Chapter 16 Test Bank Docx Cyber Conflict Great Power Age - Updated Test Bank | Strategy in World 7e Baylis by John Baylis. DOCX document preview.

Chapter 16 Test Bank Docx Cyber Conflict Great Power Age

Chapter 16

Type: multiple choice question

Title: Chapter 16 - Question 01

01) Which of the following is not part of Beijing’s triadic approach to information control?

a. The Great Firewall

b. The Great Cannon

c. The Great Spear

d. The Social Credit System

Type: multiple choice question

Title: Chapter 16 - Question 02

02) Cyber space includes which of the following?

a. The Internet

b. Cellular technologies

c. Space-based communications

d. All the options given are correct.

Type: multiple choice question

Title: Chapter 16 - Question 03

03) Which of the following is not one of the three layers of cyber space?

a. The physical layer

b. The syntactic layer

c. The psychological layer

d. The cognitive layer

Type: multiple choice question

Title: Chapter 16 - Question 04

04) According to chapter 16, adversarial attempts to influence social behaviour, including voting behaviour and security strategies, are most effective when they take advantage of…

a. attribution errors.

b. the availability heuristic.

c. confirmation bias.

d. All these answers are correct.

Type: true-false

Title: Chapter 16 - Question 05

05) Multinational corporations do much of the work in addressing cyber violations and mitigating the impact of serious malware attacks and are legally allowed to ‘hack back’ against aggressors.

a. True

b. False

Type: true-false

Title: Chapter 16 - Question 06

06) Cyber war is defined in this chapter as ‘the use of digital technologies in military interactions or military affairs in the realm of international relations’.

a. True

b. False

Type: multiple choice question

Title: Chapter 16 - Question 07

07) As of 2021, the beginnings of a new strategy called ‘layered cyber deterrence’ were emerging in…

a. Russia.

b. China.

c. the United States.

d. North Korea.

Type: true-false

Title: Chapter 16 - Question 08

08) More than half of all cyber operations take the form of espionage or intelligence operations that focus on the collection of information from and the dissemination of messages to adversaries.

a. True

b. False

Type: true-false

Title: Chapter 16 - Question 09

09) China’s cyber strategy against the United States and other democracies has largely consisted of digital espionage that is mainly intended to steal intellectual property.

a. True

b. False

Type: true-false

Title: Chapter 16 - Question 10

10) Online radicalization is, in part, a product of the human tendency towards confirmation bias exacerbated by social media algorithms which push belief-affirming and often highly biased content to users.

a. True

b. False

Document Information

Document Type:
DOCX
Chapter Number:
16
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 16 Cyber Conflict – Great Power Age
Author:
John Baylis

Connected Book

Updated Test Bank | Strategy in World 7e Baylis

By John Baylis

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party