CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

University

15 Qs

quiz-placeholder

Similar activities

CBY 207 Module 1 -Quiz1

CBY 207 Module 1 -Quiz1

University

10 Qs

First Meeting: Industri 4.0

First Meeting: Industri 4.0

University

10 Qs

Just Drill

Just Drill

1st Grade - Professional Development

15 Qs

SEES Game Night 1

SEES Game Night 1

University

16 Qs

Quiz Visiting Lecture Keamanan dan Privasi

Quiz Visiting Lecture Keamanan dan Privasi

University

10 Qs

Literasi Digital 1

Literasi Digital 1

University

20 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cyber Security Incident Report Quiz

Cyber Security Incident Report Quiz

University

17 Qs

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

Assessment

Quiz

Computers

University

Medium

Created by

Karen Diggs

Used 24+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the FBI, what is the premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents?

Cyber terrorism

Ecoterrorism

Cyberespionage

Propaganda

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to ISight Partners, a cyber intelligence firm, in 2014 hackers from which country were spying on computers used in NATO and the European Union?

Russia

Latvia

Lithuania

Estonia

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus specifically designed for espionage, first appeared in 2012 and targeted Windows operating systems. What is its name?

Stuxnet

Flame

BlackEnergy

FinFisher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) attack on data can include stealing or destroying data. What type of attack is it?

Money center

Memory

Economic

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virus that infected Iranian nuclear facilities was exploiting a vulnerability in SCADA systems?

MyDoom

Stuxnet

FinFisher

Flame

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any attempt to manipulate information in pursuit of a military or political goal is known as what?

Cyber terrorism

Economic terrorism

Information warfare

Disinformation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The _____ War was the first modern war in which there was strong and widespread domestic opposition. Which war is being referred to?

Korean

Persian Gulf

Iraqi

Vietnam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?