Quiz 3: Cyberwarfare and International Conflicts Quiz Answers

Quiz 3 Cyberwarfare and International Conflicts Quiz Answers


International Cyber Conflicts 
The State University of New York


Hello Friends in this article i am gone to share Coursera Course: International Cyber Conflicts | Quiz 3: Cyberwarfare and International Conflicts Quiz Answers with you..

Quiz 3: Cyberwarfare and International Conflicts Quiz Answers


Question 1)
Since 1999 cyber attacks have caused large-scale injury, loss of life and destruction of property.
  • True
  • False

Question 2)
Identify the item which has NOT been recognized as a mode of cyberwarfare attack and activity.
  • Disruption of services
  • Physical system attacks
  • Social media and propaganda
  • Information gathering and espionage
  • None of the above

Question 3)
The countries who conduct powerful cyber attacks are:
  • China and U.S.
  • U.S. and Russia
  • Russia and China
  • All of the above

Question 4)
What’s the current level of threat of cyber attack of terrorist activity, aka cyber terrorism?
  • Cyber terrorism threat is somewhat likely
  • Cyber terrorism threat has been largely unfounded
  • Cyber terrorism often happened in the past but no longer a big issue
  • Cyber terrorism threat is extremely likely and dangerous

Question 5)
What’s an example of a real event for an activity of non-state actors?
  • Groups of thugs in Egypt using cyber attacks on Tunisia
  • Citizens in Russia working to attack computers in Estonia
  • Bank personel in China using computers to attack Australia
  • None of the above

Question 6)
There are a defined set of cyber attack characteristics that can clearly identify the different types of actor motivations.
  • True
  • False

Question 7)
A 2009 attack on more than 30 companies including Google and Yahoo stealing intellectual property was attributed to Taiwan. Where were the hackers traced back to?
  • U.S.
  • Turkey
  • China
  • Iran
  • Estonia

Question 8)
___________ of infrastructure means a failure in one element could cause cascading failures on multiple _____________ infrastructure components.

Choose the BEST set of terms to complete the phrase above:
  • association; cyber
  • criticality; complex
  • internet; cyber
  • interdependence; critical
  • comparability; internet

Question 9)
Techniques for censoring information include the following, except:
  • IT blocking
  • DNS filtering
  • Web feed blocking
  • URL and packet filtering

Question 10)
__________ are machines connected to the Internet who have been infected by a virus or spyware and may be used by others to cause damage to any computer or networks, including by “denial of service attacks” where multiple __________ can suck up the resources of certain critical computers connected to the Internet.
  • Modems, IPs
  • Bot nets; bots
  • Trojans; viruses
  • Computers; spams


Post a Comment

0 Comments