Coursera Answers

International Cyber Conflicts Coursera Quiz Answers

Hello Friends in this article i am gone to share Coursera Course: International Cyber Conflicts All Weeks Quiz Answers with you..

International Cyber Conflicts
The State University of New York

Enroll Link: International Cyber Conflicts


International Cyber Conflicts Coursera Quiz Answers

WEEK 1 QUIZ ANSWERS

Quiz 1: Introduction to Cybercrime

Question 1)
From the options below, select the two fundamental issues that make solving international cyber conflicts difficult?

  • Problems with attack attribution due to anonymous nature of Internet
  • Technical difficulties in operating the Internet
  • Jurisdictional issues due to Internet transcending national boundaries
  • None of the above

Question 2)
Identify a recognized type of cyber crime from the following options.

  • Hacking
  • Extortion
  • Identity theft
  • Cyber bullying
  • Child soliciting and abuse
  • All of the above

Question 3)
Which of the following could be an example of “positive deviance”? Select all that apply.

  • Stealing and selling intellectual property
  • Testing security vulnerabilities of a security system
  • Threatening national security
  • Gaining unauthorized access to a computer

Question 4)
What types of hackers promote their political goals or ideas using non-violent hacking?

  • Hacktivists
  • Black hat hackers
  • Script Kiddies
  • Cyber-punks

Question 5)
What are the fundamental parameters of motivated behavior?

  • Direction
  • Initiation
  • Persistence
  • Intensity

Question 6)
It is true to say that motivated behavior is __________.

  • More like a trait, varying based on personal characteristic
  • More like a state variable, varying from situation to situation

Question 7)
Which of the hacking motives below is related to the psychological drive of mastery?

  • Financial gain
  • Challenge
  • Recognition
  • Curiosity
  • Ideology
  • All of the above

Question 8)
Which of the outcomes below are driven by both internal/intrinsic and external/extrinsic motivations? Select all that apply.

  • Self satisfaction
  • Mastery
  • Fun
  • Fame
  • Monetary gain
  • Status
  • Pride

Question 9)
What are some of the motives for hacking? Select all that apply.

  • Ideology
  • Greed
  • Challenge
  • Status
  • Curiosity
  • None of the above

Question 10)
What does IP stand for?

  • Interest Protocol
  • Internal Packets
  • Internet Packets
  • Internet Protocol

Question 11)
Identify a recognized type of cyber crime from the following options.

  • Hacking
  • Phishing
  • Identity theft
  • Cyber stalking
  • Cyber bullying

WEEK 2 QUIZ ANSWERS

Quiz 2: Internet Governance

Question 1)
What does IP stand for?

  • Internal Packets
  • Interest Protocol
  • Internet Packets
  • Internet Protocol

Question 2)
The packet-switching mechanism involves

  • The separation of data into packets
  • The sending of packets of data across multiple nodes
  • Each packet of data has address and sender information
  • None of the above

Question 3)
A single IP address can refer to how many domain names?

  • Two
  • Multiple
  • Three
  • One

Question 4)
Who manages the Domain Name Server?

  • Internet Service Provider
  • Your own organization
  • Government offices
  • All of the above

Question 5)
What organization manages the Domain Name System?

  • ARPANET
  • ICANN
  • Domain Name Registrar
  • IP
  • IFAN

Question 6)
What event triggered a global debate about who controls Internet policy?

  • The 2007 cyber attacks between Russia and Estonia
  • Death of John Postel and the emerging rights of ICANN to govern
  • The 2006 conferences of global leaders and ICANN
  • Edward Snowden’s revelation about NSA spying in 2013

Question 7)
What are the main competing interests groups in internet governance

  • The U.S., Russia and China
  • Private sector, civil society and nation states
  • Governments, nations and private groups
  • The U.S., West Europe and the East
  • Nation states, governments and non-profits

Question 8)
The main source of criticism towards ICANN stems from:

  • Proliferation of an arms race to combat the cyber warfare and the proliferation of splinter groups
  • Its poor peformance in matters of cyber warfare and its support for policies that proliferate cyber crime
  • Feeling of insecurity for lack of control of Internet policy and issues regards proper rights implementation
  • Issues regarding managerial performance of ICANN and unfair legacy control by the U.S. over ICANN and the DNS

Question 9)
The World Trade Organization implements the TRIPS aggreement, which establishes a number of common rules that members must respect in the domain of intellectual property rights. However, the Internet has allowed people to violate property rights to an enormous extent.

  • True
  • False

Question 10)
What does “Internet Balkanization” mean?

  • The move of Internet governance to the Balkans
  • The division of the Internet governance amoung multiple stakeholders
  • Split of the Internet protocol into several pieces
  • The attempt of countries to create their own Internet

WEEK 3 QUIZ ANSWERS

Quiz 3: Cyberwarfare and International Conflicts

Question 1)
Since 1999 cyber attacks have caused large-scale injury, loss of life and destruction of property.

  • True
  • False

Question 2)
Identify the item which has NOT been recognized as a mode of cyberwarfare attack and activity.

  • Information gathering and espionage
  • Disruption of services
  • Physical system attacks
  • Social media and propaganda
  • None of the above

Question 3)
The countries who conduct powerful cyber attacks are:

  • Russia and China
  • China and U.S.
  • U.S. and Russia
  • All of the above

Question 4)
What’s the current level of threat of cyber attack of terrorist activity, aka cyber terrorism?

  • Cyber terrorism threat has been largely unfounded
  • Cyber terrorism threat is somewhat likely
  • Cyber terrorism often happened in the past but no longer a big issue
  • Cyber terrorism threat is extremely likely and dangerous

Question 5)
What’s an example of a real event for an activity of non-state actors?

  • Citizens in Russia working to attack computers in Estonia
  • Bank personel in China using computers to attack Australia
  • Groups of thugs in Egypt using cyber attacks on Tunisia
  • None of the above

Question 6)
There are a defined set of cyber attack characteristics that can clearly identify the different types of actor motivations.

  • False
  • True

Question 7)
A 2009 attack on more than 30 companies including Google and Yahoo stealing intellectual property was attributed to Taiwan. Where were the hackers traced back to?

  • China
  • Iran
  • U.S.
  • Turkey
  • Estonia

Question 8)
___________ of infrastructure means a failure in one element could cause cascading failures on multiple _____________ infrastructure components.

Choose the BEST set of terms to complete the phrase above:

  • interdependence; critical
  • association; cyber
  • criticality; complex
  • internet; cyber
  • comparability; internet

Question 9)
Techniques for censoring information include the following, except:

  • Web feed blocking
  • IT blocking
  • URL and packet filtering
  • DNS filtering

Question 10)
__________ are machines connected to the Internet who have been infected by a virus or spyware and may be used by others to cause damage to any computer or networks, including by “denial of service attacks” where multiple __________ can suck up the resources of certain critical computers connected to the Internet.

  • Bot nets; bots
  • Modems, IPs
  • Trojans; viruses
  • Computers; spams

WEEK 4 QUIZ ANSWERS

Quiz 4: Cyberwarfare and International Law

Question 1)
What does the terminology jus ad bellum refer to?

  • Principles used to include laws of war into cyber security
  • Principles that can be used to justify going to war
  • Acronym that identifies specific international war treaties
  • Laws adopted in the East and West for cyber warfare

Question 2)
Jus ad bellum principles are included in the following document:

  • United Nations Charter
  • Humanitarian Law of the UN
  • Rights to go to War Law
  • International Arms Conflict Law
  • Laws of International Conflicts

Question 3)
International Humanitarian Law prohibits countries from deciding to enter a war that causes considerable damage.

  • False
  • True

Question 4)
One of the main issues with cyberwarfare is that there is _____________ in the _____________ of attacks.

  • simplicity; majority
  • espionage; majority
  • ambiguity; attribution
  • data theft; minority

Question 5)
Select the types of attacks in which attribution has been a prevalent problem:

  • Attacks through the Internet
  • Attacks through malware preloaded in hardware/software
  • Attacks breaking confidence building measures
  • Cyberterrorist attacks on critical infrastructure
  • None of the above

Question 6)
What is an important reason for difficulties in international agreement on cyber security?

  • Differences in legal norms
  • Different definitions of crime
  • Lack of agreement on data access
  • Jourisdicational boundaries and sovereingty
  • All of the above

Question 7)
What is the main point of contention regarding the Council of Europe Convention on Cybercrime?

  • Computer and data access for countries across jurisdictional lines
  • Cooperation to address attacks over country lines
  • The inclusion of Russia and Japan as potential disruptors for the agreement
  • None of the above

Question 8)
Although attribution it is difficult, style of coding, hints about original language of hackers, purpose of attack and other analytical techniques allow us to make good educated guesses about source of attacks.

  • False
  • True

Question 9)
Below are typical actions to establish Confidence Building Measures, except:

  • Free movement of citizens
  • Communication mechanisms
  • Exchange of personnel and joint exercises
  • Establishing prohibited weapons/targets
  • Exchange of information about assets

Question 10)
All below are types of measures that can be used for confidence building, except:

  • Juridification
  • Communication
  • Transparency
  • Constraint
  • Verification

WEEK 5 QUIZ ANSWERS

Quiz 5: Interpersonal Trust and Trust among Nations

Question 1)
What does the ultimatum game say about axioms of human behavior?

  • Individuals do not generally adhere to selfishness axioms but behave according to certain social norms
  • Individuals express selfishness behavior in their actions and maximize their gains
  • Social preferences are expressed via the holding and keeping of money for later investment
  • Investment choices do not generally adhere to social or selfish principles but to attention to laws

Question 2)
The dictator study supports other studies that show across cultures individuals exhibit ____________________.

  • a lack of selfishness when sharing resources accros cultures
  • stronger selfshiness in places such as deserts and savanna-woolands
  • giving of more resources under strenuous and hardship conditions
  • a lack of social preference when sharing resources

Question 3)
Why have social norms developed to induce us to share?

  • Societies reciprocate when all items are given and received
  • Reciprocity ends with mutually asserted agreements
  • Socities and groups gain from positive reciprocity
  • Reciprocitiy produce positive emotions if involving large sums of money

Question 4)
One of the important aspects of the trust game is time because in repeated interactions individuals learn how the other party responds and base their future actions on these learned experiences.

  • False
  • True

Question 5)
What are the three main components in a trust relationship:

  • specific goal
  • specific partner
  • social norms
  • self
  • motivation

Question 6)
We are more likely to trust people if they stand to lose something.

  • True
  • False

Question 7)
Why would nations feel vulnerable in the context of cyber security?

  • Defensive not as strong as offensive
  • Anonimty
  • New advanced forms of espionage
  • Potential attacks on infrastructure
  • None of the above

Question 8)
To achieve a positive-sum scenario, individuals at play need to

  • Trust and collaborate
  • Trust and compete
  • Freely compete
  • Both people should defect

Question 9)
What are the similarities of physical war scenarios with cyber war scenarios?

  • Superiority of offense
  • Use of weapons for tactical and strategical purposes
  • Possibility of automated responses
  • None of the above

Question 10)
What are the lessons for international cooperation?

  • Understanding how other party views the issue is important; both should have same understanding of consequences
  • Strategies for what to do that does not involve mutual destruction (governing policies for when to use cyber weapons)
  • Developing arms control treaties with positive sum scenarios
  • None of the above