Name and briefly describe the first element of deterrence

Assignment Help Management Information Sys
Reference no: EM131312667

IT 238 Final Exam - Short Answer Questions

This part of the exam consists of 16 short questions worth a total of 50 points. Questions 1 through 12 are worth 3 points each, the other questions are worth 4 or 6 points as noted.

Your answers to the questions may be as short as a few words or as long as a couple of sentences. If you are writing more than that, you are working too hard!

Everything you need to answer these questions can be found in the textbook or other reading and videos assigned during the course. You may search the internet for relevant information, but be aware as always that the internet is an unreliable source of information and terminology varies, so this is a risky approach.

All work on the exam must be your own. Any students found to be working together or sharing answers will each receive a zero on the entire final exam. Plagiarism from any source will also result in a zero.

Question 1. In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits?

Question 2. Name and briefly describe the first element of deterrence.

Question 3. Name and briefly describe the second element of deterrence.

Question 4. Name and briefly describe the third element of deterrence.

Question 5. For each of the following three activities, name the element of deterrence that the activity represents:

A. Having backup non-networked communications systems

B. Using a network firewall

C. Hackback

Question 6. A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?

Question 7. Cyberattacks stealing what kind of property have been referred to as an "unprecedented transfer of wealth"?

Question 8. The cyberattack against Target stores is best described as an attack against which one of the three elements of the CIA triad?

Question 9. A DDOS attack is best described as an attack against which one of the three elements of the CIA triad?

Question 10. Why is the failure to provide of an organization to adequately protect data sometimes referred to as a negative externality?

Question 11. We learned of a cyberattack where a country attacked a private company in order to punish the company for something it did that offended the country. What was the country, and what was the company?

Question 12. Describe an example of social engineering used in a specific attack we learned about this quarter.

Question 13. What four countries are considered by the DoD to be the most significant threats to the United States in cyberspace?

Question 14. Would the attack on the Office of Personnel Management be considered a targeted or an opportunistic attack? Why? (no credit for an answer without an explanation of your answer)

Question 15. Describe the difference between a cyber espionage attack and a disruptive cyberattack. Provide an example of one attack of each type that we learned about this quarter. (4 points for describing the differences, 1 point for each example)

Reference no: EM131312667

Questions Cloud

Implement a new version of the maze solving program : Design and implement a program to play tic-tac-toe against the computer using a recursive function to build a game tree for deciding the computer's next move.
What is the effective length of given bolt : The concentric joint of problem is subjected to an increase in temperature of 1008F. Does this increase or decrease the tension in the bolts? By how much?
Implement a program to solve the n-queens problem : Design and implement a program to solve the n-queens problem. Your program should prompt the user for the size of the board, search for a solution, and print the resulting board if a solution was found.
What would be the forecast for next years sales : What would be the forecast for next year's sales using regression to estimate a trend
Name and briefly describe the first element of deterrence : A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?Cyberattacks stealing what kind of property have been referred to as an "unprecedented transfer of wealth"?The cyberattack a..
Appropriate value for the decrypting keys : Find the appropriate value for the decrypting keys n and d in the RSA public key cryptology system based system based on the primes p = 7 and q = 19 and the encryption key e = 5.
What actions if any should you take : One of your analysts told you that the Mexican peso is expected to depreciate by 30 percent against the dollar on the foreign exchange markets over the next year. What actions, if any, should you take?
Implement an iterative version of the factorial function : Design and implement a recursive function for determining whether a string is a palindrome. A palindrome is a string of characters that is the same as the string of characters in reverse.
Explain the different types of permissions : 1). Please explain the Standard file permissions in the Linux. And also explain the different types of permissions. (Elaborate your Answers with examples and also run commands in the Linux machine).

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does the granularity of information change

What is the difference between a technology literate knowledge worker and an information-literate knowledge worker?

  Process for selecting and acquiring an information system

The process for selecting and acquiring an information system - How the organizations goals drive the selection of an information system.

  Evaluate the comprehensive organizational plan

Evaluate the "Comprehensive Organizational Plan" presented by Oetjen and Rotarius. Is this model suitable for any type of health care organization

  Show benefit of using virtual world to facilitate learning

Write a paper extensively discussing the benefits of using the virtual worlds to facilitate learning.

  Describe at least two data transmission technologies

Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies associated with the protocol. Include the bandwidth limitatio..

  Provide some detailed information on the following- how

provide some detailed information on the following- how does a business stay ahead of technological advances?- what are

  Solution to supply chain management question

Need help writing a paper involving the requirments, technology, benefits, advantages and disadvantages, implementation consideration, and cost for an idustry that uses supply chain for its core business.

  Decide what type of command structure will be employed

Using the Incident Command System (ICS), decide what type of command structure will be employed. Who will be part of your command structure?

  Describe ways cloud computing improve system fault tolerance

Write an essay describing the ways cloud computing can improve a system fault tolerance. Include details and examples to support your response

  Describe functions and activities in an information system

Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm.

  Describe the differences between disk quotas

Describe the differences between disk quotas and File Server Resource Manager. What are the requirements of using FSRM?Using Distributed File System, copies of files are stored on different servers. Does DFS eliminate the need to do data backups? Why..

  Create and validate html documents

Create and validate HTML documents. Create presentations using Cascading Style Sheets and DHTML. Write clearly and concisely about Web design and development using proper writing mechanics and technical style conventions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd