Name and briefly describe the first element of deterrence

Assignment Help Management Information Sys
Reference no: EM131312667

IT 238 Final Exam - Short Answer Questions

This part of the exam consists of 16 short questions worth a total of 50 points. Questions 1 through 12 are worth 3 points each, the other questions are worth 4 or 6 points as noted.

Your answers to the questions may be as short as a few words or as long as a couple of sentences. If you are writing more than that, you are working too hard!

Everything you need to answer these questions can be found in the textbook or other reading and videos assigned during the course. You may search the internet for relevant information, but be aware as always that the internet is an unreliable source of information and terminology varies, so this is a risky approach.

All work on the exam must be your own. Any students found to be working together or sharing answers will each receive a zero on the entire final exam. Plagiarism from any source will also result in a zero.

Question 1. In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits?

Question 2. Name and briefly describe the first element of deterrence.

Question 3. Name and briefly describe the second element of deterrence.

Question 4. Name and briefly describe the third element of deterrence.

Question 5. For each of the following three activities, name the element of deterrence that the activity represents:

A. Having backup non-networked communications systems

B. Using a network firewall

C. Hackback

Question 6. A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?

Question 7. Cyberattacks stealing what kind of property have been referred to as an "unprecedented transfer of wealth"?

Question 8. The cyberattack against Target stores is best described as an attack against which one of the three elements of the CIA triad?

Question 9. A DDOS attack is best described as an attack against which one of the three elements of the CIA triad?

Question 10. Why is the failure to provide of an organization to adequately protect data sometimes referred to as a negative externality?

Question 11. We learned of a cyberattack where a country attacked a private company in order to punish the company for something it did that offended the country. What was the country, and what was the company?

Question 12. Describe an example of social engineering used in a specific attack we learned about this quarter.

Question 13. What four countries are considered by the DoD to be the most significant threats to the United States in cyberspace?

Question 14. Would the attack on the Office of Personnel Management be considered a targeted or an opportunistic attack? Why? (no credit for an answer without an explanation of your answer)

Question 15. Describe the difference between a cyber espionage attack and a disruptive cyberattack. Provide an example of one attack of each type that we learned about this quarter. (4 points for describing the differences, 1 point for each example)

Reference no: EM131312667

Questions Cloud

Implement a new version of the maze solving program : Design and implement a program to play tic-tac-toe against the computer using a recursive function to build a game tree for deciding the computer's next move.
What is the effective length of given bolt : The concentric joint of problem is subjected to an increase in temperature of 1008F. Does this increase or decrease the tension in the bolts? By how much?
Implement a program to solve the n-queens problem : Design and implement a program to solve the n-queens problem. Your program should prompt the user for the size of the board, search for a solution, and print the resulting board if a solution was found.
What would be the forecast for next years sales : What would be the forecast for next year's sales using regression to estimate a trend
Name and briefly describe the first element of deterrence : A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?Cyberattacks stealing what kind of property have been referred to as an "unprecedented transfer of wealth"?The cyberattack a..
Appropriate value for the decrypting keys : Find the appropriate value for the decrypting keys n and d in the RSA public key cryptology system based system based on the primes p = 7 and q = 19 and the encryption key e = 5.
What actions if any should you take : One of your analysts told you that the Mexican peso is expected to depreciate by 30 percent against the dollar on the foreign exchange markets over the next year. What actions, if any, should you take?
Implement an iterative version of the factorial function : Design and implement a recursive function for determining whether a string is a palindrome. A palindrome is a string of characters that is the same as the string of characters in reverse.
Explain the different types of permissions : 1). Please explain the Standard file permissions in the Linux. And also explain the different types of permissions. (Elaborate your Answers with examples and also run commands in the Linux machine).

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain and describing how information is used

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization. Explain this use in your current place of employment or an organization you are familiar with

  Do you believe that this is a fair test

If you are asked to review the employee selection procedures, would you make any changes to this system? Why or why not?

  Social media application edmodo

About social media application Edmodo, What are its major features? How are people using these applications

  Prepare a resume and cover letter for the possible job

what you have learned while working with Word, You will create a resume and cover letter for a potential job.Assume you are graduating this semester and need to find a job immediately after graduation. Check your local newspaper or online employmen..

  Evaluate the online crm system of your bank

Evaluate the online CRM system of your bank. What are the key functions included? What is missing? Is it a factor in your banking choice?

  Analyze major steps in delivering effective communications

Select a health care provider of your choice and discuss the major elements making up their marketing communications process. Provide specific examples to support your response.

  Description of management information systemsin the past

description of management information systemsin the past companies would remain silent if they experienced customer

  Purchase of a new computer

Purchase of a new computer - Assume you are considering the purchase of a new computer. Use the Internet to access the Web site of the manufacturer of the computer you are considering.

  Any idea how to open and convert pod file to ms project

Any idea how to open and convert POD file to MS project

  Write a summary of a business or company

Write a summary of a business or company i.e. related to the Chase Bank.

  Bcp versus drp revisited

BCP versus DRP Revisited-Take a position on whether BC or DR can survive without the other. Use a real-world example to support your position

  How will this capability make the production grow

Please state your answers in 2-3 page paper in APA 6th Ed. format. The evolution of RFID instead of UPC, how will this capability make the production grow and improve inventory and security? Give two examples of RFID applications in business.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd