A software designer has realized that a soon-to-be released version of a popular game contains a flaw that will make it especially vulnerable to hacking. The way best to protect against the exploitation of this flaw will involve: A. setting up a firewall B. issuing a patch C. update antivirus software D. change the graphic user interface E. guarding against spoofing A particular business has found its servers with firewalls subject to frequent port 80 attacks. To learn more about these attacks, the business decided to: A. set up a honeypot B. update its antivirus software C. remove its firewall D. harden all systems that face the Internet E. engage in pharming Having decided to shut down access to the servers of a large multinational business, hackers have: A. engaged in spamming B. thwarted the business' firewalls C. launched a distributed denial of service attack D. defeated the biometric information safeguards E. begun a sophisticated program of phishing A type of encryption protocol is called Special Spoofing Layering (SSL). True False A cybersecurity specialist, hired to test the security of a client's servers, starts by looking at the long identification strings associated with each server. So, the specialiast is looking at: A. firewalls B. antivirus systems C. certificates D. remote access protocols E. port 80 access Virtual private networks are to computers as inbound proxy servers are to A. smartphones B. firewalls C. antivirus systems D. remote access protocols E. USB drives Being able to inspect information packets in a stream of network traffic is to a firewall as a triggering mechanism that detects changes in the environment is to: A. an antivirus system B. secure socket layering C. a Demilitarized Zone D. patches E. tripwire Cryptographic algorithms rely upon confusion and diffusion. True False Time sharing is cloud computing as ARPANET is to A. a Demilitarized Zone B. Identity management systems C. the Internet D. Intrusion protection systems E. web access firewalls An Intrusion prevention system compares virus signatures with what viruses would look like as they traveled across the network. True False In chapter 2 of the Cyber Security Policy Handbook text, the authors quote Hubbard: "Ineffective risk management methods that somehow manage to become standard spread vulnerability to everything they touch." Explain what that quote means. Given an example to support your answer. Maximum number of characters (including HTML tags added by text editor): 32,000 At the time of the publication of the article, Brooks says that there are four types of malevolent software programs, which include: A. directed denial of service attacks B. logic bombs C. spoofing D. spamming E. firewall sabotaging Under a theory of recovery in tort for product liability, potential plaintiffs who used software defectiv ...