SlideShare a Scribd company logo
1 of 15
A software designer has realized that a soon-to-be released
version of a popular game contains a flaw that will make it
especially vulnerable to hacking. The way best to protect
against the exploitation of this flaw will involve:
A. setting up a firewall
B. issuing a patch
C. update antivirus software
D. change the graphic user interface
E. guarding against spoofing
A particular business has found its servers with firewalls
subject to frequent port 80 attacks. To learn more about these
attacks, the business decided to:
A. set up a honeypot
B. update its antivirus software
C. remove its firewall
D. harden all systems that face the Internet
E. engage in pharming
Having decided to shut down access to the servers of a large
multinational business, hackers have:
A. engaged in spamming
B. thwarted the business' firewalls
C. launched a distributed denial of service attack
D. defeated the biometric information safeguards
E. begun a sophisticated program of phishing
A type of encryption protocol is called Special Spoofing
Layering (SSL).
True
False
A cybersecurity specialist, hired to test the security of a client's
servers, starts by looking at the long identification strings
associated with each server. So, the specialiast is looking at:
A. firewalls
B. antivirus systems
C. certificates
D. remote access protocols
E. port 80 access
Virtual private networks are to computers as inbound proxy
servers are to
A. smartphones
B. firewalls
C. antivirus systems
D. remote access protocols
E. USB drives
Being able to inspect information packets in a stream of
network traffic is to a firewall as a triggering mechanism that
detects changes in the environment is to:
A. an antivirus system
B. secure socket layering
C. a Demilitarized Zone
D. patches
E. tripwire
Cryptographic algorithms rely upon confusion and diffusion.
True
False
Time sharing is cloud computing as ARPANET is to
A. a Demilitarized Zone
B. Identity management systems
C. the Internet
D. Intrusion protection systems
E. web access firewalls
An Intrusion prevention system compares virus signatures with
what viruses would look like as they traveled across the
network.
True
False
In chapter 2 of the Cyber Security Policy Handbook text, the
authors quote Hubbard: "Ineffective risk management methods
that somehow manage to become standard spread vulnerability
to everything they touch." Explain what that quote means.
Given an example to support your answer.
Maximum number of characters (including HTML tags added
by text editor): 32,000
At the time of the publication of the article, Brooks says that
there are four types of malevolent software programs, which
include:
A. directed denial of service attacks
B. logic bombs
C. spoofing
D. spamming
E. firewall sabotaging
Under a theory of recovery in tort for product liability, potential
plaintiffs who used software defectively infected by a virus
would include:
A. the purchaser
B. the software company
C. the ISPs
D. data repositories
E. bulletin board system operators
When a court would assess a plaintiff's claim for negligence
against a software programmer, it likely would find that the
standard of care would be that which a reasonable or prudent
software programmer would do under the circumstances.
True
False
Which one of the following could a tortfeasor expect to avoid
having to face liability for committing, where the tortfeasor
intentionally released a worm onto the Internet?
A. negligence
B. trespass to chattels
C. conversion
D. nuisance
E. interference with contract relations.
A trojan horse could release a virus.
True
False
An action in intentional tort could arise from a failure to
exercise reasonable care to warn a user of a virus contained in
software.
True
False
Given the foreseeability of injury to all who had personal
information stored in a database, data possessors most often
will have a duty to exercise reasonable care to protect data from
intruders.
True
False
The party in the best position to win an action in common law
negligence against a database possessor, according to Johnson,
will be:
A. the Internet Service Provider
B. State law enforcement, such as a state police organization
C. a business customer
D. a non-profit organization
E. Federal law enforcement, such as the F.B.I.
According to Johnson, the best source of guidance that data
possessors can get about meeting a duty of care should come
from:
A. other data possessors
B. plaintiffs
C. international law
D. insurers
E. those convicted of crimes involving databases
An argument against imposing a burden against unauthorized
access to a database would involve:
A. the impact of breach of duty of care upon the community
B. the kinds of losses that a database possessor might have to
bear
C. the difficulty of creating an industry-wide standard
D. the availability of insurance
E. how the risk of loss would deter a database possessor
from ignoring the dangers that could arise for negligently
protecting the data in the defendant's possession.
Given the list of federal crimes at
http://www.law.cornell.edu/wex/computer_and_internet_fraud,
the most common crime associated with these is:
A. destruction of property
B. disorderly conduct
C. fraud
D. vandalism
E. electronic robbery
One definition of a Zero-Day vulnerability is that the software
is obviously flawed from the moment it is released to the
general public for use.
True
False
Most likely, a cybercrime will be against a:
A. non-profit organization
B. non-profit organization's property
C. government agency
D. person's property
E. law enforcement agency
Although stolen data might not be considered tangible property,
in the way that a laptop is tangible, if a court did consider the
stolen data to be tangible, then an offense that a thief could then
face would be:
A. assault
B. vandalism
C. possession of stolen property
D. destruction of stolen property
E. computer sabotage
Identify who is not typically part of a financial transaction
involving the use of a credit card to purchase an item.
A. purchaser
B. credit card company
C. merchant
D. thief
E. credit card company's bank
Another criminal enterprise includes infecting computers, via a
virus, so as to create a collection of compromised personal
computers. The criminal has created a:
A. server farm
B. botnet
C. an online crime ecosystem
D. a network listening service
E. nothing; this cannot happen
A traditional view towards cybercrime might mean overlooking
what kind of cybersecurity problem
A. an insider threat
B. the vulnerability of business websites
C. computer networks that thieves use to attack a website
D. electronic fraud
E. "logic bombs"
Identify at least five of the elements of the cyber underground
economy. Then, make the case for why one of those five plays
the greatest role in maintaining the cyber underground
economy.
Maximum number of characters (including HTML tags added
by text editor): 32,000
Make a persuasive case that a virus would cause more harm to a
networked computer or make a persuasive case that a worm
would cause more harm to a networked computer.

More Related Content

Similar to A software designer has realized that a soon-to-be released vers

Identify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdfIdentify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdfvenkt12345
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersUnited Security Providers AG
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comVirendra Kumar Dubey
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdfAliza Oscar
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"dogallama
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxssuser2209e8
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 

Similar to A software designer has realized that a soon-to-be released vers (20)

Identify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdfIdentify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdf
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Wa
WaWa
Wa
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
English in written
English in writtenEnglish in written
English in written
 

More from latashiadegale

Adolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to tAdolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to tlatashiadegale
 
Advanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescribAdvanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescriblatashiadegale
 
Aegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around CycladicAegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around Cycladiclatashiadegale
 
Aegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around CycladAegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around Cycladlatashiadegale
 
Advocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. WAdvocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. Wlatashiadegale
 
After careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing compliancAfter careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing complianclatashiadegale
 
Affirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controveAffirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controvelatashiadegale
 
Adequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequaAdequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequalatashiadegale
 
Affirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the followingAffirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the followinglatashiadegale
 
Advances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creatAdvances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creatlatashiadegale
 
Advertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adverAdvertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adverlatashiadegale
 
Advanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign skiAdvanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign skilatashiadegale
 
Advanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescrAdvanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescrlatashiadegale
 
address the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHoaddress the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHolatashiadegale
 
Address the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and eAddress the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and elatashiadegale
 
Address the following in 1–2 pages  Explain the followin
Address the following in 1–2 pages     Explain the followinAddress the following in 1–2 pages     Explain the followin
Address the following in 1–2 pages  Explain the followinlatashiadegale
 
Address both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-framAddress both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-framlatashiadegale
 
Add the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. TheAdd the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. Thelatashiadegale
 
Add a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that incluAdd a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that inclulatashiadegale
 
Acute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  serAcute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  serlatashiadegale
 

More from latashiadegale (20)

Adolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to tAdolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to t
 
Advanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescribAdvanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescrib
 
Aegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around CycladicAegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around Cycladic
 
Aegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around CycladAegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around Cyclad
 
Advocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. WAdvocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. W
 
After careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing compliancAfter careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing complianc
 
Affirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controveAffirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controve
 
Adequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequaAdequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequa
 
Affirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the followingAffirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the following
 
Advances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creatAdvances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creat
 
Advertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adverAdvertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adver
 
Advanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign skiAdvanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign ski
 
Advanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescrAdvanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescr
 
address the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHoaddress the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHo
 
Address the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and eAddress the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and e
 
Address the following in 1–2 pages  Explain the followin
Address the following in 1–2 pages     Explain the followinAddress the following in 1–2 pages     Explain the followin
Address the following in 1–2 pages  Explain the followin
 
Address both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-framAddress both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-fram
 
Add the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. TheAdd the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. The
 
Add a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that incluAdd a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that inclu
 
Acute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  serAcute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  ser
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 

A software designer has realized that a soon-to-be released vers

  • 1. A software designer has realized that a soon-to-be released version of a popular game contains a flaw that will make it especially vulnerable to hacking. The way best to protect against the exploitation of this flaw will involve: A. setting up a firewall B. issuing a patch C. update antivirus software D. change the graphic user interface E. guarding against spoofing A particular business has found its servers with firewalls subject to frequent port 80 attacks. To learn more about these attacks, the business decided to: A. set up a honeypot B. update its antivirus software
  • 2. C. remove its firewall D. harden all systems that face the Internet E. engage in pharming Having decided to shut down access to the servers of a large multinational business, hackers have: A. engaged in spamming B. thwarted the business' firewalls C. launched a distributed denial of service attack D. defeated the biometric information safeguards E. begun a sophisticated program of phishing A type of encryption protocol is called Special Spoofing Layering (SSL).
  • 3. True False A cybersecurity specialist, hired to test the security of a client's servers, starts by looking at the long identification strings associated with each server. So, the specialiast is looking at: A. firewalls B. antivirus systems C. certificates D. remote access protocols E. port 80 access Virtual private networks are to computers as inbound proxy servers are to
  • 4. A. smartphones B. firewalls C. antivirus systems D. remote access protocols E. USB drives Being able to inspect information packets in a stream of network traffic is to a firewall as a triggering mechanism that detects changes in the environment is to: A. an antivirus system B. secure socket layering C. a Demilitarized Zone D. patches E. tripwire Cryptographic algorithms rely upon confusion and diffusion.
  • 5. True False Time sharing is cloud computing as ARPANET is to A. a Demilitarized Zone B. Identity management systems C. the Internet D. Intrusion protection systems E. web access firewalls An Intrusion prevention system compares virus signatures with what viruses would look like as they traveled across the network.
  • 6. True False In chapter 2 of the Cyber Security Policy Handbook text, the authors quote Hubbard: "Ineffective risk management methods that somehow manage to become standard spread vulnerability to everything they touch." Explain what that quote means. Given an example to support your answer. Maximum number of characters (including HTML tags added by text editor): 32,000 At the time of the publication of the article, Brooks says that there are four types of malevolent software programs, which include: A. directed denial of service attacks B. logic bombs C. spoofing D. spamming
  • 7. E. firewall sabotaging Under a theory of recovery in tort for product liability, potential plaintiffs who used software defectively infected by a virus would include: A. the purchaser B. the software company C. the ISPs D. data repositories E. bulletin board system operators When a court would assess a plaintiff's claim for negligence against a software programmer, it likely would find that the standard of care would be that which a reasonable or prudent software programmer would do under the circumstances. True
  • 8. False Which one of the following could a tortfeasor expect to avoid having to face liability for committing, where the tortfeasor intentionally released a worm onto the Internet? A. negligence B. trespass to chattels C. conversion D. nuisance E. interference with contract relations. A trojan horse could release a virus. True False An action in intentional tort could arise from a failure to
  • 9. exercise reasonable care to warn a user of a virus contained in software. True False Given the foreseeability of injury to all who had personal information stored in a database, data possessors most often will have a duty to exercise reasonable care to protect data from intruders. True False The party in the best position to win an action in common law negligence against a database possessor, according to Johnson, will be: A. the Internet Service Provider
  • 10. B. State law enforcement, such as a state police organization C. a business customer D. a non-profit organization E. Federal law enforcement, such as the F.B.I. According to Johnson, the best source of guidance that data possessors can get about meeting a duty of care should come from: A. other data possessors B. plaintiffs C. international law D. insurers E. those convicted of crimes involving databases An argument against imposing a burden against unauthorized access to a database would involve:
  • 11. A. the impact of breach of duty of care upon the community B. the kinds of losses that a database possessor might have to bear C. the difficulty of creating an industry-wide standard D. the availability of insurance E. how the risk of loss would deter a database possessor from ignoring the dangers that could arise for negligently protecting the data in the defendant's possession. Given the list of federal crimes at http://www.law.cornell.edu/wex/computer_and_internet_fraud, the most common crime associated with these is: A. destruction of property B. disorderly conduct C. fraud D. vandalism
  • 12. E. electronic robbery One definition of a Zero-Day vulnerability is that the software is obviously flawed from the moment it is released to the general public for use. True False Most likely, a cybercrime will be against a: A. non-profit organization B. non-profit organization's property C. government agency D. person's property E. law enforcement agency
  • 13. Although stolen data might not be considered tangible property, in the way that a laptop is tangible, if a court did consider the stolen data to be tangible, then an offense that a thief could then face would be: A. assault B. vandalism C. possession of stolen property D. destruction of stolen property E. computer sabotage Identify who is not typically part of a financial transaction involving the use of a credit card to purchase an item. A. purchaser B. credit card company C. merchant D. thief
  • 14. E. credit card company's bank Another criminal enterprise includes infecting computers, via a virus, so as to create a collection of compromised personal computers. The criminal has created a: A. server farm B. botnet C. an online crime ecosystem D. a network listening service E. nothing; this cannot happen A traditional view towards cybercrime might mean overlooking what kind of cybersecurity problem A. an insider threat B. the vulnerability of business websites
  • 15. C. computer networks that thieves use to attack a website D. electronic fraud E. "logic bombs" Identify at least five of the elements of the cyber underground economy. Then, make the case for why one of those five plays the greatest role in maintaining the cyber underground economy. Maximum number of characters (including HTML tags added by text editor): 32,000 Make a persuasive case that a virus would cause more harm to a networked computer or make a persuasive case that a worm would cause more harm to a networked computer.