CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

University

15 Qs

quiz-placeholder

Similar activities

BB

BB

University

10 Qs

DWDM-2

DWDM-2

University

20 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

ICT 0513 - Chapter 4 : System Unit

ICT 0513 - Chapter 4 : System Unit

University

15 Qs

Pra UPS 2

Pra UPS 2

University

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

Quiz IT Audit 7 Gabungan

Quiz IT Audit 7 Gabungan

University

10 Qs

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

CNET151 - Chapt 12 - Cyber Terrorism & Information Warfare

Assessment

Quiz

Computers

University

Medium

Created by

Karen Diggs

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the FBI, what is the premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents?

Cyber terrorism

Ecoterrorism

Cyberespionage

Propaganda

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to ISight Partners, a cyber intelligence firm, in 2014 hackers from which country were spying on computers used in NATO and the European Union?

Russia

Latvia

Lithuania

Estonia

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus specifically designed for espionage, first appeared in 2012 and targeted Windows operating systems. What is its name?

Stuxnet

Flame

BlackEnergy

FinFisher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) attack on data can include stealing or destroying data. What type of attack is it?

Money center

Memory

Economic

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virus that infected Iranian nuclear facilities was exploiting a vulnerability in SCADA systems?

MyDoom

Stuxnet

FinFisher

Flame

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any attempt to manipulate information in pursuit of a military or political goal is known as what?

Cyber terrorism

Economic terrorism

Information warfare

Disinformation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The _____ War was the first modern war in which there was strong and widespread domestic opposition. Which war is being referred to?

Korean

Persian Gulf

Iraqi

Vietnam

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?