International Cyber Conflicts
The State University of New York
Go to this Course: International Cyber Conflicts
Hello Friends in this article i am gone to share Coursera Course: International Cyber Conflicts | Quiz 3: Cyberwarfare and International Conflicts Quiz Answers with you..
Quiz 3: Cyberwarfare and International Conflicts Quiz Answers
Question 1)
Since 1999 cyber attacks have caused large-scale injury, loss of life and destruction of property.
- True
- False
Question 2)
Identify the item which has NOT been recognized as a mode of cyberwarfare attack and activity.
- Disruption of services
- Physical system attacks
- Social media and propaganda
- Information gathering and espionage
- None of the above
Question 3)
The countries who conduct powerful cyber attacks are:
- China and U.S.
- U.S. and Russia
- Russia and China
- All of the above
Question 4)
What’s the current level of threat of cyber attack of terrorist activity, aka cyber terrorism?
- Cyber terrorism threat is somewhat likely
- Cyber terrorism threat has been largely unfounded
- Cyber terrorism often happened in the past but no longer a big issue
- Cyber terrorism threat is extremely likely and dangerous
Question 5)
What’s an example of a real event for an activity of non-state actors?
- Groups of thugs in Egypt using cyber attacks on Tunisia
- Citizens in Russia working to attack computers in Estonia
- Bank personel in China using computers to attack Australia
- None of the above
Question 6)
There are a defined set of cyber attack characteristics that can clearly identify the different types of actor motivations.
- True
- False
Question 7)
A 2009 attack on more than 30 companies including Google and Yahoo stealing intellectual property was attributed to Taiwan. Where were the hackers traced back to?
- U.S.
- Turkey
- China
- Iran
- Estonia
Question 8)
___________ of infrastructure means a failure in one element could cause cascading failures on multiple _____________ infrastructure components.
Choose the BEST set of terms to complete the phrase above:
- association; cyber
- criticality; complex
- internet; cyber
- interdependence; critical
- comparability; internet
Question 9)
Techniques for censoring information include the following, except:
- IT blocking
- DNS filtering
- Web feed blocking
- URL and packet filtering
Question 10)
__________ are machines connected to the Internet who have been infected by a virus or spyware and may be used by others to cause damage to any computer or networks, including by “denial of service attacks” where multiple __________ can suck up the resources of certain critical computers connected to the Internet.
- Modems, IPs
- Bot nets; bots
- Trojans; viruses
- Computers; spams
0 Comments