Sec 240 Quiz 5

.docx

School

Wilmington University *

*We aren’t endorsed by this school

Course

240

Subject

Statistics

Date

Feb 20, 2024

Type

docx

Pages

9

Uploaded by UltraIceHeron28

Assessment Statistics 85% 85 out of 100 points 85 Out of 100 points Time for this attempt: 32 minutes 28 seconds 32 minutes 28 seconds 32:28 Time for this attempt Your Answers: Results for question 1. 1 5 / 5 points According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the ________. accessibility , Not Selected sustainability , Not Selected Correct answer: vulnerability treatability , Not Selected Results for question 2. 2 5 / 5 points An intentional act, committed via computer or communication system and motivated by political, religious, or ideological objectives, against
information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as ______. cyberespionage , Not Selected Correct answer: cyberterrorism cyberwarfare , Not Selected cybersabotage , Not Selected Results for question 3. 3 5 / 5 points According to the conceptual framework of cyberterrorism, the method of action is ______. Correct answer: unlawful means mass disruption , Not Selected serious interference , Not Selected network warfare , Not Selected Results for question 4. 4 5 / 5 points Boko Haram has become more active on social media since 2015 when it established a/an ______ account.
Facebook , Not Selected Instagram , Not Selected Correct answer: Twitter Snapchat , Not Selected Results for question 5. 5 5 / 5 points Which of the following was identified as a sector of critical infrastructures? national monuments sector , Not Selected education sector , Not Selected Correct answer: financial services sector corporate sector , Not Selected Results for question 6. 6 5 / 5 points Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to ______. Correct answer:
mitigate prepare , Not Selected respond , Not Selected recover , Not Selected Results for question 7. 7 5 / 5 points Barry Collin, while working as a research analyst at Palo Alto’s Institute for Security and Intelligence in the 1980s, first coined the term cyberterrorism. Correct answer: True False Results for question 8. 8 5 / 5 points There is a universal definition of terrorism in the United States and in the international community. True Correct answer: False Results for question 9. 9 5 / 5 points Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help