Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Cyberspace Cybersecurity and Cybercrime
Quiz 5: Threats to Cybersecurity by Hacktivists and Nation States
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
______ typically work independently to expose security vulnerabilities or practices that endanger individuals' private data.
Question 22
True/False
The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."
Question 23
True/False
Advanced hackers are typically motivated by financial or political goals.
Question 24
True/False
International threats are those that originate from inside the company or organization.
Question 25
True/False
Insiders are people who are current or former employees of a company, contractors, or friends of employees.
Question 26
Multiple Choice
All of the following are examples of social engineering except ______.
Question 27
True/False
Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.
Question 28
Essay
Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?
Question 29
Essay
Identify and explain international threats and the three main forms associated with those threats. Are there any recent examples of international threats that fall within the three forms?
Question 30
True/False
National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.
Question 31
True/False
Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.
Question 32
Multiple Choice
Which of the following laws does not apply to hackers?
Question 33
True/False
Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.
Question 34
Multiple Choice
Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.
Question 35
Essay
Explain displeasure with the government and why groups such as Anonymous launch cyberattacks. Why do they launch cyberattacks? Do you agree with the work of such hacktivist groups? Why or why not?