1. Since 1999 cyber attacks have caused large-scale injury, loss of life and destruction of property.
- True
- False
- Information gathering and espionage
- Disruption of services
- Physical system attacks
- Social media and propaganda
- None of the above
- Russia and China
- China and U.S.
- U.S. and Russia
- All of the above
4. What's the current level of threat of cyber attack of terrorist activity, aka cyber terrorism?
- Cyber terrorism threat has been largely unfounded
- Cyber terrorism threat is somewhat likely
- Cyber terrorism threat is extremely likely and dangerous
- Cyber terrorism often happened in the past but no longer a big issue
- Citizens in Russia working to attack computers in Estonia
- Bank personel in China using computers to attack Australia
- Groups of thugs in Egypt using cyber attacks on Tunisia
- None of the above
- False
- True
- Taiwan
- China
- U.S.
- Russia
- Iran
8. ___________ of infrastructure means a failure in one element could cause cascading failures on multiple _____________ infrastructure components.
Choose the BEST set of terms to complete the phrase above:
- interdependence; critical
- association; cyber
- criticality; complex
- internet; cyber
- comparability; internet
- IT blocking
- URL and packet filtering
- Web feed blocking
- DNS filtering
- Modems, IPs
- Bot nets; bots
- Trojans; viruses
- Computers; spams
Hi! Can u send me all answers for all Cyber Conflicts: Quiz? Merci! mr.myth @ bk.ru
ReplyDeleteCan you please post the answers as well??
ReplyDeleteProviding all the answers directly is not what I intend to do. But if you are looking for specific answers we can discuss here. Thank you for your comments.
ReplyDeleteI have already worked on the answers. I just want to verify it.
DeleteGreat. Let's discuss then :)
Delete1. Since 1999 cyber attacks have caused large-scale injury, loss of life and destruction of property
Delete.false
3. The countries who conduct powerful cyber attacks are:
All of the above
4. What's the current level of threat of cyber attack of terrorist activity, aka cyber terrorism?
Cyber terrorism threat has been largely unfounded
5:What's an example of a real event for an activity of non-state actors?
Citizens in Russia working to attack computers in Estonia
6. There are a defined set of cyber attack characteristics that can clearly identify the different types of actor motivations.
False
7. A 2009 attack on more than 30 companies including Google and Yahoo stealing intellectual property was attributed to Taiwan. Where were the hackers traced back to?
.china
8. ___________ of infrastructure means a failure in one element could cause cascading failures on multiple _____________ infrastructure components.
Choose the BEST set of terms to complete the phrase above:
.interdependence; critical
9. Techniques for censoring information include the following, except:
IT blocking
10. __________ are machines connected to the Internet who have been infected by a virus or spyware and may be used by others to cause damage to any computer or networks, including by "denial of service attacks" where multiple __________ can suck up the resources of certain critical computers connected to the Internet.
Bot nets; bots
this are exactly crrt answrs with 100% i tried them
DeleteThanks you^^
Delete100 % working
Delete2. Identify the item which has NOT been recognized as a mode of cyberwarfare attack and activity.
ReplyDelete. None of the above
this is also correct answer
DeleteWINTER OLYMPICS GETS HACKED As the news of the Winter Olympics cyber-attack broke and the official website was taken offline, OSAC (Overseas Security Advisory Council) has put out this advice on how to take precautions against cyber-attacks that is useful for us all.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteWhat a sensational blog! This blog is too much amazing in all aspects. Especially, it looks awesome and the content available on it is utmost qualitative. Network Security Provider in Toronto
ReplyDeleteGrateful for sharing, for instance, basic information, Its help me to get a handle on about bleeding edge security. Actually, it wires traces in a general sense contrasting with controlled best cyber security services. Its other than give you extraordinary information about Cybersecurity, cloud collecting, cloud courses of action.
ReplyDeletecreativity of writer is purely impressive. It has touched to the level of expertise with his writing. Everything is up to the mark. Written perfectly and I can use such information for my coming assignment.cursus fotografie amsterdam
ReplyDeleteThe writer of this blog is really very professional. Every single line of this article is well written. New use of vocabulary is a great effort. At the same time tense, indirect speech was also sued in good manner.
ReplyDeleteonline oncology courses
hor kive ho saare
ReplyDeleteThese are degrees you can get from the comfort of your home. These are perfect for busy professionals or those looking to change careers. cyber security course in hyderabad
ReplyDeleteEach device has a unique IP address that allows devices to find each other on a network and to exchange data packets. 198.168.0.1 Password Change
ReplyDelete