Search Header Logo

International Law in Cyberspace

Authored by Ajay Shriram Kushwaha

Computers

University

Used 7+ times

International Law in Cyberspace
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When did the first cyber attack occur?

1834

1988

2000

2012

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When did cyberspace become a medium of business and a warfare domain?

Late 1980s

Early 1990s

Early 2000s

Late 2000s

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What were the modest developments in international law regarding cybercrime in the early 2000s?

Convention on Cybercrime

Additional Protocol to the Convention on Cybercrime

Both A and B

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did the 2012 U.N. Group of Governmental Experts conclude regarding the application of international law to State activity in cyberspace?

International law does not apply in cyberspace

International law applies in cyberspace

International law applies only to non-State actors in cyberspace

International law applies only to cyber warfare

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did the Tallinn Manual 1.0 provide?

A collection of personal views on international law in cyberspace

A framework for understanding how international law applies in cyberspace

A set of rules for cyber warfare

A guide for cyber criminals

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What did the 2015 U.N. Group of Governmental Experts affirm regarding the application of the U.N. Charter to State activity in cyberspace?

The U.N. Charter does not apply to State activity in cyberspace

The U.N. Charter applies only to non-State actors in cyberspace

The U.N. Charter applies to State activity in cyberspace

The U.N. Charter applies only to cyber warfare

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Brian Egan, when does a cyber operation constitute an attack in the context of an armed conflict?

When it causes any effect on the targeted system

When it causes kinetic effects on the targeted system

When it causes non-kinetic effects on the targeted system

When it causes significant effects on the targeted system

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?