Skip to main content
United States
Jump To
Support
Register or Log In
Support
Register or Log In
Instructors
Browse Products
Getting Started
Students
Browse Products
Getting Started
Chapter 27 Self-test questions
Return to Contemporary Security Studies 5e student resources
Chapter 27 Self-test questions
Cyber-Security
Quiz Content
*
not completed
.
Which statement is
not
correct about cyberspace?
Cyberspace has both virtual and physical components.
correct
incorrect
In security policy cyberspace serves both as an attack vector and as a sphere of operations.
correct
incorrect
Cyberspace is made up of communication networks, databases, servers, cables and satellites.
correct
incorrect
'Internet' and 'cyberspace' are synonymous terms.
correct
incorrect
*
not completed
.
What is the role of intelligence agencies in cyber-security?
Intelligence agencies often have superior resources to deal with cyber-threats.
correct
incorrect
Intelligence agencies actively exploit vulnerabilities in cyberspace to gather data.
correct
incorrect
The role of intelligence agencies in cyber-security often causes public unease.
correct
incorrect
All of the above.
correct
incorrect
*
not completed
.
When did the cyber-security discourse emerge? (When did politicians, academics, and other agents begin to talk seriously about cyber-security?)
1970s
correct
incorrect
1990s
correct
incorrect
1960s
correct
incorrect
1980s
correct
incorrect
*
not completed
.
What is the referent object in contemporary cyber-security?
Digitalized sensitive information
correct
incorrect
Critical Information Infrastructures
correct
incorrect
Government IT systems
correct
incorrect
Telecommunication networks
correct
incorrect
*
not completed
.
In terms of cyber-security, what is meant by 'resilience' and why is it important?
Resilience refers to the ability of an IT system to identify and defend against a cyber-security threat.
correct
incorrect
The only way to build a truly resilient IT system is to ensure that it can repel all types of threat and remain and avoid attack.
correct
incorrect
Resilience in an IT system refers to its ability to function when there are no threats to its security.
correct
incorrect
Resilience refers to the ability of IT systems to recover from attack.
correct
incorrect
*
not completed
.
Are strategies of arms control useful in cyber-security?
No, arms control does not serve any purpose outside the realm of traditional military weapons.
correct
incorrect
Yes, successful policies of arms control have translated well from other security realms, such as nuclear weapons control strategies.
correct
incorrect
No, as the verification required for traditional arms control strategies is impossible in cyber(ed) warfare.
correct
incorrect
Yes, because the nature of technologies can be easily determined.
correct
incorrect
*
not completed
.
In what way is international law applicable to cyber-security?
International Humanitarian Law (IHL) fully applies in cyber-operations.
correct
incorrect
The principle of state sovereignty and the international norms and principles that flow from sovereignty apply in cyberspace.
correct
incorrect
Concerning jus ad bellum, i.e. when a cyber-attack is considered an armed attack by another state.
correct
incorrect
All of the above.
correct
incorrect
*
not completed
.
What is 'malware'?
A virus or worm
correct
incorrect
A Trojan horse
correct
incorrect
A hacker tool
correct
incorrect
A corrupted program
correct
incorrect
*
not completed
.
What is meant by the term 'cyber-crime'?
Any crime that uses computers to jeopardize or attempt to jeopardize national security
correct
incorrect
The use of computer networks to commit financial or identity fraud
correct
incorrect
The theft of digital information
correct
incorrect
Any crime that involves computers and networks
correct
incorrect
*
not completed
.
Which of these is an effective way of securing against cyber threats?
Complete eradication of threats.
correct
incorrect
Ensure that the severity of cyber war as a threat is recognized, and that instances of cyber warfare are identified, publicized, and acted upon immediately.
correct
incorrect
Acceptance that there can be no absolute security, instead designing resilient IT systems and building international cooperation and information exchange in order to reduce threat and increase resilience.
correct
incorrect
All of the above.
correct
incorrect
Previous Question
Exit Quiz
Next Question
Review & Submit
Submit Quiz
Reset
Are you sure?
You have some unanswered questions. Do you really want to submit?
Back to top
Printed from , all rights reserved. © Oxford University Press, 2024
Select your Country