Lesson 2 Progress Check _ WAR-961S Ethics of Emerging Military Technologies
pdf
keyboard_arrow_up
School
Air University *
*We aren’t endorsed by this school
Course
601S
Subject
Philosophy
Date
Jan 9, 2024
Type
Pages
8
Uploaded by PresidentLlama3892
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
1/8
Lesson 2 Progress Check Due
No due date
Points
100
Questions
10
Time Limit
15 Minutes
Allowed Attempts
Unlimited
Instructions
Attempt History
Attempt
Time
Sco
LATEST
Attempt 1
(https://canvas.asu.edu/courses/153180/quizzes/1151413/history?
version=1)
13
minutes
80 o
of 1
Correct answers are hidden.
Score for this attempt: 80
out of 100
Submitted Dec 23 at 2:23am
This attempt took 13 minutes.
This quiz checks your understanding of lesson concepts.
This is a timed assessment.
You are allowed multiple attempts.
Minimum passing score is 80%.
Take the Quiz Again
(https://canvas.asu.edu/courses/153180/quizzes/1151413/take?
user_id=486526)
10 / 10 pts
Question 1
According to Cook, the threat of cyberwar raises moral concerns akin to
those raised by the prospect of a nuclear exchange. Prominent among
these concerns _______________
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
2/8
Is the question of whether cyber-supremacy, or even cyber-superiority, is
achievable.
is the question of whether one may threaten to do what it is immoral to do. Answer is correct. Cook writes on page 18, “[T]he threat of cyberwar
reinvigorates an important question posed during the waning years of
the Cold War” may one morally threaten
to do what would be immoral
if one in fact did it?” (Emphasis is in the original.)
is the matter of counter-value cyber-strikes. is the worry over a “cyber winter.” 10 / 10 pts
Question 2
According to Dipert’s “The Ethics of Cyberwar,” cyber conflict poses
epistemic challenges that are absent in more conventional conflicts.
Among these is _______________
the conundrum of legitimacy. the conundrum of unintended consequences. the problem of “the one and the many.” the problem of attribution. Answer is correct. Dipert writes on page 385, “[I]t is very difficult to determine the source of cyberattacks: this is the ‘attribution problem. . . .” He notes on page 393 that this is one of a set of epistemic problems.
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
3/8
0 / 10 pts
Question 3
Incorrect
Incorrect
According to Cook, there are several reasons why cyber war may be
morally special. Which choice below best captures some of these
reasons?
Cyber may change our understanding of reality; cyber threats do not,
fortunately, pervade time.
Answer is incorrect. Cook writes on page 27, “Phenomenologically, it
is quite possible to devote increasingly more of oneself to the
experience of a reality filtered through others’ consciousnesses or
even through realities that are generated independently of human
authorship.” He writes on page 31, “[cyberwar] may . . . be morally
unique because of three characteristics. The first is ubiquity. . . .
Normally we call something ubiquitous if it is present
nearly
everywhere or very frequently. It is most natural to think of presence
spatially, but ubiquity can have a temporal dimension, as when one
never finds a moment’s respite from something such as an unwanted
memory.” (Emphasis in the original.)
Cyber may change our understanding of reality; cyber threats pervade
time.
Cyber cannot change our understanding of reality; cyber threats pervade
time.
Cyber warfare may be uncontrollable; cyber threats do not, fortunately,
pervade time.
10 / 10 pts
Question 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
4/8
According to Dipert’s “Distinctive Ethical Issues of Cyberwarfare,” two of
the traditional criteria for going to war (
jus ad bellum
) are particularly ill-
suited to cyberwar. They are ________________
just cause and probability of success. just cause and last resort. Answer is correct. Dipert writes on page 65:
“Of the four core principles of just war theory for going to war –
initiating the use of force – two are especially problematic for some
forms of cyberwarfare. The four are just cause, last resort, probability
of success, and proportionality. The widely accepted “high” barrier for
just cause – namely armed invasion by an enemy with an intention to
use lethal force – does not seem to apply to many forms of
cyberwarfare. Likewise, cyberwarfare is not necessarily a last resort.
That would continue to be the use of lethal force or force that brings
extensive permanent destruction.”
last resort and probability of success. just cause and proportionality. 10 / 10 pts
Question 5
According to Dipert’s “Distinctive Ethical Issues of Cyberwarfare,” the lack
of agreement over the foundations of the just war tradition
_______________
suggests that ethical concerns about conflict are misplaced.
is particularly serious for cyberwar.
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
5/8
Answer is correct. Dipert writes on page 57, “The lack of agreement about [just war] foundations is . . . especially problematic for cyberwarfare.”
matters little for cyberwar. shows that just war thinking is unfounded. 10 / 10 pts
Question 6
According to Cook, cyberwar may be different from other kinds of war for
several reasons. One of these _________________
is that it never involves kinetic effects. is that it is not “politics with other means” in von Clausewitz’s sense. is that frequently there is no good understanding of sovereignty in
cyberspace.
Answer is correct. Cook writes on page 20, “Cyberwar may seem different from other kinds of war because often there is no clear sense of sovereignty to cyberspace, either of actors or territory, as there tends to be in more traditional realms of conflict, such as land, sea, air, and even space.”
is that the just war tradition cannot accommodate it. 10 / 10 pts
Question 7
According to Dipert’s “Distinctive Ethical Issues of Cyberwarfare,”
____________
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
6/8
most political theorists and leaders have rejected cyberwar, as have most
ethicists.
most ethicists have rejected deterrence, while most political theorists and
leaders have not.
Answer is correct. Dipert writes on page 64, “Ethical theories of war have oddly ignored certain game-theoretic results, and so they have generally rejected ‘realist’ approaches that form one of the major schools of international relations. In particular, philosophers have rejected deterrent strategies, including Mutually Assured (nuclear) Destruction, while most geopolitical thinkers and leaders have endorsed them.”
most political theorists and leaders have rejected deterrence, while most
philosophers have not.
Most political theorists and leaders have rejected deception, as have most
ethicists.
10 / 10 pts
Question 8
According to Franz, ______________
it is not necessary to understand the function a network performs in order
to defend it.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
7/8
the communications career field has historically been oriented toward
maintaining technical infrastructure; the cyber community should now focus
on the mission(s) that infrastructure support(s) as well.
Answer is correct. Franz writes on page 94, “Unfortunately, the ‘comm’ culture historically has placed more emphasis on the health and availability of the network than on the mission for which it exists. We do need our cyber defenders to have expertise in the technologies of their networks; we also need them to have expertise in the supported missions. . . .”
the communications career field has historically been oriented toward the
mission(s) its infrastructure supports and the cyber community.
cyberwar professionals should not specialize in particular technical areas
as most technology becomes obsolete.
10 / 10 pts
Question 9
Cancian offers a number of reasons to support his assertion that
cyberwarriors should not be in the Marine Corps. Which response below
best captures one of his reasons?
Cyberwarriors don’t face personal danger. Answer is correct. Cancian writes on his second page, "Cyber warriors don’t exert lethal force and don’t face personal danger."
Many of the most talented cyber professionals struggle to meet Marine
Corps physical fitness standards.
Many of the most talented cyber professionals disdain military service.
12/23/23, 12:23 PM
Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies
https://canvas.asu.edu/courses/153180/quizzes/1151413
8/8
Many of the most talented cyber professionals do not share the Marines’
core values.
0 / 10 pts
Question 10
Incorrect
Incorrect
According to Beard, there are several reasons why the traditional code of
the warrior is hard to apply to cyber conflict. Which response below best
captures one of the reasons?
The traditional code is overly broad. The traditional code is too imprecise to reflect the realities of cyber conflict.
The traditional warrior and the cyberwarrior do not share a common
teleology.
Answer is incorrect. Beard writes on page 148, “conventional war and cyberwar can, and often will, share a common teleology; and similarly, conventional warriors and cyberwarriors may at times be committed to achieving the same goals. . . .”
The traditional code is too narrow to capture the spectrum of activity in
cyber conflict.
Quiz Score: 80
out of 100