U.S. Cyber Threats and National Security
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

According to the passage, which of the following is the most important emerging cyber threat to the United States' national security?

  • Exploitation of mobile devices and the Internet of Things (correct)
  • Adversarial cyber operations attempting to compromise military technology
  • Intellectual property loss due to cyberspace activities
  • Targeted attacks on critical infrastructure
  • What does the passage say about the vulnerability of the United States' networks, systems, and information?

  • They are only vulnerable to targeted attacks on critical infrastructure.
  • They are secure from exploitation of technological components like mobile devices and IoT.
  • They are well-protected from state and non-state actors.
  • They are at risk from a wide range of malicious cyberspace activities. (correct)
  • According to the passage, how do adversaries target U.S. military personnel on social media?

  • To compromise national defense through targeted cyber-attacks.
  • To spread disinformation and influence operations.
  • To steal intellectual property related to military technology.
  • To gain insight into the disposition and movement of U.S. forces. (correct)
  • What does the passage say about the capabilities of the U.S.'s top adversaries in cyberspace?

    <p>They are developing and using cyberspace to increase their operational reach.</p> Signup and view all the answers

    What does the passage say about the U.S.'s current cyber defenses and cybersecurity investments?

    <p>They are being challenged by the capabilities of the U.S.'s adversaries.</p> Signup and view all the answers

    Which of the following is NOT identified in the passage as a target of adversarial cyber operations?

    <p>U.S. intellectual property related to commercial technology.</p> Signup and view all the answers

    What is the primary purpose of China's Digital Silk Road initiative?

    <p>To promote global economic dependency on China</p> Signup and view all the answers

    Which Chinese organization is responsible for cyber espionage operations targeting foreign governments and companies?

    <p>Ministry of State Security (MSS)</p> Signup and view all the answers

    What was the purpose of Operation Cloud Hopper, carried out by the Chinese Ministry of State Security (MSS)?

    <p>To gain access to sensitive data from foreign governments and companies</p> Signup and view all the answers

    Which countries are considered the main adversaries of the United States in cyberspace?

    <p>China and Russia</p> Signup and view all the answers

    What is the purpose of integrating cyberattack capabilities into the militaries of adversaries like Russia and China?

    <p>To deny or disrupt networked U.S. forces and infrastructure</p> Signup and view all the answers

    How can the United States counter malicious cyberattacks, according to the text?

    <p>By partnering with allies to improve their cyberspace defenses</p> Signup and view all the answers

    More Like This

    Cyber Threats Quiz
    3 questions

    Cyber Threats Quiz

    PicturesqueSapphire avatar
    PicturesqueSapphire
    Cyber Threats and Hacking Techniques Quiz
    6 questions
    Use Quizgecko on...
    Browser
    Browser