Homeland Security Chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is defined as the "creation, access, modification, and destruction of information"?

Processing

Which of the following is series of national-level exercise focused on cybersecurity?

Protect 2050

The attack on which of the following companies marked a change in the nature of cyberthreats against individuals and private sector organizations?

Sony

Which of the following involves making one's email appear like one that would be trusted by the target of a phishing scheme?

Spoofing

Which of the following Federal agencies provides information dedicated to preparing US citizens for terrorist attacks?

All of the above

Which of the following is considered a source of critical infrastructure risk?

All of the above

Which of the following is defined as "the use or destruction of computing or information technology resources aimed at harming, coercing, or intimidating others in order to achieve a greater political or ideological goal"?

All of the above

A person who controls bots is called which of the following?

Bot Herder

The Edward Snowden leaks exposed US programs to conduct which of the following?

Cyberespionage

Which of the following terms is defined by US-CERT to be, "The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation"?

Cybersecurity

Which of the following is defined as "the global network of information technology infrastructure, inclusive of the internet, the telecom network, systems of servers and computers, electronic control mechanisms, and the embedded processes in microchips and other semiconductors"?

Cyberspace

The Stuxnet Worm is most likely an example of which of the following?

Cyberwarfare

Approximately how many US companies experienced a cyber-breach as reported in 2014?

43.0%

How many critical infrastructure 'sectors' does the National Infrastructure Protection Plan recognize?

16

Which of the following is not one of the five cybersecurity functions identified under the Cybersecurity Framework?

Destroy

Which of the following is not one of the three "clusters" of cyberterrorism?

Exploitive cyberterrorism

Which of the following is considered one of the most destructive and difficult cyberthreats to prevent?

Rogue Insider

Which of the following hacking methods specifically targets databases?

SQL Injection

Which of the following is a "self-organized, self-run, and self-governed private sector council consisting of owners and operators and their representatives, which interact on a wide range of sector-specific strategies, policies, activities, and issues"?

Sector- Coordinating Council

The Second Quadrennial Homeland Security Review identified three factors that explained why cyberspace is particularly difficult to secure. Which of the following is not one of those factors?

The low cost of cyberterrorism

Which of the following is a malicious program disguised to look like a useful program, which the user knowingly installs on their device, and that manipulates the manner in which a device's operating system functions?

Trojan Horse


संबंधित स्टडी सेट्स

Energy change in chemical reactions

View Set

[COM 102] Week 1: What Is Interpersonal Communication? (Reflect & Relate 4 ed. McCormack)

View Set

Micro Final- Exam 3, Exam 2, Exam 1, Exam 4

View Set

Chapter 26: Soft-Tissue Injuries

View Set

Retirment and other life insurance concepts

View Set

Business Law Exam 1 (Chapter 1-6)

View Set

2/1 El presente perfecto regular

View Set

CM 113 Chapter 12 Quiz Questions

View Set

Moudule 11~lesson 1 South America🍍🍦📖

View Set