Deck 7: Online Extremism, Cyberterror, and Cyberwarfare
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
Play
Full screen (f)
Deck 7: Online Extremism, Cyberterror, and Cyberwarfare
1
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?
A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
C
2
Which of the following is not a way that extremist groups use the Internet?
A) humor
B) recruitment
C) indoctrination
D) communications
A) humor
B) recruitment
C) indoctrination
D) communications
A
3
Which of the following types of media have not been used by extremist groups to promote their agenda?
A) video games
B) music
C) magazines
D) none of the above
A) video games
B) music
C) magazines
D) none of the above
D
4
Which of the following forms of attack are commonly used by groups to disable websites and online services?
A) denial of service
B) web defacements
C) malware
D) phishing
A) denial of service
B) web defacements
C) malware
D) phishing
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?
A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?
A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?
A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?
A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?
A) cyberwar
B) information warfare
C) physical attacks
D) none of these
A) cyberwar
B) information warfare
C) physical attacks
D) none of these
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck