Thursday, May 19, 2016

Cyber Conflicts: Quiz 3 - Cyberwarfare and International Conflicts

This week quiz is also very simple and easy to comprehend and answer. However, if you require any suggestion or help about how to answer do mention in the comment and I will help with that.


1. Since 1999 cyber attacks have caused large-scale injury, loss of life and destruction of property.
  • True
  • False
2. Identify the item which has NOT been recognized as a mode of cyberwarfare attack and activity.
  • Information gathering and espionage
  • Disruption of services
  • Physical system attacks
  • Social media and propaganda
  • None of the above
3. The countries who conduct powerful cyber attacks are:
  • Russia and China
  • China and U.S.
  • U.S. and Russia
  • All of the above


4. What's the current level of threat of cyber attack of terrorist activity, aka cyber terrorism?
  • Cyber terrorism threat has been largely unfounded
  • Cyber terrorism threat is somewhat likely
  • Cyber terrorism threat is extremely likely and dangerous
  • Cyber terrorism often happened in the past but no longer a big issue
5. What's an example of a real event for an activity of non-state actors?
  • Citizens in Russia working to attack computers in Estonia
  • Bank personel in China using computers to attack Australia
  • Groups of thugs in Egypt using cyber attacks on Tunisia
  • None of the above
6. There are a defined set of cyber attack characteristics that can clearly identify the different types of actor motivations.
  • False
  • True
7. A 2009 attack on more than 30 companies including Google and Yahoo stealing intellectual property was attributed to Taiwan. Where were the hackers traced back to?
  • Taiwan
  • China
  • U.S.
  • Russia
  • Iran


8. ___________ of infrastructure means a failure in one element could cause cascading failures on multiple _____________ infrastructure components.

Choose the BEST set of terms to complete the phrase above:
  • interdependence; critical
  • association; cyber
  • criticality; complex
  • internet; cyber
  • comparability; internet
9. Techniques for censoring information include the following, except:
  • IT blocking
  • URL and packet filtering
  • Web feed blocking
  • DNS filtering
10. __________ are machines connected to the Internet who have been infected by a virus or spyware and may be used by others to cause damage to any computer or networks, including by "denial of service attacks" where multiple __________ can suck up the resources of certain critical computers connected to the Internet.
  • Modems, IPs
  • Bot nets; bots
  • Trojans; viruses
  • Computers; spams

20 comments:

  1. Hi! Can u send me all answers for all Cyber Conflicts: Quiz? Merci! mr.myth @ bk.ru

    ReplyDelete
  2. Can you please post the answers as well??

    ReplyDelete
  3. Providing all the answers directly is not what I intend to do. But if you are looking for specific answers we can discuss here. Thank you for your comments.

    ReplyDelete
    Replies
    1. I have already worked on the answers. I just want to verify it.

      Delete
    2. Great. Let's discuss then :)

      Delete
    3. 1. Since 1999 cyber attacks have caused large-scale injury, loss of life and destruction of property
      .false

      3. The countries who conduct powerful cyber attacks are:
      All of the above
      4. What's the current level of threat of cyber attack of terrorist activity, aka cyber terrorism?
      Cyber terrorism threat has been largely unfounded
      5:What's an example of a real event for an activity of non-state actors?
      Citizens in Russia working to attack computers in Estonia
      6. There are a defined set of cyber attack characteristics that can clearly identify the different types of actor motivations.

      False
      7. A 2009 attack on more than 30 companies including Google and Yahoo stealing intellectual property was attributed to Taiwan. Where were the hackers traced back to?
      .china
      8. ___________ of infrastructure means a failure in one element could cause cascading failures on multiple _____________ infrastructure components.

      Choose the BEST set of terms to complete the phrase above:
      .interdependence; critical
      9. Techniques for censoring information include the following, except:

      IT blocking

      10. __________ are machines connected to the Internet who have been infected by a virus or spyware and may be used by others to cause damage to any computer or networks, including by "denial of service attacks" where multiple __________ can suck up the resources of certain critical computers connected to the Internet.

      Bot nets; bots




      Delete
    4. this are exactly crrt answrs with 100% i tried them

      Delete
  4. 2. Identify the item which has NOT been recognized as a mode of cyberwarfare attack and activity.
    . None of the above

    ReplyDelete
  5. WINTER OLYMPICS GETS HACKED As the news of the Winter Olympics cyber-attack broke and the official website was taken offline, OSAC (Overseas Security Advisory Council) has put out this advice on how to take precautions against cyber-attacks that is useful for us all.

    ReplyDelete
  6. This comment has been removed by the author.

    ReplyDelete
  7. What a sensational blog! This blog is too much amazing in all aspects. Especially, it looks awesome and the content available on it is utmost qualitative. Network Security Provider in Toronto

    ReplyDelete
  8. Grateful for sharing, for instance, basic information, Its help me to get a handle on about bleeding edge security. Actually, it wires traces in a general sense contrasting with controlled best cyber security services. Its other than give you extraordinary information about Cybersecurity, cloud collecting, cloud courses of action.

    ReplyDelete
  9. creativity of writer is purely impressive. It has touched to the level of expertise with his writing. Everything is up to the mark. Written perfectly and I can use such information for my coming assignment.cursus fotografie amsterdam

    ReplyDelete
  10. The writer of this blog is really very professional. Every single line of this article is well written. New use of vocabulary is a great effort. At the same time tense, indirect speech was also sued in good manner.
    online oncology courses

    ReplyDelete
  11. hor kive ho saare

    ReplyDelete
  12. These are degrees you can get from the comfort of your home. These are perfect for busy professionals or those looking to change careers. cyber security course in hyderabad

    ReplyDelete
  13. Each device has a unique IP address that allows devices to find each other on a network and to exchange data packets. 198.168.0.1 Password Change

    ReplyDelete