1. Which of the following would NOT be considered an example of cyber terrorism?
a. An attack on a system for personal gain
b. An attack with the purpose of gaining publicity
c. Giving out disinformation
d. Changing the content of a Web page
2. What type of system is typically involved in a low-security/low priority attack that still causes significant problems?
a. Economic
b. general
c. military
d. cyber
3. Which of the following would be a form of cyber terrorism?
a. Economic damage
b. Disruption in communication
c. Disruption in supply lines
d. All of the above are correct
4. If an attacker was to destroy data, it would be a form of:
a. general attack
b. cyber espionage.
c. economic attack
d. information warfare.
5. A popular business download that contains motivational slogans could
a. collect credit card information
b. create distributed Denial of Service attacks.
c. footprint major bank systems
d. delete key system files
6. If a hacker wanted to perform a successful attack on a military or government system, the ____________ system would be an easy target.
a. NORAD
b.NSA
c. military satellite
d. military logistical
7. As a general attack, which of the following would be difficult to combat?
a. Unfocused virus attacks that have no specific target on the Internet
b. Denial of Service attacks on airline systems
c. Virus attacks on state police criminal networks
d. Denial of Service attacks on NYSE
8. ____________ is NOT an element contained in information warfare.
a. Propaganda
b. Global economics
c. Information control
d. Disinformation
9. An Internet Usenet Newsgroup that is connected to a political activist group would perform the following action in information warfare.
a. Send secret messages to group members
b. Spread propaganda
c. Spy on those who subscribe to the group
d. All of the above are correct.
10. What is the main goal of disinformation?
a. Transmit wrong information for anyone to read or hear
b. Transmit weakly encrypted wrong information for anyone to read or hear
c. Transmit weakly encrypted correct information to make it look as if it is wrong
d. Transmit information that has a dual meaning to confuse the reader or listener
11.
Who posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites?
a. Russian hacktivists during the Kosovo conflict
b. Chinese hacktivists after the bombing of the Chinese Embassy
c. Tamil guerrillas during the Sri Lanka unrest
d. White supremacist hacker angry at his ISP provider
Dear Student,
As per the answering guidelines, I cannot answer every question. Hope You Understand!
Please have a look at the image below :
Hope This Helps.
All The Best
Get Answers For Free
Most questions answered within 1 hours.