The term used to describe a terrorist attack on a computer information system is-
a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the
these

1 Answer

Answer :

b. Cyber Terrorism

Related questions

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : If you were in midflight and a terrorist tried to bomb the plane, or tried to attack or harm people, what role might you play?

Last Answer : E) and F) I don’t know if I am strong enough to take down a terrorist myself, but I do think I could help plot with other passengers to come up with a plan. Also, I think all pilots have guns in the cockpits now. I always carry perfume (flammable), tweezers, a cuticle remover, both are very sharp.

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Is one of the reasons the terrorist group Alleged uses to justify committing acts of terrorism against the US?

Last Answer : Need answer

Description : The anti-terrorism law prohibits fundraising by foreign terrorist groups, and provides for the death penalty for international terrorism.?

Last Answer : TRUE

Description : 1996, President Clinton signed the anti-terrorist legislation to strengthen the power of which government and to help deal with terrorism in advance ?

Last Answer : federal

Description : 1996, President Clinton signed the anti-terrorist legislation to strengthen the power of which government and to help deal with terrorism in advance ?

Last Answer : federal

Description : The anti-terrorism law prohibits fundraising by foreign terrorist groups, and provides for the death penalty for international terrorism.?

Last Answer : TRUE

Description : Which among the following is not a preventive detention act? (1) Terrorist and Disruptive Activities (Prevention) Act (TADA) (2) Prevention of Terrorism Act (POTA) (3) Conservation of Foreign Exchange and Prevention of Smuggling Activities Act (COFEPOSA) (4) Foreign Exchange Regulation Act (FERA)

Last Answer : (4) Foreign Exchange Regulation Act (FERA) Explanation: The Foreign Exchange Regulation Act (FERA) which was passed by the Indian Parliament in 1973 imposed stringent regulations on dealings in foreign ... exchange and the import and export of currency. Ti was not a preventive detention act.

Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these

Last Answer : b. Computer Law

Description : Which type of domestic violence is as likely to be perpetrated by women and men toward their partners? a. Control. b. Serious violence such as beating. c. Situational violence. d. Intimate terrorism

Last Answer : c. Situational violence.

Description : Suppose someone throws a homemade bomb into a shopping mall, injuring several people. in which case would this best qualify as terrorism?

Last Answer : The person has a political objective

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : Poverty can be reduced by a combination of solar energy, ___________ andthe internet. a. Genetic engineering. b. Cyber café. c. Nanotechnology. d. All of the above.

Last Answer : a. Genetic engineering.

Description : Poverty can be reduced by a combination of solar energy, ___________ andthe internet. a. Genetic engineering. b. Cyber café. c. Nanotechnology. d. All of the above.

Last Answer : a. Genetic engineering.

Description : ____________ is when the criminal disseminates the information to defame you and take revenge on you, or cause loss. A. Cyber attack B. Cyber defamation C. Spoofing’ D. Phisking

Last Answer : B. Cyber defamation

Description : The atom bomb is an inherently a a. Political artifact. b. Social artifact. c. Cultural artifact. d. Economical artifact.

Last Answer : a. Political artifact.

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : a) Trap doors

Description : Why should an attack on a military target be classified as an act of terrorism?

Last Answer : Do you have a specific example in mind?

Description : What happened to the question about yesterday's terrorist attack in Britain?

Last Answer : I see two questions related to it in Social, was there another one? Hard to believe one would be taken down for subject.

Description : Have you read / heard any of the Republican candidates say anything about the terrorist attack in Colorado Springs on Friday?

Last Answer : I have yet to hear anyone make a salient and reasonable connection to what this deranged wombat did to be characterized as a terrorist. His actions merely serve as a glaring example of the dysfunction of the Government to adequately vet who is able to buy guns and ammunition.

Description : What is the difference between an "attempted terrorist attack" and your basic run of the mill "terrorist attack"?

Last Answer : If you’re on the wrong end of the gun probably nothing. And religion doesn’t change anything.

Description : What are the chances of a terrorist attack on the United States?

Last Answer : 100% – It happens every day that Congress votes.

Description : Would destroying a national land mark (such as Big Ben, Eiffel tower ) be worse for the morale of the nation than a terrorist attack killing 10,000-20,000 civilians?

Last Answer : Are you conducting a survey for your “colleagues”?

Description : Is it possible that the swine flu is a bio-terrorist attack?

Last Answer : Unless someone can provide undeniable evidence that it isn’t, I think that it’s a possibility. Why not?

Description : If our (federal) government were to be disrupted somehow and our elected officials killed (say, in a terrorist attack or nuclear war), isn't the American thing to do for the people themselves to elect new leaders?

Last Answer : are you planning something we should be concerned about?

Description : Do you usually think if you're in a busier place, lest they explode or shoot right now?

Last Answer : Honestly, I used to flash this thing, and I also fear my loved ones when I know they are in a place that could be tempting for a terrorist.

Description : 2001 Terrorist attack in America is referred as: (a) 9/11 (b) 11/9 (c) 10/11 (d) 11/01

Last Answer : (a) 9/11

Description : The site that played a major role during the terrorist attack on Mumbai (26/11) in 2008 was (A) Orkut (B) Facebook (C) Amazon.com (D) Twitter

Last Answer : Answer: A The gunman who survived said that the attackers had used Google Earth to familiarise themselves with the locations of buildings used in the attacks. The Mumbai attack ... no investment in technology of (intelligence, surveillance and reconnaissance) platforms or anything like that 

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Can a cyber attack program (like Stuxnet) be turned around, 'decoded' or something and used against other targets?

Last Answer : My understanding is that stuxnet contained code for a programmable logic controller (PLC) that's part of the target hardware that regulates the uranium centrifuges. This would be very device-specific & not ... purpose. Not that reverse-engineering the worm/virus didn't give them ideas of their own

Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack

Last Answer : c) Patent

Description : ......................is the term which simply means the reporting of information that helps people cope with their daily lives and it is the bread and butter of magazines. a) Service Journalism b) Yellow Journalism c) Sports Journalism d) Chequebook Journalism

Last Answer : a) Service Journalism

Description : What is the background of the bomb attack in Sri Lanka in 2019 ?

Last Answer : Sri Lanka has a long history of terrorism. Most of the attacks were carried out by the Liberation Tigers of Tamil Eelam (LTTE) and the Marxist-Leninist , Communist Party Janata Mukti Peramuna (JVP). The ... end of Sri Lanka's civil war in 2009 that the country has witnessed a major militant attack.

Description : An email bomb is also known as a ___ a) Letter bomb b) Internet c) Banner d) Attack

Last Answer : a) Letter bomb

Description : Which of the following is an Email attack : a. Hacking b. Decrypting c. Bomb d. Banner

Last Answer : d. Banner

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : What will be the long term view of terrorism?

Last Answer : Terrorism was, is, and probably always will be, a method employed by extremists of any sort that lack or can not see any other method to achieve their goals.

Description : The term “Yellow Journalism” refers to (A) Sensational news about terrorism and violence (B) Sensationalism and exaggeration to attract readers / viewers. (C) Sensational news about arts and culture. (D) Sensational news prints in yellow paper. 

Last Answer : (B) Sensationalism and exaggeration to attract readers / viewers.

Description : The term ‘Computer’ is derived from a. Greek language b. Sanskrit language c. Latin language d. German language

Last Answer : c. Latin language

Description : The term 'computer ethics' was first coined by- a)Anne Piere b)Walter Maner c)Charles Babbage d)None of the above

Last Answer : b)Walter Maner

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : What is the name for direct computer to computer transfer of transaction information contained in business document? a) Internet commerce b) E-commerce c) Transaction information transfer d) Electronic data interchange

Last Answer : d) Electronic data interchange

Description : What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents? a. internet commerce b. e-commerce c.transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize

Description : Publishing false information in internet is an issue ofa. Computer ethics b. Morality c. Computer equity d. Digital Divide

Last Answer : a. Computer ethics

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize