Chapter 16 Test Bank Docx Cyber Conflict Great Power Age - Updated Test Bank | Strategy in World 7e Baylis by John Baylis. DOCX document preview.
Chapter 16
Type: multiple choice question
Title: Chapter 16 - Question 01
01) Which of the following is not part of Beijing’s triadic approach to information control?
a. The Great Firewall
b. The Great Cannon
c. The Great Spear
d. The Social Credit System
Type: multiple choice question
Title: Chapter 16 - Question 02
02) Cyber space includes which of the following?
a. The Internet
b. Cellular technologies
c. Space-based communications
d. All the options given are correct.
Type: multiple choice question
Title: Chapter 16 - Question 03
03) Which of the following is not one of the three layers of cyber space?
a. The physical layer
b. The syntactic layer
c. The psychological layer
d. The cognitive layer
Type: multiple choice question
Title: Chapter 16 - Question 04
04) According to chapter 16, adversarial attempts to influence social behaviour, including voting behaviour and security strategies, are most effective when they take advantage of…
a. attribution errors.
b. the availability heuristic.
c. confirmation bias.
d. All these answers are correct.
Type: true-false
Title: Chapter 16 - Question 05
05) Multinational corporations do much of the work in addressing cyber violations and mitigating the impact of serious malware attacks and are legally allowed to ‘hack back’ against aggressors.
a. True
b. False
Type: true-false
Title: Chapter 16 - Question 06
06) Cyber war is defined in this chapter as ‘the use of digital technologies in military interactions or military affairs in the realm of international relations’.
a. True
b. False
Type: multiple choice question
Title: Chapter 16 - Question 07
07) As of 2021, the beginnings of a new strategy called ‘layered cyber deterrence’ were emerging in…
a. Russia.
b. China.
c. the United States.
d. North Korea.
Type: true-false
Title: Chapter 16 - Question 08
08) More than half of all cyber operations take the form of espionage or intelligence operations that focus on the collection of information from and the dissemination of messages to adversaries.
a. True
b. False
Type: true-false
Title: Chapter 16 - Question 09
09) China’s cyber strategy against the United States and other democracies has largely consisted of digital espionage that is mainly intended to steal intellectual property.
a. True
b. False
Type: true-false
Title: Chapter 16 - Question 10
10) Online radicalization is, in part, a product of the human tendency towards confirmation bias exacerbated by social media algorithms which push belief-affirming and often highly biased content to users.
a. True
b. False
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Chapter 14 Conventional Power And Contemporary Warfare, John Ferris
DOCX Ch. 14
Chapter 15 Humanitarian Interv. Peace Ops
DOCX Ch. 15
Chapter 16 Cyber Conflict – Great Power Age
DOCX Ch. 16 Current
Chapter 17 Geopolitics – Ortmann, Whittaker
DOCX Ch. 17
Chapter 18 Chinese Grand Strategy, Oriana Skylar Mastro
DOCX Ch. 18