Cyber terrorism is always started using a virus or by hacking. - (correct Answer) - False
The only focus of cyber terrorism is on using a surprise attack with computer technology to cause
infrastructure disruption. - (correct Answer) - False
To meet their goal, cyber terrorists have to destroy a critical system controlled by computer
technologies. - (correct Answer) - True
All cyber terrorist attacks target the Internet. - (correct Answer) - False
According to the University of Haifa, in 2006 there were an estimated________terrorist websites. -
(correct Answer) - 5,000
According to the University of Arizona's Dark Project, there were around________sites containing
extremist and terrorist content in 2007. - (correct Answer) - 50,000
In 2007, research sites also extracted over________images and videos from________terrorist sites. -
(correct Answer) - 1,000,000 and 15,000
A hacker finds a way to access some of a corporation's bank accounts and then announces that demands
must be met or else other attacks on banks and government agencies will follow. - (correct Answer) -
cyber terrorism
A hacker accesses a customer's bank account and transfers funds into his or her own. - (correct Answer) -
cyber crime
One way to distinguish between cyber terrorists and cyber criminals is to examine the tactics of both. -
(correct Answer) - False
Once a cyber attack has occurred, it is important to track down the attacker or attackers quickly. -
(correct Answer) - True
Keylogger - (correct Answer) - A program or hardware device that could help a perpetrator gain access to
passwords or other sensitive data.
Logic bomb - (correct Answer) - Would allow a terrorist to destroy all the data on a victim's hard drive by
reformatting it.
Trojan horse - (correct Answer) - Causes harm by attacking another authorized program on a victim's
computer.
A________attack allows cyber terrorists to target a computer with millions of requests per second,
causing it to slow down and crash. - (correct Answer) - denial-of-service
A________ attack can be in the form of a legitimate email that is actually malicious and intended to trick
you into providing sensitive information. - (correct Answer) - spoofing
Different types of________attacks include boot sector, companion, and polymorphic. - (correct Answer) -
virus