Skip to main content
United States
Jump To
Support
Register or Log In
Support
Register or Log In
Instructors
Browse Products
Getting Started
Students
Browse Products
Getting Started
Return to Contemporary Security Studies 6e Student Resources
Chapter 28 Self-test questions
Quiz Content
*
not completed
.
Which statement is
not
correct about cyberspace?
Cyberspace has both virtual and physical components.
correct
incorrect
In security policy cyberspace serves both as an attack vector and as a sphere of operations.
correct
incorrect
Cyberspace is made up of communication networks, databases, servers, cables, and satellites.
correct
incorrect
'Internet' and 'cyberspace' are synonymous terms.
correct
incorrect
*
not completed
.
What is the role of intelligence agencies in cyber-security?
Intelligence agencies often have superior resources to deal with cyber-threats.
correct
incorrect
Intelligence agencies actively exploit vulnerabilities in cyberspace to gather data.
correct
incorrect
The role of intelligence agencies in cyber-security often causes public unease.
correct
incorrect
All of the above
correct
incorrect
*
not completed
.
What is 'hacktivism'?
Hacktivism is political activism conducted online.
correct
incorrect
Hacktivism is a form of state sponsored activism that is conducted online.
correct
incorrect
Hacktivism is the umbrella term for cyber-crime
correct
incorrect
All of the above
correct
incorrect
*
not completed
.
What is the referent object in contemporary cyber-security?
Digitalized sensitive information
correct
incorrect
Critical Infrastructures
correct
incorrect
Government IT systems
correct
incorrect
Telecommunication networks
correct
incorrect
*
not completed
.
In what ways might cyber-attacks be attractive to terrorist groups?
Prospect of anonymity
correct
incorrect
Wider selection of available targets
correct
incorrect
Ability to conduct attacks remotely
correct
incorrect
All of the above
correct
incorrect
*
not completed
.
Are strategies of arms control useful in cyber-security?
No, arms control does not serve any purpose outside the realm of traditional military weapons.
correct
incorrect
Yes, successful policies of arms control have translated well from other security realms, such as nuclear weapons control strategies.
correct
incorrect
No, as the verification required for traditional arms control strategies is impossible in cyber(ed) warfare.
correct
incorrect
Yes, because the nature of technologies can be easily determined.
correct
incorrect
*
not completed
.
In what way is international law applicable to cyber-security?
International Humanitarian Law (IHL) fully applies in cyber-operations.
correct
incorrect
The principle of state sovereignty and the international norms and principles that flow from sovereignty apply in cyberspace.
correct
incorrect
Concerning jus ad bellum, i.e. when a cyber-attack is considered an armed attack by another state.
correct
incorrect
All of the above
correct
incorrect
*
not completed
.
What is 'malware'?
A virus or worm
correct
incorrect
A Trojan horse
correct
incorrect
A hacker tool
correct
incorrect
A corrupted program
correct
incorrect
*
not completed
.
What is meant by the term 'cyber-crime'?
Any crime that uses computers to jeopardize or attempt to jeopardize national security
correct
incorrect
The use of computer networks to commit financial or identity fraud
correct
incorrect
The theft of digital information
correct
incorrect
Any crime that involves computers and networks
correct
incorrect
*
not completed
.
In what ways does today's version of the Internet differ from the ARPANET established in the 1960s?
ARPANET provided a much more secure platform than the Internet we use today.
correct
incorrect
The Internet, unlike ARPANET, has been built with security in mind.
correct
incorrect
The Internet started as ARPANET in the 1960s and was never built with security in mind. This legacy, combined with the rapid growth of the network, its commercialization, and several economic and strategic interests make computer networks insecure.
correct
incorrect
The Internet, while modelled on the ARPANET from the 1960s, is much more sophisticated. Built with security in mind, it allows for a secure way to transfer sensitive information.
correct
incorrect
Previous Question
Submit Quiz
Next Question
Reset
Exit Quiz
Review & Submit
Submit Quiz
Are you sure?
You have some unanswered questions. Do you really want to submit?
Back to top
Printed from , all rights reserved. © Oxford University Press, 2024
Select your Country