1. What is the most likely damage from an act of cyber terrorism? - Answer D. Disrupted
communications
2. Which of the following is not an example of financial loss due to cyber terrorism? -
Answer D. Computer fraud
3. Which of the following military/government systems would most likely be the target of
a successful computer hack? - Answer C. Low-security logistical system
4. Which of the following might be an example of domestic cyber terrorism? - Answer D.
MyDoom virus
5. What differentiates cyber terrorism from other computer crimes? - Answer B. It is
politically or ideologically motivated.
6. Which of the following is a political group that has already used the Internet for
political intimidation? - Answer A. Internet Black Tigers
7. What is information warfare? - Answer B. Spreading disinformation or gathering
information
8. Which of the following would most likely be considered an example of information
warfare? - Answer A. Radio Free Europe during the Cold War
9. Which of the following is a likely use of Internet newsgroups in information warfare? -
Answer A. To spread propaganda
10. Sending a false message with weak encryption, intending it to be intercepted and
deciphered, is an example of what? - Answer C. Disinformation
11. Which of the following best describes the communication goal of any intelligence
agency? - Answer B. To send clear communications to allies and noise only to the
enemy
12. Which of the following conflicts had a cyber warfare component? - Answer B. 1990
Kosovo crisis
13. Which of the following agencies has allegedly had one of its cyber spies actually
caught? - Answer D. CIA
14. According to the October 2002 InfoWorld magazine article, which of the following
systems may be vulnerable to attack? - Answer C. Satellites
15. Which of the following is a cyber attack that would likely cause imminent loss of life?
- Answer D. Disruption of chemical plant control systems