CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

University

15 Qs

quiz-placeholder

Similar activities

Information Assurance Final Quiz

Information Assurance Final Quiz

University

15 Qs

Ice Break 2

Ice Break 2

University

10 Qs

Cyber Attribution Quiz

Cyber Attribution Quiz

University

10 Qs

Latihan Bab 4 Jaringan Komputer dan Internet

Latihan Bab 4 Jaringan Komputer dan Internet

12th Grade - University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

Komputer Masyarakat IF VI-E

Komputer Masyarakat IF VI-E

University

10 Qs

Safe Net - Consciencialização cyber-segurança

Safe Net - Consciencialização cyber-segurança

University

11 Qs

Kelas Maya (AKL 1)

Kelas Maya (AKL 1)

University

10 Qs

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

Assessment

Quiz

Computers

University

Medium

Created by

Karen Diggs

Used 24+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the FBI, what is the premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents?

Cyber terrorism

Ecoterrorism

Cyberespionage

Propaganda

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to ISight Partners, a cyber intelligence firm, in 2014 hackers from which country were spying on computers used in NATO and the European Union?

Russia

Latvia

Lithuania

Estonia

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus specifically designed for espionage, first appeared in 2012 and targeted Windows operating systems. What is its name?

Stuxnet

Flame

BlackEnergy

FinFisher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) attack on data can include stealing or destroying data. What type of attack is it?

Money center

Memory

Economic

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virus that infected Iranian nuclear facilities was exploiting a vulnerability in SCADA systems?

MyDoom

Stuxnet

FinFisher

Flame

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any attempt to manipulate information in pursuit of a military or political goal is known as what?

Cyber terrorism

Economic terrorism

Information warfare

Disinformation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The _____ War was the first modern war in which there was strong and widespread domestic opposition. Which war is being referred to?

Korean

Persian Gulf

Iraqi

Vietnam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?