Professional Documents
Culture Documents
Cyberspace Cybersecurity and Cybercrime 1st Edition Kremling Test Bank Download
Cyberspace Cybersecurity and Cybercrime 1st Edition Kremling Test Bank Download
Chapter 7: Cyberterrorism
Test Bank
Multiple Choice
1 According to the text, three aspects must be taken into account to determine risk: the
threat, the asset, and the ______.
a. accessibility
b. sustainability
c. vulnerability
d. treatability
Ans: C
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy
3. According to the text, which of the following entities also contributes to the
misunderstanding of what constitutes cyberterrorism?
a. the government
b. the media
c. the people
d. all of these
Ans: B
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
Answer Location: The Role of the Media
Difficulty Level: Medium
6. Which of the following was NOT identified as one of the components of the motivation
element?
a. economical
b. ideological
c. social
d. political
Ans: A
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium
7. Which of the following was identified as a tool of attack in the conceptual framework
of defining cyberterrorism?
a. economical operation
b. psychological operation
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
c. sociological operation
d. political operation
Ans: B
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium
8. All of the following are components of the impact element EXCEPT ______.
a. mass disruption
b. serious interference with critical service operations
c. economic gain
d. causes fear, death, or bodily injury
Ans: C
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium
12. The terrorist organization Boko Haram, also known as Jama’atu Ahlis Sunna
Lidda’awati wal-Jihad, is from ______.
a. Ethiopia
b. Kenya
c. Nigeria
d. Nairobi
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Boko Haram
Difficulty Level: Easy
13. Boko Haram has become more active on social media since 2015 when it
established a/an ______ account.
a. Facebook
b. Instagram
c. Twitter
d. Snapchat
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Boko Haram
Difficulty Level: Easy
14. The most famous use of the Internet by Boko Haram was in utilizing which of the
following to show coverage of the kidnapping of the Chibok?
a. Facebook
b. Twitter
c. YouTube
d. Instagram
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Boko Haram
Difficulty Level: Easy
15. The Islamic State is also referred to as all of the following EXCEPT ______.
a. Islamic State of Iraq and Syria
b. Islamic State in Iraq and the Levant
c. Islamic Electronic Army
d. Daesh
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: The Islamic State (also known as ISIS/ISIL/Daesh)
Difficulty Level: Easy
16. According to the text, the United States ranks ______ in pro-IS tweets.
a. first
b. second
c. third
d. fourth
Ans: D
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: The Islamic State (also known as ISIS/ISIL/Daesh)
Difficulty Level: Easy
17. Which of the following cyber terror attack targets was NOT identified by the National
Association of Regulatory Utility Commissioners?
a. transportation
b. sports arenas
c. water supply systems
d. gas and oil
Ans: B
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Probable Versus Possible
Difficulty Level: Medium
18. Which of the following cyberterror attack targets was NOT identified by the National
Association of Regulatory Utility Commissioners?
a. information and communication
b. education
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
c. emergency systems
d. banking and finance
Ans: B
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Probable Versus Possible
Difficulty Level: Easy
19. The electrical grid is a significant target because it is not just a U.S. infrastructure. It
is also known as the ______.
a. U.S.–Mexico grid
b. South American grid
c. North American grid
d. U.S.–Canada grid
Ans: C
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Knowledge
Answer Location: Probable Versus Possible
Difficulty Level: Easy
21. Which of the following was NOT identified as sectors of critical infrastructure?
a. chemical sector
b. government sector
c. education sector
d. food and agriculture sector
Ans: C
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Vulnerability of Critical Infrastructures
Difficulty Level: Easy
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
22. Which of the following was identified as a sector of critical infrastructures?
a. national monuments sector
b. education sector
c. financial services sector
d. corporate sector
Ans: C
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Vulnerability of Critical Infrastructures
Difficulty Level: Easy
23. Efforts to identify threats, determine vulnerabilities, and identify required resources
is known as ______.
a. mitigation
b. preparedness
c. response
d. recovery
Ans: B
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy
24. Helping people and the community return to normal, if possible, is a part of ______.
a. mitigation
b. preparedness
c. response
d. recovery
Ans: D
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy
True/False
1. Barry Collin, while working as a research analyst at Palo Alto’s Institute for Security
and Intelligence in the 1980s, first coined the term cyberterrorism.
Ans: T
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Cyberterrorism Defined
Difficulty Level: Easy
4. There is a universal definition of terrorism in the United States and in the international
community.
Ans: F
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Comprehension
Answer Location: Cyberterrorism Defined
Difficulty Level: Medium
7. Using social media to recruit supporters has resulted in zero terror attacks in the
United States and in the international community.
Ans: F
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: The Islamic State (also known as ISIS/ISIL/Daesh)
Difficulty Level: Easy
8. There is no concern that cyberterrorists will use the electrical grid system to attack
critical infrastructure, as they do not have the means to do so.
Ans: F
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Comprehension
Answer Location: Probable Versus Possible
Difficulty Level: Easy
10. In order to examine the threat aspect of risk assessment, it should be understood
that risk can come from two sources: natural disasters and man-made disasters.
Ans: T
Learning Objective: 7-5: Apply the risk management procedure to critical infrastructure.
Cognitive Domain: Comprehension
Answer Location: Threat Assessment
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
Difficulty Level: Easy
Essay
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Knowledge
Answer Location: Probable Versus Possible
Difficulty Level: Easy
5. What is the difference between critical infrastructures and key assets? Provide one
example.
Ans: The students should utilize the USA PATRIOT Act to make the distinction. A strong
answer will include the following:
• Key assets are an aspect of critical infrastructures. An attack on key assets
would result in damage, but not be debilitating.
• Example of key assets: national monuments
• Example of critical infrastructure: electrical grid
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Vulnerability of Critical Infrastructures
Difficulty Level: Medium