Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Cyberspace Cybersecurity and Cybercrime 1st Edition Kremling Test Bank

Cyberspace Cybersecurity and Cybercrime 1st


Edition Kremling Test Bank

To download the complete and accurate content document, go to:


https://testbankbell.com/download/cyberspace-cybersecurity-and-cybercrime-1st-editi
on-kremling-test-bank/

Visit TestBankBell.com to get complete for all chapters


Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018

Chapter 7: Cyberterrorism
Test Bank

Multiple Choice

1 According to the text, three aspects must be taken into account to determine risk: the
threat, the asset, and the ______.
a. accessibility
b. sustainability
c. vulnerability
d. treatability
Ans: C
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy

2. An intentional act, committed via computer or communication system and motivated


by political, religious, or ideological objectives, against information, data, or computer
systems/programs, intended to cause severe harm, death, or destruction to civilians, is
referred to as ______.
a. cyberespionage
b. cyberterrorism
c. cyberwarfare
d. cybersabotage
Ans: B
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Comprehension
Answer Location: Cyberterrorism Defined
Difficulty Level: Easy

3. According to the text, which of the following entities also contributes to the
misunderstanding of what constitutes cyberterrorism?
a. the government
b. the media
c. the people
d. all of these
Ans: B
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
Answer Location: The Role of the Media
Difficulty Level: Medium

4. The conceptual framework that encompasses the definition of cyberterrorism includes


all of the following elements EXCEPT ______.
a. target
b. results
c. motivation
d. impact
Ans: B
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium

5. The conceptual framework that encompasses the definition of cyberterrorism includes


all of the following elements under target EXCEPT ______.
a. critical national information infrastructure
b. critical infrastructure
c. civilian population
d. civilian homes
Ans: D
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium

6. Which of the following was NOT identified as one of the components of the motivation
element?
a. economical
b. ideological
c. social
d. political
Ans: A
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium

7. Which of the following was identified as a tool of attack in the conceptual framework
of defining cyberterrorism?
a. economical operation
b. psychological operation
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
c. sociological operation
d. political operation
Ans: B
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium

8. All of the following are components of the impact element EXCEPT ______.
a. mass disruption
b. serious interference with critical service operations
c. economic gain
d. causes fear, death, or bodily injury
Ans: C
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Application
Answer Location: The Role of the Media
Difficulty Level: Medium

9. According to the conceptual framework of cyberterrorism, the method of action is


______.
a. unlawful means
b. mass disruption
c. serious interference
d. network warfare
Ans: A
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Comprehension
Answer Location: The Role of the Media
Difficulty Level: Easy

10. According to the text, the domain is ______.


a. cyberspace
b. critical infrastructure
c. critical national information infrastructure
d. civilian population
Ans: A
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Knowledge
Answer Location: The Role of the Media
Difficulty Level: Easy
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
11. Which of the following groups was NOT highlighted in this chapter?
a. the Islamic State
b. Boko Haram
c. al-Qaeda
d. People’s Liberation Army
Ans: D
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Various
Difficulty Level: Easy

12. The terrorist organization Boko Haram, also known as Jama’atu Ahlis Sunna
Lidda’awati wal-Jihad, is from ______.
a. Ethiopia
b. Kenya
c. Nigeria
d. Nairobi
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Boko Haram
Difficulty Level: Easy

13. Boko Haram has become more active on social media since 2015 when it
established a/an ______ account.
a. Facebook
b. Instagram
c. Twitter
d. Snapchat
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Boko Haram
Difficulty Level: Easy

14. The most famous use of the Internet by Boko Haram was in utilizing which of the
following to show coverage of the kidnapping of the Chibok?
a. Facebook
b. Twitter
c. YouTube
d. Instagram
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Boko Haram
Difficulty Level: Easy

15. The Islamic State is also referred to as all of the following EXCEPT ______.
a. Islamic State of Iraq and Syria
b. Islamic State in Iraq and the Levant
c. Islamic Electronic Army
d. Daesh
Ans: C
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: The Islamic State (also known as ISIS/ISIL/Daesh)
Difficulty Level: Easy

16. According to the text, the United States ranks ______ in pro-IS tweets.
a. first
b. second
c. third
d. fourth
Ans: D
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: The Islamic State (also known as ISIS/ISIL/Daesh)
Difficulty Level: Easy

17. Which of the following cyber terror attack targets was NOT identified by the National
Association of Regulatory Utility Commissioners?
a. transportation
b. sports arenas
c. water supply systems
d. gas and oil
Ans: B
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Probable Versus Possible
Difficulty Level: Medium

18. Which of the following cyberterror attack targets was NOT identified by the National
Association of Regulatory Utility Commissioners?
a. information and communication
b. education
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
c. emergency systems
d. banking and finance
Ans: B
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Probable Versus Possible
Difficulty Level: Easy

19. The electrical grid is a significant target because it is not just a U.S. infrastructure. It
is also known as the ______.
a. U.S.–Mexico grid
b. South American grid
c. North American grid
d. U.S.–Canada grid
Ans: C
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Knowledge
Answer Location: Probable Versus Possible
Difficulty Level: Easy

20. Cyberterror attacks may be conducted in a variety of ways, including ______.


a. destroying machinery
b. interfering with information technology
c. creating hardware to prevent intrusions
d. using computers to override control systems
Ans: C
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Comprehension
Answer Location: Vulnerability of Critical Infrastructures
Difficulty Level: Easy

21. Which of the following was NOT identified as sectors of critical infrastructure?
a. chemical sector
b. government sector
c. education sector
d. food and agriculture sector
Ans: C
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Vulnerability of Critical Infrastructures
Difficulty Level: Easy
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
22. Which of the following was identified as a sector of critical infrastructures?
a. national monuments sector
b. education sector
c. financial services sector
d. corporate sector
Ans: C
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Application
Answer Location: Vulnerability of Critical Infrastructures
Difficulty Level: Easy

23. Efforts to identify threats, determine vulnerabilities, and identify required resources
is known as ______.
a. mitigation
b. preparedness
c. response
d. recovery
Ans: B
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy

24. Helping people and the community return to normal, if possible, is a part of ______.
a. mitigation
b. preparedness
c. response
d. recovery
Ans: D
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy

25. Heightened inspections, improved surveillance, public health/agriculture testing,


immunizations, and law enforcement operations to deter/disrupt illegal activity and
apprehend perpetrators are ways to ______.
a. mitigate
b. prepare
c. respond
d. recover
Ans: A
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy

True/False

1. Barry Collin, while working as a research analyst at Palo Alto’s Institute for Security
and Intelligence in the 1980s, first coined the term cyberterrorism.
Ans: T
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Cyberterrorism Defined
Difficulty Level: Easy

2. Cyberspace is a place in which computers function and data moves.


Ans: T
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Comprehension
Answer Location: Cyberterrorism Defined
Difficulty Level: Easy

3. The term terrorism refers to a tactic.


Ans: T
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Cyberterrorism Defined
Difficulty Level: Easy

4. There is a universal definition of terrorism in the United States and in the international
community.
Ans: F
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Comprehension
Answer Location: Cyberterrorism Defined
Difficulty Level: Medium

5. One main element of that terrorism tactic is to create fear in a population.


Ans: T
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
Cognitive Domain: Comprehension
Answer Location: Cyberterrorism Defined
Difficulty Level: Easy

6. Al-Qaeda has been known to recruit individuals with information technology or


computer backgrounds.
Ans: T
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: Al-Qaeda
Difficulty Level: Easy

7. Using social media to recruit supporters has resulted in zero terror attacks in the
United States and in the international community.
Ans: F
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Knowledge
Answer Location: The Islamic State (also known as ISIS/ISIL/Daesh)
Difficulty Level: Easy

8. There is no concern that cyberterrorists will use the electrical grid system to attack
critical infrastructure, as they do not have the means to do so.
Ans: F
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Comprehension
Answer Location: Probable Versus Possible
Difficulty Level: Easy

9. Recovery involves efforts to identify threats, determine vulnerabilities, and identify


required resources.
Ans: F
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Risk Management
Difficulty Level: Easy

10. In order to examine the threat aspect of risk assessment, it should be understood
that risk can come from two sources: natural disasters and man-made disasters.
Ans: T
Learning Objective: 7-5: Apply the risk management procedure to critical infrastructure.
Cognitive Domain: Comprehension
Answer Location: Threat Assessment
Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
Difficulty Level: Easy

Essay

1. Differentiate cybercrime from cyberterrorism.


Ans: A strong answer will include the main difference, which is the motivation.
Generally, cyberterrorism is motivated via political, religious, or social objectives,
whereas cybercrime is generally motivated via financial gain, fun, thrill (per the example
provided by the author in the text). The students can use that example to illustrate the
differences among motivation, target, action, result, and offense.
Learning Objective: 7-2: Discuss the role of the media in the (mis)understanding of what
constitutes cyberterrorism.
Cognitive Domain: Comprehension
Answer Location: The Role of the Media
Difficulty Level: Hard

2. Why is it difficult to define cyberterrorism?


Ans: Answers will vary depending on the student’s analysis. However, a strong answer
will discuss that there is no universal definition in the United States or the international
community. Definitions of cyber terrorism vary greatly depending on the organization.
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Comprehension
Answer Location: Cyberterrorism Defined
Difficulty Level: Medium

3. According to some researchers, as technology rapidly advances, cyberterrorism may


soon manifest as a deadly threat—a threat that left unexamined could leave law
enforcement unprepared to detect, prevent, and respond. Given the technological
advances, what, in your opinion, can be done to improve the efforts of detecting,
preventing, and responding to cyberterrorism?
Ans: Answers will vary depending on the student’s comprehension and analysis of the
material, but a strong answer should incorporate the cooperation among the
international community in detecting, preventing, and responding to cyberterrorism.
Learning Objective: 7-1: Define the difference between cyberterrorism and other forms
of cybercrime.
Cognitive Domain: Analysis
Answer Location: Evolution of the Threat
Difficulty Level: Hard

4. Stephen E. Flynn, a professor of Homeland Security at Northeastern University in


Boston, Massachusetts, identified the electrical grid as one of the top homeland security
concerns. What makes the electric grid a top concern?
Ans: A strong answer will discuss the multinational connection between the United
States, Canada, and Mexico.
Cyberspace Cybersecurity and Cybercrime 1st Edition Kremling Test Bank

Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
Learning Objective: 7-3: Understand the vulnerability of critical infrastructures to
cyberterrorism.
Cognitive Domain: Knowledge
Answer Location: Probable Versus Possible
Difficulty Level: Easy

5. What is the difference between critical infrastructures and key assets? Provide one
example.
Ans: The students should utilize the USA PATRIOT Act to make the distinction. A strong
answer will include the following:
• Key assets are an aspect of critical infrastructures. An attack on key assets
would result in damage, but not be debilitating.
• Example of key assets: national monuments
• Example of critical infrastructure: electrical grid
Learning Objective: 7-4: Differentiate between the four steps of the emergency/risk
management process.
Cognitive Domain: Comprehension
Answer Location: Vulnerability of Critical Infrastructures
Difficulty Level: Medium

Visit TestBankBell.com to get complete for all chapters

You might also like