Week 5 Flashcards

1
Q

Dr. Matt Bishop noted in his cybersecurity lecture that in an emergency situation confidentiality is overridden by the immediacy of the situation. In the business this is referred to as _______________________ policy.

A

Bread the glass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is not a characteristic of the Stuxnet worm?

A

Can update itself without the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, this 2013 document ______________ sets out 95 “black letter rules” governing cyber conflict addressing sovereignty, state responsibility and the law of armed conflict.

A

Tallin manual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, the first cyberweapon was ____.

A

Struxnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A worm that was designed to attack Siemens programmable logic controllers and Windows-based industrial software and used to damage Iran’s nuclear generation program was called ____.

A

Struxnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that appears to perform function but steals information or harms system.

A

Trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rinderpest is also known as ____.

A

Cattle plague.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to John Arquilla in his Computer Mouse that Roared article, the ‘negative proof” of the offense-defense theory was _____.

A

World War I.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Information Age analog to strategic bombing is hacking and/or compromising _____.

A

Information infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to Dr. Matt Bishop who is the following quote attributed? “Those who vote decide nothing. Those who count the vote decide everything.”

A

Joseph Stalin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dr. Matt Bishop noted in his cybersecurity lecture that security is not monolithic with different aspects of society wanting different things. The most important aspect of security for the military was ________________.

A

Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to Dr. Matt Bishop cars can be hacked from around what distance?

A

150 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, individuals who steal classified information used by governments to gain a competitive advantages are ______.

A

Cyberspies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, state-sponsored and non-state actors who engage in cyberattack to pursue their objectives are _____.

A

Cyberterrorists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In 200 workers at Cellatex chemical plant in _____________purposely dumped 800 gallons of sulfuric acid into a river when denied workers’ benefits.

A

France.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Terrorists blowing up the dam and flooding the town would be known as ______.

A

Resource as a target terrorism.

17
Q

An honest person diagnosed as truthful would be considered a _______.

A

True negative.

18
Q

Percentage of deceptive cases that give positive results would be considered which property of polygraph tests?

A

Sensitivity.

19
Q

According to the PBS documentary on North Korea, it is estimated that 1-in-____ of the population are political prisoners.

A

100.

20
Q

When did Korea split into North and South?

A

1940s.

21
Q

One of Kim Jong-un’s ____ was ordered to be executed.

A

Uncles

22
Q

The goal of Boko Haram is to overthrow the _____government and create an Islamic State.

A

Nigerian.

23
Q

Which of the following is NOT a lesson learned from the history of nuclear proliferation?

A

Nuclear proliferation takes years to develop.

24
Q

Did you rob the bank of Friday? versus Are you in New Jersey? would fall into which class of polygraph questions?

A

Relavent-irrelevant.

25
Q

The Bulgarian dissident was shot with a pellet containing the poison ____.

A

Ricin.

26
Q

In the PBS documentary dollars were shown being sent from South Korea to North Korea _____.

A

By balloons.

27
Q

What was one of the unique aspects mentioned about the products shown in Department Store #1 in the PBS documentary on North Korea?

A

Nothing was for sale.

28
Q

Gartzke and Kroenig noted that nuclear states are ___ prone to conflicts.

A

Neither more or less.

29
Q

Boko Haram was labeled a terrorist group by the U.S. in _____.

A

2013.

30
Q

The program that was developed to strictly monitor use of nuclear technology in over 40 countries is ____.

A

International Atomic Energy Agency.

31
Q

According to Zachary Davis, who caused the start of the nuclear weaponry proliferation?

A

Soviet Union spies in Britain and the US.