U.S. Cyber Threats and National Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

According to the passage, which of the following is the most important emerging cyber threat to the United States' national security?

  • Exploitation of mobile devices and the Internet of Things (correct)
  • Adversarial cyber operations attempting to compromise military technology
  • Intellectual property loss due to cyberspace activities
  • Targeted attacks on critical infrastructure

What does the passage say about the vulnerability of the United States' networks, systems, and information?

  • They are only vulnerable to targeted attacks on critical infrastructure.
  • They are secure from exploitation of technological components like mobile devices and IoT.
  • They are well-protected from state and non-state actors.
  • They are at risk from a wide range of malicious cyberspace activities. (correct)

According to the passage, how do adversaries target U.S. military personnel on social media?

  • To compromise national defense through targeted cyber-attacks.
  • To spread disinformation and influence operations.
  • To steal intellectual property related to military technology.
  • To gain insight into the disposition and movement of U.S. forces. (correct)

What does the passage say about the capabilities of the U.S.'s top adversaries in cyberspace?

<p>They are developing and using cyberspace to increase their operational reach. (D)</p> Signup and view all the answers

What does the passage say about the U.S.'s current cyber defenses and cybersecurity investments?

<p>They are being challenged by the capabilities of the U.S.'s adversaries. (A)</p> Signup and view all the answers

Which of the following is NOT identified in the passage as a target of adversarial cyber operations?

<p>U.S. intellectual property related to commercial technology. (D)</p> Signup and view all the answers

What is the primary purpose of China's Digital Silk Road initiative?

<p>To promote global economic dependency on China (A)</p> Signup and view all the answers

Which Chinese organization is responsible for cyber espionage operations targeting foreign governments and companies?

<p>Ministry of State Security (MSS) (C)</p> Signup and view all the answers

What was the purpose of Operation Cloud Hopper, carried out by the Chinese Ministry of State Security (MSS)?

<p>To gain access to sensitive data from foreign governments and companies (D)</p> Signup and view all the answers

Which countries are considered the main adversaries of the United States in cyberspace?

<p>China and Russia (C)</p> Signup and view all the answers

What is the purpose of integrating cyberattack capabilities into the militaries of adversaries like Russia and China?

<p>To deny or disrupt networked U.S. forces and infrastructure (B)</p> Signup and view all the answers

How can the United States counter malicious cyberattacks, according to the text?

<p>By partnering with allies to improve their cyberspace defenses (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cyber Threats Quiz
3 questions

Cyber Threats Quiz

PicturesqueSapphire avatar
PicturesqueSapphire
National Security Theory and Cyber Security
5 questions
Use Quizgecko on...
Browser
Browser