0 of 15 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. Cyber warfare refers to the use of ___________ attacks like computer viruses and hacking by one country to disrupt the vital computer systems of another.
2. Cyber attacks can place on public infrastructure like dams or ___________ systems.
3. Cyber attacks can place on safety infrastructures like traffic signals or ____________ warning systems.
4. ___________ refers to monitoring other countries to steal secrets.
5. _____________ attacks prevent legitimate users from accessing a website by flooding it with fake requests and forcing the website to handle these requests.
6. ____________ involves hackers using cyberattacks to promote an ideology.
7. Stuxnet is a computer __________ that was originally aimed at Iran’s nuclear facilities.
8. Attacks in __________ were the first time that a foreign actor threatened another nation’s security and political independence primarily through cyber operations.
9. Colonial Pipeline suffered a ___________ attack in 2021 that forced the U.S. energy company to shut down its entire fuel distribution pipeline.
10. A hacker group identifying itself as “Guardians of _________” leaked a release of confidential data from the film studio Sony Pictures Entertainment.
11. Names, dates of birth, telephone numbers, and ____________ were stolen during the Yahoo data breach.
12. In the Sony Picture hack, hackers used the ___________ wiper malware to erase Sony’s computer infrastructure.
13. ______________ can be used to expose embarrassing truths, spread lies to make people lose trust in their country.
14. Attacks on Estonia were done by ____________ of service.
15. When a hostile government or terrorists steal the information or destroy it, It belongs to ___________ cyber warfare.