CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

University

15 Qs

quiz-placeholder

Similar activities

Latihan Bab 4 Jaringan Komputer dan Internet

Latihan Bab 4 Jaringan Komputer dan Internet

12th Grade - University

20 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

cyber awareness

cyber awareness

University

20 Qs

Css

Css

University

10 Qs

Cyber Attribution Quiz

Cyber Attribution Quiz

University

10 Qs

CBY 207 Module 1 -Quiz1

CBY 207 Module 1 -Quiz1

University

10 Qs

Quiz prima lezione Gioia Tauro

Quiz prima lezione Gioia Tauro

University

11 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

Assessment

Quiz

Computers

University

Medium

Created by

Karen Diggs

Used 24+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the FBI, what is the premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents?

Cyber terrorism

Ecoterrorism

Cyberespionage

Propaganda

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to ISight Partners, a cyber intelligence firm, in 2014 hackers from which country were spying on computers used in NATO and the European Union?

Russia

Latvia

Lithuania

Estonia

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus specifically designed for espionage, first appeared in 2012 and targeted Windows operating systems. What is its name?

Stuxnet

Flame

BlackEnergy

FinFisher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) attack on data can include stealing or destroying data. What type of attack is it?

Money center

Memory

Economic

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virus that infected Iranian nuclear facilities was exploiting a vulnerability in SCADA systems?

MyDoom

Stuxnet

FinFisher

Flame

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any attempt to manipulate information in pursuit of a military or political goal is known as what?

Cyber terrorism

Economic terrorism

Information warfare

Disinformation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The _____ War was the first modern war in which there was strong and widespread domestic opposition. Which war is being referred to?

Korean

Persian Gulf

Iraqi

Vietnam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?