SlideShare a Scribd company logo
A software designer has realized that a soon-to-be released
version of a popular game contains a flaw that will make it
especially vulnerable to hacking. The way best to protect
against the exploitation of this flaw will involve:
A. setting up a firewall
B. issuing a patch
C. update antivirus software
D. change the graphic user interface
E. guarding against spoofing
A particular business has found its servers with firewalls
subject to frequent port 80 attacks. To learn more about these
attacks, the business decided to:
A. set up a honeypot
B. update its antivirus software
C. remove its firewall
D. harden all systems that face the Internet
E. engage in pharming
Having decided to shut down access to the servers of a large
multinational business, hackers have:
A. engaged in spamming
B. thwarted the business' firewalls
C. launched a distributed denial of service attack
D. defeated the biometric information safeguards
E. begun a sophisticated program of phishing
A type of encryption protocol is called Special Spoofing
Layering (SSL).
True
False
A cybersecurity specialist, hired to test the security of a client's
servers, starts by looking at the long identification strings
associated with each server. So, the specialiast is looking at:
A. firewalls
B. antivirus systems
C. certificates
D. remote access protocols
E. port 80 access
Virtual private networks are to computers as inbound proxy
servers are to
A. smartphones
B. firewalls
C. antivirus systems
D. remote access protocols
E. USB drives
Being able to inspect information packets in a stream of
network traffic is to a firewall as a triggering mechanism that
detects changes in the environment is to:
A. an antivirus system
B. secure socket layering
C. a Demilitarized Zone
D. patches
E. tripwire
Cryptographic algorithms rely upon confusion and diffusion.
True
False
Time sharing is cloud computing as ARPANET is to
A. a Demilitarized Zone
B. Identity management systems
C. the Internet
D. Intrusion protection systems
E. web access firewalls
An Intrusion prevention system compares virus signatures with
what viruses would look like as they traveled across the
network.
True
False
In chapter 2 of the Cyber Security Policy Handbook text, the
authors quote Hubbard: "Ineffective risk management methods
that somehow manage to become standard spread vulnerability
to everything they touch." Explain what that quote means.
Given an example to support your answer.
Maximum number of characters (including HTML tags added
by text editor): 32,000
At the time of the publication of the article, Brooks says that
there are four types of malevolent software programs, which
include:
A. directed denial of service attacks
B. logic bombs
C. spoofing
D. spamming
E. firewall sabotaging
Under a theory of recovery in tort for product liability, potential
plaintiffs who used software defectively infected by a virus
would include:
A. the purchaser
B. the software company
C. the ISPs
D. data repositories
E. bulletin board system operators
When a court would assess a plaintiff's claim for negligence
against a software programmer, it likely would find that the
standard of care would be that which a reasonable or prudent
software programmer would do under the circumstances.
True
False
Which one of the following could a tortfeasor expect to avoid
having to face liability for committing, where the tortfeasor
intentionally released a worm onto the Internet?
A. negligence
B. trespass to chattels
C. conversion
D. nuisance
E. interference with contract relations.
A trojan horse could release a virus.
True
False
An action in intentional tort could arise from a failure to
exercise reasonable care to warn a user of a virus contained in
software.
True
False
Given the foreseeability of injury to all who had personal
information stored in a database, data possessors most often
will have a duty to exercise reasonable care to protect data from
intruders.
True
False
The party in the best position to win an action in common law
negligence against a database possessor, according to Johnson,
will be:
A. the Internet Service Provider
B. State law enforcement, such as a state police organization
C. a business customer
D. a non-profit organization
E. Federal law enforcement, such as the F.B.I.
According to Johnson, the best source of guidance that data
possessors can get about meeting a duty of care should come
from:
A. other data possessors
B. plaintiffs
C. international law
D. insurers
E. those convicted of crimes involving databases
An argument against imposing a burden against unauthorized
access to a database would involve:
A. the impact of breach of duty of care upon the community
B. the kinds of losses that a database possessor might have to
bear
C. the difficulty of creating an industry-wide standard
D. the availability of insurance
E. how the risk of loss would deter a database possessor
from ignoring the dangers that could arise for negligently
protecting the data in the defendant's possession.
Given the list of federal crimes at
http://www.law.cornell.edu/wex/computer_and_internet_fraud,
the most common crime associated with these is:
A. destruction of property
B. disorderly conduct
C. fraud
D. vandalism
E. electronic robbery
One definition of a Zero-Day vulnerability is that the software
is obviously flawed from the moment it is released to the
general public for use.
True
False
Most likely, a cybercrime will be against a:
A. non-profit organization
B. non-profit organization's property
C. government agency
D. person's property
E. law enforcement agency
Although stolen data might not be considered tangible property,
in the way that a laptop is tangible, if a court did consider the
stolen data to be tangible, then an offense that a thief could then
face would be:
A. assault
B. vandalism
C. possession of stolen property
D. destruction of stolen property
E. computer sabotage
Identify who is not typically part of a financial transaction
involving the use of a credit card to purchase an item.
A. purchaser
B. credit card company
C. merchant
D. thief
E. credit card company's bank
Another criminal enterprise includes infecting computers, via a
virus, so as to create a collection of compromised personal
computers. The criminal has created a:
A. server farm
B. botnet
C. an online crime ecosystem
D. a network listening service
E. nothing; this cannot happen
A traditional view towards cybercrime might mean overlooking
what kind of cybersecurity problem
A. an insider threat
B. the vulnerability of business websites
C. computer networks that thieves use to attack a website
D. electronic fraud
E. "logic bombs"
Identify at least five of the elements of the cyber underground
economy. Then, make the case for why one of those five plays
the greatest role in maintaining the cyber underground
economy.
Maximum number of characters (including HTML tags added
by text editor): 32,000
Make a persuasive case that a virus would cause more harm to a
networked computer or make a persuasive case that a worm
would cause more harm to a networked computer.

More Related Content

Similar to A software designer has realized that a soon-to-be released vers

T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptx
tumainjoseph
 
Identify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdfIdentify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdf
venkt12345
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
United Security Providers AG
 
Cybercrimes
CybercrimesCybercrimes
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
SheetalKamble39
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Virendra Kumar Dubey
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf
Aliza Oscar
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
 
Wa
WaWa
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
smile790243
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
dogallama
 
Cybertorts
CybertortsCybertorts
Cybertorts
panabaha
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
ssuser2209e8
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Binit Kumar
 

Similar to A software designer has realized that a soon-to-be released vers (20)

T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptx
 
Identify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdfIdentify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdf
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Wa
WaWa
Wa
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Invincea "The New Threat Vector"
Invincea "The New Threat Vector"Invincea "The New Threat Vector"
Invincea "The New Threat Vector"
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

More from latashiadegale

Adolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to tAdolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to t
latashiadegale
 
Advanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescribAdvanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescrib
latashiadegale
 
Aegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around CycladicAegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around Cycladic
latashiadegale
 
Aegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around CycladAegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around Cyclad
latashiadegale
 
Advocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. WAdvocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. W
latashiadegale
 
After careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing compliancAfter careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing complianc
latashiadegale
 
Affirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controveAffirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controve
latashiadegale
 
Adequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequaAdequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequa
latashiadegale
 
Affirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the followingAffirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the following
latashiadegale
 
Advances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creatAdvances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creat
latashiadegale
 
Advertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adverAdvertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adver
latashiadegale
 
Advanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign skiAdvanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign ski
latashiadegale
 
Advanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescrAdvanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescr
latashiadegale
 
address the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHoaddress the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHo
latashiadegale
 
Address the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and eAddress the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and e
latashiadegale
 
Address the following in 1–2 pages  Explain the followin
Address the following in 1–2 pages     Explain the followinAddress the following in 1–2 pages     Explain the followin
Address the following in 1–2 pages  Explain the followin
latashiadegale
 
Address both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-framAddress both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-fram
latashiadegale
 
Add the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. TheAdd the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. The
latashiadegale
 
Add a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that incluAdd a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that inclu
latashiadegale
 
Acute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  serAcute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  ser
latashiadegale
 

More from latashiadegale (20)

Adolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to tAdolescent pregnancy is viewed as a high-risk situation due to t
Adolescent pregnancy is viewed as a high-risk situation due to t
 
Advanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescribAdvanced Filtering Please respond to the followingDescrib
Advanced Filtering Please respond to the followingDescrib
 
Aegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around CycladicAegean  1. Describe the human figurines found in and around Cycladic
Aegean  1. Describe the human figurines found in and around Cycladic
 
Aegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around CycladAegean1. Describe the human figurines found in and around Cyclad
Aegean1. Describe the human figurines found in and around Cyclad
 
Advocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. WAdvocating Through PolicyAs noted by Dr. Stanley and Dr. W
Advocating Through PolicyAs noted by Dr. Stanley and Dr. W
 
After careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing compliancAfter careful review of your Phase 4 report addressing complianc
After careful review of your Phase 4 report addressing complianc
 
Affirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controveAffirmative Action is college admissions is one of the most controve
Affirmative Action is college admissions is one of the most controve
 
Adequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequaAdequate Standard of Living The argument that an adequa
Adequate Standard of Living The argument that an adequa
 
Affirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the followingAffirmative Action and Harassment  Please respond to the following
Affirmative Action and Harassment  Please respond to the following
 
Advances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creatAdvances over the last few decades have brought innovative and creat
Advances over the last few decades have brought innovative and creat
 
Advertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adverAdvertising and Media Techniques Assignment   Select an adver
Advertising and Media Techniques Assignment   Select an adver
 
Advanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign skiAdvanced Layout Notebook We will explore the following InDesign ski
Advanced Layout Notebook We will explore the following InDesign ski
 
Advanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescrAdvanced Filtering Please respond to the followingDescr
Advanced Filtering Please respond to the followingDescr
 
address the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHoaddress the following questions in a 1250 word research paperHo
address the following questions in a 1250 word research paperHo
 
Address the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and eAddress the following in 3–4 pages  •How do theory, ideology, and e
Address the following in 3–4 pages  •How do theory, ideology, and e
 
Address the following in 1–2 pages  Explain the followin
Address the following in 1–2 pages     Explain the followinAddress the following in 1–2 pages     Explain the followin
Address the following in 1–2 pages  Explain the followin
 
Address both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-framAddress both the historical event (or topic within its time-fram
Address both the historical event (or topic within its time-fram
 
Add the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. TheAdd the following sections to the outline. A sample is attached. The
Add the following sections to the outline. A sample is attached. The
 
Add a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that incluAdd a 1- to 2-page section to your PlaybookRunbook that inclu
Add a 1- to 2-page section to your PlaybookRunbook that inclu
 
Acute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  serAcute and long-term care are two significantly different health  ser
Acute and long-term care are two significantly different health  ser
 

Recently uploaded

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

A software designer has realized that a soon-to-be released vers

  • 1. A software designer has realized that a soon-to-be released version of a popular game contains a flaw that will make it especially vulnerable to hacking. The way best to protect against the exploitation of this flaw will involve: A. setting up a firewall B. issuing a patch C. update antivirus software D. change the graphic user interface E. guarding against spoofing A particular business has found its servers with firewalls subject to frequent port 80 attacks. To learn more about these attacks, the business decided to: A. set up a honeypot B. update its antivirus software
  • 2. C. remove its firewall D. harden all systems that face the Internet E. engage in pharming Having decided to shut down access to the servers of a large multinational business, hackers have: A. engaged in spamming B. thwarted the business' firewalls C. launched a distributed denial of service attack D. defeated the biometric information safeguards E. begun a sophisticated program of phishing A type of encryption protocol is called Special Spoofing Layering (SSL).
  • 3. True False A cybersecurity specialist, hired to test the security of a client's servers, starts by looking at the long identification strings associated with each server. So, the specialiast is looking at: A. firewalls B. antivirus systems C. certificates D. remote access protocols E. port 80 access Virtual private networks are to computers as inbound proxy servers are to
  • 4. A. smartphones B. firewalls C. antivirus systems D. remote access protocols E. USB drives Being able to inspect information packets in a stream of network traffic is to a firewall as a triggering mechanism that detects changes in the environment is to: A. an antivirus system B. secure socket layering C. a Demilitarized Zone D. patches E. tripwire Cryptographic algorithms rely upon confusion and diffusion.
  • 5. True False Time sharing is cloud computing as ARPANET is to A. a Demilitarized Zone B. Identity management systems C. the Internet D. Intrusion protection systems E. web access firewalls An Intrusion prevention system compares virus signatures with what viruses would look like as they traveled across the network.
  • 6. True False In chapter 2 of the Cyber Security Policy Handbook text, the authors quote Hubbard: "Ineffective risk management methods that somehow manage to become standard spread vulnerability to everything they touch." Explain what that quote means. Given an example to support your answer. Maximum number of characters (including HTML tags added by text editor): 32,000 At the time of the publication of the article, Brooks says that there are four types of malevolent software programs, which include: A. directed denial of service attacks B. logic bombs C. spoofing D. spamming
  • 7. E. firewall sabotaging Under a theory of recovery in tort for product liability, potential plaintiffs who used software defectively infected by a virus would include: A. the purchaser B. the software company C. the ISPs D. data repositories E. bulletin board system operators When a court would assess a plaintiff's claim for negligence against a software programmer, it likely would find that the standard of care would be that which a reasonable or prudent software programmer would do under the circumstances. True
  • 8. False Which one of the following could a tortfeasor expect to avoid having to face liability for committing, where the tortfeasor intentionally released a worm onto the Internet? A. negligence B. trespass to chattels C. conversion D. nuisance E. interference with contract relations. A trojan horse could release a virus. True False An action in intentional tort could arise from a failure to
  • 9. exercise reasonable care to warn a user of a virus contained in software. True False Given the foreseeability of injury to all who had personal information stored in a database, data possessors most often will have a duty to exercise reasonable care to protect data from intruders. True False The party in the best position to win an action in common law negligence against a database possessor, according to Johnson, will be: A. the Internet Service Provider
  • 10. B. State law enforcement, such as a state police organization C. a business customer D. a non-profit organization E. Federal law enforcement, such as the F.B.I. According to Johnson, the best source of guidance that data possessors can get about meeting a duty of care should come from: A. other data possessors B. plaintiffs C. international law D. insurers E. those convicted of crimes involving databases An argument against imposing a burden against unauthorized access to a database would involve:
  • 11. A. the impact of breach of duty of care upon the community B. the kinds of losses that a database possessor might have to bear C. the difficulty of creating an industry-wide standard D. the availability of insurance E. how the risk of loss would deter a database possessor from ignoring the dangers that could arise for negligently protecting the data in the defendant's possession. Given the list of federal crimes at http://www.law.cornell.edu/wex/computer_and_internet_fraud, the most common crime associated with these is: A. destruction of property B. disorderly conduct C. fraud D. vandalism
  • 12. E. electronic robbery One definition of a Zero-Day vulnerability is that the software is obviously flawed from the moment it is released to the general public for use. True False Most likely, a cybercrime will be against a: A. non-profit organization B. non-profit organization's property C. government agency D. person's property E. law enforcement agency
  • 13. Although stolen data might not be considered tangible property, in the way that a laptop is tangible, if a court did consider the stolen data to be tangible, then an offense that a thief could then face would be: A. assault B. vandalism C. possession of stolen property D. destruction of stolen property E. computer sabotage Identify who is not typically part of a financial transaction involving the use of a credit card to purchase an item. A. purchaser B. credit card company C. merchant D. thief
  • 14. E. credit card company's bank Another criminal enterprise includes infecting computers, via a virus, so as to create a collection of compromised personal computers. The criminal has created a: A. server farm B. botnet C. an online crime ecosystem D. a network listening service E. nothing; this cannot happen A traditional view towards cybercrime might mean overlooking what kind of cybersecurity problem A. an insider threat B. the vulnerability of business websites
  • 15. C. computer networks that thieves use to attack a website D. electronic fraud E. "logic bombs" Identify at least five of the elements of the cyber underground economy. Then, make the case for why one of those five plays the greatest role in maintaining the cyber underground economy. Maximum number of characters (including HTML tags added by text editor): 32,000 Make a persuasive case that a virus would cause more harm to a networked computer or make a persuasive case that a worm would cause more harm to a networked computer.