International Cyber Conflicts
The State University of New York
Go to this Course: International Cyber Conflicts
Hello Friends in this article i am gone to share Coursera Course: International Cyber Conflicts | Quiz 4: Cyberwarfare and International Law Quiz Answers with you..
Quiz 4: Cyberwarfare and International Law Quiz Answers
Question 1)
What does the terminology jus ad bellum refer to?
- Laws adopted in the East and West for cyber warfare
- Principles that can be used to justify going to war
- Principles used to include laws of war into cyber security
- Acronym that identifies specific international war treaties
Question 2)
Jus ad bellum principles are included in the following document:
- United Nations Charter
- Rights to go to War Law
- Humanitarian Law of the UN
- International Arms Conflict Law
- Laws of International Conflicts
Question 3)
International Humanitarian Law prohibits countries from deciding to enter a war that causes considerable damage.
- True
- False
Question 4)
One of the main issues with cyberwarfare is that there is _____________ in the _____________ of attacks.
- data theft; minority
- simplicity; majority
- espionage; majority
- ambiguity; attribution
Question 5)
Select the types of attacks in which attribution has been a prevalent problem:
- Attacks through the Internet
- Attacks breaking confidence building measures
- Cyberterrorist attacks on critical infrastructure
- Attacks through malware preloaded in hardware/software
- None of the above
Question 6)
What is an important reason for difficulties in international agreement on cyber security?
- Different definitions of crime
- Lack of agreement on data access
- Differences in legal norms
- Jourisdicational boundaries and sovereingty
- All of the above
Question 7)
What is the main point of contention regarding the Council of Europe Convention on Cybercrime?
- Cooperation to address attacks over country lines
- Computer and data access for countries across jurisdictional lines
- The inclusion of Russia and Japan as potential disruptors for the agreement
- None of the above
Question 8)
Although attribution it is difficult, style of coding, hints about original language of hackers, purpose of attack and other analytical techniques allow us to make good educated guesses about source of attacks.
- True
- False
Question 9)
Below are typical actions to establish Confidence Building Measures, except:
- Communication mechanisms
- Free movement of citizens
- Exchange of personnel and joint exercises
- Establishing prohibited weapons/targets
- Exchange of information about assets
Question 10)
All below are types of measures that can be used for confidence building, except:
- Constraint
- Verification
- Juridification
- Communication
- Transparency
0 Comments