Homeland Security Chapter 8
Which of the following is defined as the "creation, access, modification, and destruction of information"?
Processing
Which of the following is series of national-level exercise focused on cybersecurity?
Protect 2050
The attack on which of the following companies marked a change in the nature of cyberthreats against individuals and private sector organizations?
Sony
Which of the following involves making one's email appear like one that would be trusted by the target of a phishing scheme?
Spoofing
Which of the following Federal agencies provides information dedicated to preparing US citizens for terrorist attacks?
All of the above
Which of the following is considered a source of critical infrastructure risk?
All of the above
Which of the following is defined as "the use or destruction of computing or information technology resources aimed at harming, coercing, or intimidating others in order to achieve a greater political or ideological goal"?
All of the above
A person who controls bots is called which of the following?
Bot Herder
The Edward Snowden leaks exposed US programs to conduct which of the following?
Cyberespionage
Which of the following terms is defined by US-CERT to be, "The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation"?
Cybersecurity
Which of the following is defined as "the global network of information technology infrastructure, inclusive of the internet, the telecom network, systems of servers and computers, electronic control mechanisms, and the embedded processes in microchips and other semiconductors"?
Cyberspace
The Stuxnet Worm is most likely an example of which of the following?
Cyberwarfare
Approximately how many US companies experienced a cyber-breach as reported in 2014?
43.0%
How many critical infrastructure 'sectors' does the National Infrastructure Protection Plan recognize?
16
Which of the following is not one of the five cybersecurity functions identified under the Cybersecurity Framework?
Destroy
Which of the following is not one of the three "clusters" of cyberterrorism?
Exploitive cyberterrorism
Which of the following is considered one of the most destructive and difficult cyberthreats to prevent?
Rogue Insider
Which of the following hacking methods specifically targets databases?
SQL Injection
Which of the following is a "self-organized, self-run, and self-governed private sector council consisting of owners and operators and their representatives, which interact on a wide range of sector-specific strategies, policies, activities, and issues"?
Sector- Coordinating Council
The Second Quadrennial Homeland Security Review identified three factors that explained why cyberspace is particularly difficult to secure. Which of the following is not one of those factors?
The low cost of cyberterrorism
Which of the following is a malicious program disguised to look like a useful program, which the user knowingly installs on their device, and that manipulates the manner in which a device's operating system functions?
Trojan Horse