Sec 240 Quiz 5

docx

School

Wilmington University *

*We aren’t endorsed by this school

Course

240

Subject

Statistics

Date

Feb 20, 2024

Type

docx

Pages

9

Uploaded by UltraIceHeron28

Report
Assessment Statistics 85% 85 out of 100 points 85 Out of 100 points Time for this attempt: 32 minutes 28 seconds 32 minutes 28 seconds 32:28 Time for this attempt Your Answers: Results for question 1. 1 5 / 5 points According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the ________. accessibility , Not Selected sustainability , Not Selected Correct answer: vulnerability treatability , Not Selected Results for question 2. 2 5 / 5 points An intentional act, committed via computer or communication system and motivated by political, religious, or ideological objectives, against
information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as ______. cyberespionage , Not Selected Correct answer: cyberterrorism cyberwarfare , Not Selected cybersabotage , Not Selected Results for question 3. 3 5 / 5 points According to the conceptual framework of cyberterrorism, the method of action is ______. Correct answer: unlawful means mass disruption , Not Selected serious interference , Not Selected network warfare , Not Selected Results for question 4. 4 5 / 5 points Boko Haram has become more active on social media since 2015 when it established a/an ______ account.
Facebook , Not Selected Instagram , Not Selected Correct answer: Twitter Snapchat , Not Selected Results for question 5. 5 5 / 5 points Which of the following was identified as a sector of critical infrastructures? national monuments sector , Not Selected education sector , Not Selected Correct answer: financial services sector corporate sector , Not Selected Results for question 6. 6 5 / 5 points Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to ______. Correct answer:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
mitigate prepare , Not Selected respond , Not Selected recover , Not Selected Results for question 7. 7 5 / 5 points Barry Collin, while working as a research analyst at Palo Alto’s Institute for Security and Intelligence in the 1980s, first coined the term cyberterrorism. Correct answer: True False Results for question 8. 8 5 / 5 points There is a universal definition of terrorism in the United States and in the international community. True Correct answer: False Results for question 9. 9 5 / 5 points Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.
True Correct answer: False Results for question 10. 10 5 / 5 points In order to examine the threat aspect of risk assessment, it should be understood that risk can come from two sources: natural disasters and man- made disasters. Correct answer: True False Results for question 11. 11 5 / 5 points The surface web, which is available via regular search engines, is hosted by all of the following browsers EXCEPT ______. Microsoft Windows , Not Selected Firefox , Not Selected Correct answer: Onion Router Google Chrome , Not Selected Results for question 12. 12 0 / 5 points
On average, Google accesses ________ percent of the surface web. Incorrect answer: 4 Correct Answer: 16 16 , Not Selected 32 , Not Selected 57 , Not Selected Results for question 13. 13 5 / 5 points According to the text, deep web sites can include all of the following EXCEPT ________. passcode-protected websites , Not Selected Correct answer: websites that are searchable sites that are not linked to other programs , Not Selected business intranets , Not Selected Results for question 14. 14 5 / 5 points
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
______ is often referred to as a peer-to-peer platform for censorship-resistant communication and publishing. Safari , Not Selected I2P , Not Selected Correct answer: Freenet Onion Router , Not Selected Results for question 15. 15 5 / 5 points ______ was originally developed by the U.S. Naval Research Laboratory as a method of anonymous communication. Freenet , Not Selected I2P , Not Selected Safari , Not Selected Correct answer: Onion Router (ToR) Results for question 16. 16 5 / 5 points On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.
dollars and cents , Not Selected euros , Not Selected Correct answer: bitcoins pesos , Not Selected Results for question 17. 17 5 / 5 points In order to access the deep web, special considerations are needed, including private URL addresses or, for some areas, specialized software. Correct answer: True False Results for question 18. 18 5 / 5 points A network within a network that is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs is referred to as an anonymous overlay network. Correct answer: True False Results for question 19. 19 0 / 5 points
Activists may utilize ToR to protect communications, investigations, and intelligence. Incorrect answer: True Correct Answer: False False Results for question 20. 20 0 / 5 points As law enforcement is attempting to infiltrate darknet websites, the group Anonymous is working to restore darknet sites that have been taken down. Incorrect answer: True Correct Answer: False False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help