Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

IT 238 Final Exam - Short Answer Questions

This part of the exam consists of 16 short questions worth a total of 50 points. Questions 1 through 12 are worth 3 points each, the other questions are worth 4 or 6 points as noted.

Your answers to the questions may be as short as a few words or as long as a couple of sentences. If you are writing more than that, you are working too hard!

Everything you need to answer these questions can be found in the textbook or other reading and videos assigned during the course. You may search the internet for relevant information, but be aware as always that the internet is an unreliable source of information and terminology varies, so this is a risky approach.

All work on the exam must be your own. Any students found to be working together or sharing answers will each receive a zero on the entire final exam. Plagiarism from any source will also result in a zero.

Question 1. In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits?

Question 2. Name and briefly describe the first element of deterrence.

Question 3. Name and briefly describe the second element of deterrence.

Question 4. Name and briefly describe the third element of deterrence.

Question 5. For each of the following three activities, name the element of deterrence that the activity represents:

A. Having backup non-networked communications systems

B. Using a network firewall

C. Hackback

Question 6. A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?

Question 7. Cyberattacks stealing what kind of property have been referred to as an "unprecedented transfer of wealth"?

Question 8. The cyberattack against Target stores is best described as an attack against which one of the three elements of the CIA triad?

Question 9. A DDOS attack is best described as an attack against which one of the three elements of the CIA triad?

Question 10. Why is the failure to provide of an organization to adequately protect data sometimes referred to as a negative externality?

Question 11. We learned of a cyberattack where a country attacked a private company in order to punish the company for something it did that offended the country. What was the country, and what was the company?

Question 12. Describe an example of social engineering used in a specific attack we learned about this quarter.

Question 13. What four countries are considered by the DoD to be the most significant threats to the United States in cyberspace?

Question 14. Would the attack on the Office of Personnel Management be considered a targeted or an opportunistic attack? Why? (no credit for an answer without an explanation of your answer)

Question 15. Describe the difference between a cyber espionage attack and a disruptive cyberattack. Provide an example of one attack of each type that we learned about this quarter. (4 points for describing the differences, 1 point for each example)

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92067288
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Management Information System

Descriptionrefer to this resource when completing the its

Description: Refer to this resource when completing the It's All About the HAT assignment. In this assignment, students will learn to use and identify tools that may be helpful in their navigation of security related eve ...

Answer the following question 1 why is it important for hr

Answer the following Question : 1. Why is it important for HR management to transform from being primarily administrative and operational to a more strategic contributor? (400 words) 2. Discuss how globalization has chan ...

Q1 explain identification and assessment of emerging

Q1. Explain identification and assessment of emerging technologies? (APA format required, Turntin check required. Minimum 250 words essay) Q2. What criteria are used to rank current and emerging technology to get the bes ...

1 relate state government data security breach notification

1. Relate state government data security breach notification laws to individual privacy. 2. Explain why state governments have data security breach notification law. 3. Find your state or location's data and security bre ...

Question suppose you and four friends have a band you think

Question : Suppose you and four friends have a band. You think you're pretty good, but you don't have even a college-wide reputation. Would Kickstarter be an effective way to promote your band? Why or why not? An enginee ...

Assignment application perform data gathering and

Assignment Application: Perform Data Gathering and Footprinting on a Targeted Website You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet ...

Risk is inherent in providing healthcare services we will

Risk is inherent in providing healthcare services. We will always deal with a certain amount of risk as we go about our work of caring for patients each day. Discuss at least two specific healthcare projects, services, o ...

With respect to tm4c123 arm cortex m4 processor1 how many

With respect to TM4C123 ARM Cortex M4 Processor 1) How many machine cycles are required to process first line of ISR after an interrupt occurs? What are the other benefits of NVIC to process interrupt more efficiently? 2 ...

Respectfully please see the structure for the program im

Respectfully, Please see the structure for the program I'm trying to write using Python. Below is how the program should be structured. 1. Program general structure: Function definitions should be at the top of the progr ...

Suburban homes construction project quality management plan

Suburban Homes Construction Project Quality Management Plan (QMP) Prepare a quality management plan using the elements described in the PMBOK 6e (Section 8.1.3.1) for the Suburban Homes Construction Project. Content Over ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As