Professional Documents
Culture Documents
Recap Exercise 2
Recap Exercise 2
information manipulation and interference. For each question, you must write one word in
each gap to complete the text below.
Phrase 1: False _____ _____ is when headlines, images or captions are not in sync with the
content. unanswered
Phrase 5: ____ Impostor content _____ content occurs when genuine sources are
Impostor content
impersonated. unanswered
Phrase 6: _____ Misleading content ______ content is the misleading use of information, for
Misleading content
example by presenting opinions as facts. unanswered
Phrase 7: __ Satire and parody _____ is presenting humorous but false stories as if they are
Satire and parody
true. unanswered
Question 3: What are the warning signs that help us spot fake news?
Phrase 1: Fake news come from websites that use ___ clickbait ____ titles or stories.
clickbait
unanswered
grammar
Phrase 2: Often, fake news content employs poor ___grammar_____.
unanswered
caps
Phrase 3: Fake news titles are often written all in __caps___. unanswered
emotional
Phrase 4: The content has great _____emotional_____ appeal. unanswered
Phrase 1: We can look at ______ Credentials or Authorship _______, this means asking
questions such as: Who has written this article? What expertise do they have in the field?.
Credentials or Authorship
unanswered
Phrase 2: We can try and identify the __bias___, through questions such as: Is the writing
bias
representative of only one point of view?. unanswered
Phrase 3: We can try to analyse the ____effect____ produced, by asking the following
questions: What emotions does the information attempt to evoke, if any? How does the
effect
information impact my/our feelings and opinions?. unanswered
Phrase 2: ____Debunking______ aims to correct false information after it has appeared and
Debunking
to prevent others from believing what is verifiably false information.
unanswered
Phrase 3: The 5 tactics of FIMI are: dismiss, ____distort_____, distract, dismay and divide.
distort
unanswered
Phrase 4: Techniques can be sorted according to the three stages of the operation: plan,
preparation
______ preparation ______ and execution. unanswered
Phrase 1: It can be carried out by state and non-state actors, including their ___proxies_____
proxies
inside and outside of their own territory. unanswered
Phrase 2: Foreign threat actors conduct their operations via local proxies, a process known as
domestication
the _____domestication_________ of influence operations. unanswered
Question 8: What are the courses of action available in countering FIMI incidents?
Question 9: Which are the fixe steps in the FIMI Analysis cycle?
Phrase 1: The first step is strategic _____monitoring_______, which entails mapping the
monitoring
ecosystem of known FIMI assets used by a threat actor. unanswered
Phrase 2: The second step is prioritisation and ___triage_____, which consists of filtering
triage
FIMI-related activities to high-priority and potentially harmful incidents.
unanswered
Phrase 3: The third step is incident analysis and ____ evidence collection ____ collection,
consisting of carrying out open source analysis, focused on understanding the connections
evidence collection
between different channels and the TTPs they employ. unanswered
Phrase 4: The fourth step is knowledge pooling and sharing, whereby the analysis is shared
with key ______actors________ who are in a position to react to the incident.
actors
unanswered
Phrase 5: The last step is situation ____awareness _____, which can be achieved by a
awareness
continuous optimisation and reflection on the previous steps. unanswered
You have used 0 of 3 attempts