Deck 15: Cyber Conflict in the Age of Great Power Competition, Ryan C Maness, Rebecca Lorentz, and Brandon Valerian
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 15: Cyber Conflict in the Age of Great Power Competition, Ryan C Maness, Rebecca Lorentz, and Brandon Valerian
1
Which of the following is not part of Beijing's triadic approach to information control?
A) The Great Firewall
B) The Great Cannon
C) The Great Spear
D) The Social Credit System
A) The Great Firewall
B) The Great Cannon
C) The Great Spear
D) The Social Credit System
C
2
Cyber space includes which of the following?
A) The Internet
B) Cellular technologies
C) Space-based communications
D) All the options given are correct.
A) The Internet
B) Cellular technologies
C) Space-based communications
D) All the options given are correct.
D
3
Which of the following is not one of the three layers of cyber space?
A) The physical layer
B) The syntactic layer
C) The psychological layer
D) The cognitive layer
A) The physical layer
B) The syntactic layer
C) The psychological layer
D) The cognitive layer
C
4
According to chapter 16, adversarial attempts to influence social behaviour, including voting behaviour and security strategies, are most effective when they take advantage of…
A) attribution errors.
B) the availability heuristic.
C) confirmation bias.
D) All these answers are correct.
A) attribution errors.
B) the availability heuristic.
C) confirmation bias.
D) All these answers are correct.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Multinational corporations do much of the work in addressing cyber violations and mitigating the impact of serious malware attacks and are legally allowed to 'hack back' against aggressors.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Cyber war is defined in this chapter as 'the use of digital technologies in military interactions or military affairs in the realm of international relations'.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
As of 2021, the beginnings of a new strategy called 'layered cyber deterrence' were emerging in…
A) Russia.
B) China.
C) the United States.
D) North Korea.
A) Russia.
B) China.
C) the United States.
D) North Korea.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
More than half of all cyber operations take the form of espionage or intelligence operations that focus on the collection of information from and the dissemination of messages to adversaries.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
China's cyber strategy against the United States and other democracies has largely consisted of digital espionage that is mainly intended to steal intellectual property.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
Online radicalization is, in part, a product of the human tendency towards confirmation bias exacerbated by social media algorithms which push belief-affirming and often highly biased content to users.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck

