Deck 7: Online Extremism, Cyberterror, and Cyberwarfare

Full screen (f)
exit full mode
Question
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?

A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is not a way that extremist groups use the Internet?

A) humor
B) recruitment
C) indoctrination
D) communications
Question
Which of the following types of media have not been used by extremist groups to promote their agenda?

A) video games
B) music
C) magazines
D) none of the above
Question
Which of the following forms of attack are commonly used by groups to disable websites and online services?

A) denial of service
B) web defacements
C) malware
D) phishing
Question
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?

A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
Question
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?

A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
Question
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?

A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
Question
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?

A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
Question
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?

A) cyberwar
B) information warfare
C) physical attacks
D) none of these
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Online Extremism, Cyberterror, and Cyberwarfare
1
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?

A) black hat hacking
B) noobing
C) hacktivism
D) flash mob
C
2
Which of the following is not a way that extremist groups use the Internet?

A) humor
B) recruitment
C) indoctrination
D) communications
A
3
Which of the following types of media have not been used by extremist groups to promote their agenda?

A) video games
B) music
C) magazines
D) none of the above
D
4
Which of the following forms of attack are commonly used by groups to disable websites and online services?

A) denial of service
B) web defacements
C) malware
D) phishing
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?

A) Kevin Mitnick
B) Yousef Al-Adzin
C) Youni Tsoulis
D) none of the above
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?

A) Code-Red
B) Stuxnet
C) Cryptolocker
D) LOIC
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?

A) The Copyright Act
B) The Digital Millenium Copyright Act
C) The Identity Theft Assumption and Deterrence Act
D) The PATRIOT Act
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?

A) Centre for the Protection of National Infrastructure
B) National Security Agency
C) Department of Homeland Security
D) Action Fraud Centre
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?

A) cyberwar
B) information warfare
C) physical attacks
D) none of these
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 9 flashcards in this deck.