safeguards
B) countermeasure
C) protections
D) breaches
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Costs for all threats is increasing annually.
سؤال
Detective countermeasures is considered one of the security goals of computer staff.
سؤال
A ________ happens when an unauthorized person is able to view, alter, or steal secured data.

A) countermeasure
B) data breach
C) safeguard
D) compromise
سؤال
More than ________ records were stolen in 2018.

A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
سؤال
Which of the following is true about data breaches in 2018?

A) It's likely that half of all Americans lost their records at least one time in 2018.
B) It's likely that nearly everyone lost their records at least one time in 2018.
C) More than 12 billion people lost their records in 2018.
D) Slightly less than half of the world's population lost their records at least once in 2018.
سؤال
Indirect costs due to data breaches are estimated to be:

A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year
سؤال
The chances of an organization having a data breach over the next two years is approximately ________.

A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent
سؤال
Which of the following is NOT a direct cost of a major data breach?

A) Loss of reputation
B) Notification costs
C) Legal fees
D) Detection
سؤال
Which of the following companies experienced the largest data breach in history in 2016?

A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook
سؤال
When a data breach occurs, hackers are primarily looking for ________.

A) personal and business addresses
B) access to systems
C) personally identifiable information
D) cash and credit card numbers
سؤال
Stolen information is commonly used for ________.

A) credit card fraud
B) identity theft
C) false claims
D) data mismanagement
سؤال
Which of the following is typically considered the first step in protecting your company from data breaches?

A) Locking up your data to prevent data breaches
B) Understanding how data breaches happen
C) Purchasing software to prevent data breaches
D) Hiring a qualified data security team
سؤال
Data from Target customers was stolen ________.

A) online
B) from point-of-sale (POS) systems
C) primary by internal hackers, mostly employees
D) through employee extortion
سؤال
Attackers in the Target data breach used malware and then used ______ or ______ to infect a Target third party vendor.

A) spear phishing; sabotage
B) hacking; sabotage
C) spear phishing; a targeted phishing attack
D) viruses; worms
سؤال
What is Trojan.POSRAM in regard to Target's data breach?

A) Employee sabotage
B) Malware
C) A virus
D) A worm
سؤال
The Target data breach helped impact a shift from swipe cards to ________.

A) EMV-compliant smart cards
B) POS systems
C) keystroke logger
D) rootkits
سؤال
One of the long-lasting effects of the data breach to Target was ________.

A) loss of money
B) loss of customer confidence
C) loss of merchandise
D) employee dissatisfaction
سؤال
Data breaches are rarely costly to a company.
سؤال
Data breaches are always the result of hackers in distant locations.
سؤال
Indirect cost related to data breaches average an addition $10 million per incident in the U.S.
سؤال
There is about a one in four chance that your organization will experience a data breach.
سؤال
More than 67 percent of data breaches come from hackers trying to make money.
سؤال
Rogue internal employees typically have a more difficult time stealing data than do external hackers.
سؤال
The Target data breach affected 30 percent of the population of the U.S.
سؤال
Trojan.POSRAM is a variant of the ILOVEYOU virus.
سؤال
Hackers sold stolen credit card information gained from the Target breach.
سؤال
Which of the following is FALSE about employees being considered dangerous in regard to security?

A) Employees usually have extensive knowledge of systems.
B) Employees often have the credentials needed to access sensitive parts of systems.
C) Companies generally have little trust in their employees.
D) Employees know corporate control mechanisms and so often know how to avoid detection.
سؤال
________ are considered the most dangerous of all employees.

A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks
سؤال
Which of the following is considered a trade secret?

A) Product formulations
B) Patents
C) Trade names
D) Trademarks
سؤال
Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.
سؤال
If you are explicitly or implicitly allowed to use the resources that you're accessing on a company computer, you have authorization to do so.
سؤال
Copyrights and patents are known as trade secrets.
سؤال
Contract workers can also be considered a threat to a business.
سؤال
________ are spread through e-mail with infected attachments.

A) Viruses
B) Worms
C) Direct-propagation worms
D) Distributed denial-of-service (DDoS) attacks
سؤال
________ take advantage of vulnerabilities in software.

A) Direct-propagation worms
B) Trojan horses
C) Blended threats
D) Bots
سؤال
What is a payload?

A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer
سؤال
Which of the following is FALSE about rootkits?

A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.
سؤال
Worms and viruses act much in the same way in how they propagate.
سؤال
Nonmobile malware can be carried to a system as part of a payload.
سؤال
Cookies are small text strings stored on your own personal computer.
سؤال
Most traditional external attackers were primarily motivated by ________.

A) the thrill of breaking in
B) making money through crime
C) stealing personal identity data
D) capturing thousands and thousands of credit card numbers
سؤال
Sending packets with false IP source addresses is known as ________.

A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking
سؤال
When a hacker sends a first round of probe packets to find hosts that are active, the attacker is sending ________ probes.

A) IP address scanning
B) a chain of attack
C) piggybacking
D) IP address spoofing
سؤال
In a DoS attack, the botmaster is also known as a ________.

A) handler
B) hacker
C) hoax
D) rootkit
سؤال
Skilled hackers have dubbed a new type of hacker that is less sophisticated as ________.

A) Bug bounties
B) DoS attackers
C) script kiddies
D) black marketers
سؤال
Traditional hackers often focused on embarrassing a victim.
سؤال
The act of implementing an attacker's exploit is called "spoofing the host."
سؤال
A distributed denial-of-service attach is the most common type of DoS attack.
سؤال
Script kiddies are typically hacker experts.
سؤال
________ are the most common external attacker who attack to make money illegally.

A) Hackers
B) Career criminal
C) Script kiddies
D) IT or security employer
سؤال
________ programs reward researchers for finding vulnerabilities.

A) Transshipper
B) APT
C) Black-market website
D) Bug bounty
سؤال
________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.

A) An APT
B) A black-market websites
C) A bug bounty
D) Carding
سؤال
Credit card theft is also known as ________.

A) extortion
B) click fraud
C) bug bounty
D) carding
سؤال
Which of the following is considered more serious than credit card number theft?

A) Bank account theft
B) Carding
C) Spoofing
D) Click fraud
سؤال
Which of the following is likely the most common criminal attack on individuals?

A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam
سؤال
Most black markets deal in credit card and identity information.
سؤال
Black-market websites are websites that offer stolen consumer information.
سؤال
In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.
سؤال
Black-market website programs reward researchers for finding vulnerabilities within their computer systems.
سؤال
Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.
سؤال
A company's website and Facebook pages may divulge information that competitors may seek out. This is known as ________.

A) public intelligence gathering
B) spoofing
C) bug bounty
D) carding
سؤال
Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?

A) China
B) Russia
C) Iran
D) United States
سؤال
Illegally stealing a company's trade secrets is known as trade secret espionage.
سؤال
Commercial espionage is limited to corporate competitors.
سؤال
Cyberwar consists of computer-based attacks made by ________.

A) multinational corporations
B) state, regional, and local governments
C) national governments
D) private citizens
سؤال
In cyberterror, attackers are typically ________.

A) terrorists or groups of terrorists
B) national governments
C) large multinational corporations
D) Russian and/or Chinese citizens
سؤال
Russia, China, and Iran are quite active in cyberwar espionage.
سؤال
It is most common for cyberterrorists to recruit through face-to-face means.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: The Threat Environment
1
Methods that security professionals use to try to stop threats include all of the following EXCEPT ________.

A) safeguards
B) countermeasure
C) protections
D) breaches
breaches
2
Costs for all threats is increasing annually.
True
3
Detective countermeasures is considered one of the security goals of computer staff.
False
4
A ________ happens when an unauthorized person is able to view, alter, or steal secured data.

A) countermeasure
B) data breach
C) safeguard
D) compromise
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
5
More than ________ records were stolen in 2018.

A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is true about data breaches in 2018?

A) It's likely that half of all Americans lost their records at least one time in 2018.
B) It's likely that nearly everyone lost their records at least one time in 2018.
C) More than 12 billion people lost their records in 2018.
D) Slightly less than half of the world's population lost their records at least once in 2018.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
7
Indirect costs due to data breaches are estimated to be:

A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
8
The chances of an organization having a data breach over the next two years is approximately ________.

A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is NOT a direct cost of a major data breach?

A) Loss of reputation
B) Notification costs
C) Legal fees
D) Detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following companies experienced the largest data breach in history in 2016?

A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
11
When a data breach occurs, hackers are primarily looking for ________.

A) personal and business addresses
B) access to systems
C) personally identifiable information
D) cash and credit card numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
12
Stolen information is commonly used for ________.

A) credit card fraud
B) identity theft
C) false claims
D) data mismanagement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is typically considered the first step in protecting your company from data breaches?

A) Locking up your data to prevent data breaches
B) Understanding how data breaches happen
C) Purchasing software to prevent data breaches
D) Hiring a qualified data security team
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
14
Data from Target customers was stolen ________.

A) online
B) from point-of-sale (POS) systems
C) primary by internal hackers, mostly employees
D) through employee extortion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
15
Attackers in the Target data breach used malware and then used ______ or ______ to infect a Target third party vendor.

A) spear phishing; sabotage
B) hacking; sabotage
C) spear phishing; a targeted phishing attack
D) viruses; worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is Trojan.POSRAM in regard to Target's data breach?

A) Employee sabotage
B) Malware
C) A virus
D) A worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
17
The Target data breach helped impact a shift from swipe cards to ________.

A) EMV-compliant smart cards
B) POS systems
C) keystroke logger
D) rootkits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
18
One of the long-lasting effects of the data breach to Target was ________.

A) loss of money
B) loss of customer confidence
C) loss of merchandise
D) employee dissatisfaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
19
Data breaches are rarely costly to a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
20
Data breaches are always the result of hackers in distant locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
21
Indirect cost related to data breaches average an addition $10 million per incident in the U.S.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
22
There is about a one in four chance that your organization will experience a data breach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
23
More than 67 percent of data breaches come from hackers trying to make money.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
24
Rogue internal employees typically have a more difficult time stealing data than do external hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Target data breach affected 30 percent of the population of the U.S.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
26
Trojan.POSRAM is a variant of the ILOVEYOU virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
27
Hackers sold stolen credit card information gained from the Target breach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is FALSE about employees being considered dangerous in regard to security?

A) Employees usually have extensive knowledge of systems.
B) Employees often have the credentials needed to access sensitive parts of systems.
C) Companies generally have little trust in their employees.
D) Employees know corporate control mechanisms and so often know how to avoid detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
29
________ are considered the most dangerous of all employees.

A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is considered a trade secret?

A) Product formulations
B) Patents
C) Trade names
D) Trademarks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
31
Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
32
If you are explicitly or implicitly allowed to use the resources that you're accessing on a company computer, you have authorization to do so.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
33
Copyrights and patents are known as trade secrets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
34
Contract workers can also be considered a threat to a business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
35
________ are spread through e-mail with infected attachments.

A) Viruses
B) Worms
C) Direct-propagation worms
D) Distributed denial-of-service (DDoS) attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
36
________ take advantage of vulnerabilities in software.

A) Direct-propagation worms
B) Trojan horses
C) Blended threats
D) Bots
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is a payload?

A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is FALSE about rootkits?

A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
39
Worms and viruses act much in the same way in how they propagate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
40
Nonmobile malware can be carried to a system as part of a payload.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
41
Cookies are small text strings stored on your own personal computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
42
Most traditional external attackers were primarily motivated by ________.

A) the thrill of breaking in
B) making money through crime
C) stealing personal identity data
D) capturing thousands and thousands of credit card numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
43
Sending packets with false IP source addresses is known as ________.

A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
44
When a hacker sends a first round of probe packets to find hosts that are active, the attacker is sending ________ probes.

A) IP address scanning
B) a chain of attack
C) piggybacking
D) IP address spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
45
In a DoS attack, the botmaster is also known as a ________.

A) handler
B) hacker
C) hoax
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
46
Skilled hackers have dubbed a new type of hacker that is less sophisticated as ________.

A) Bug bounties
B) DoS attackers
C) script kiddies
D) black marketers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
47
Traditional hackers often focused on embarrassing a victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
48
The act of implementing an attacker's exploit is called "spoofing the host."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
49
A distributed denial-of-service attach is the most common type of DoS attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
50
Script kiddies are typically hacker experts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
51
________ are the most common external attacker who attack to make money illegally.

A) Hackers
B) Career criminal
C) Script kiddies
D) IT or security employer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
52
________ programs reward researchers for finding vulnerabilities.

A) Transshipper
B) APT
C) Black-market website
D) Bug bounty
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.

A) An APT
B) A black-market websites
C) A bug bounty
D) Carding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
54
Credit card theft is also known as ________.

A) extortion
B) click fraud
C) bug bounty
D) carding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is considered more serious than credit card number theft?

A) Bank account theft
B) Carding
C) Spoofing
D) Click fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following is likely the most common criminal attack on individuals?

A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
57
Most black markets deal in credit card and identity information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
58
Black-market websites are websites that offer stolen consumer information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
59
In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
60
Black-market website programs reward researchers for finding vulnerabilities within their computer systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
61
Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
62
A company's website and Facebook pages may divulge information that competitors may seek out. This is known as ________.

A) public intelligence gathering
B) spoofing
C) bug bounty
D) carding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?

A) China
B) Russia
C) Iran
D) United States
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
64
Illegally stealing a company's trade secrets is known as trade secret espionage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
65
Commercial espionage is limited to corporate competitors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
66
Cyberwar consists of computer-based attacks made by ________.

A) multinational corporations
B) state, regional, and local governments
C) national governments
D) private citizens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
67
In cyberterror, attackers are typically ________.

A) terrorists or groups of terrorists
B) national governments
C) large multinational corporations
D) Russian and/or Chinese citizens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
68
Russia, China, and Iran are quite active in cyberwar espionage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
69
It is most common for cyberterrorists to recruit through face-to-face means.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.