Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

26. TTs play a central role in cyber threat information and cyber threat intelligence gathering for all the following apart from? TTs are relevant for

26. TTs play a central role in cyber threat information and cyber threat intelligence gathering for all the following apart from?

TTs are relevant for Indicators, Incidents, Campaigns, and Threat Actors.

They do not hold a close relationship with Exploit Targets that characterize the specific targets that the TTs seek to exploit!

STIX leverages community knowledge and best practices to define a new TP structure for representing TTP information.

Portions of the TTP construct utilize defined extension points to enable leveraging of other existing standardized approaches.

27. TTs consist of the specific adversary behaviour (attack patterns, malware exploits) exhibited including all the following except.

TTP resources are leveraged on (tools, infrastructure, personas)

TTP leverages on Information on the victims targeted (who, what or where)

TTP leverages on relevant exploit targets being targeted

TTP leverages on intended effects but not relevant to kill chain phases

28. The following statements explains intellectual property except?

Intellectual property is any unique product of the human intellect that has a commercial value such as trade secrets, trademarks, patents and Copywrite

Some examples of intellectual property include Books, Songs, musical recordings,Movies, Paintings

New ideas in the form of inventions and artistic works can improve the quality of life for the members of society.

All the above are correct

29. Under intellectual property, the following explains trade secrets except?

A trade secret is a confidential piece of intellectual property that provides a company with a competitive advantage.

Examples of trade secrets include formulas, processes, proprietary designs, strategic plans, customer lists, and other collections of information. Coca-cola,

The right of a company to protect its trade secrets is widely recognized by governments around the world.

A company must not sign a confidentiality agreement to maintain its rights to a trade secret from being discovered.

30. The following Statements explains trademark and service marks except?

A trademark is a word, symbol, picture, sound, or colour used by a business to identify goods and allow a company to establish a "brand name.". E.g. Nike, Apple, MS,

A service mark is a mark identifying a service.

Society does not benefit from branding because branding allows consumers to have more confidence in the quality of the products they purchase.

By granting a trademark or service mark, a government gives a company the right to use it and the right to prevent other companies from using it.

31. Which of the following statements does not explain Patents under intellectual property?

A patent is a way the government provides an inventor with an exclusive right to a piece of intellectual property.

A patent is quite different from a trade secret because a patent is a public document that provides a detailed description of the invention.

The owner of the patent can prevent others from making, using, or selling the invention for the lifetime of the patent, which is currently 20 years.

No one has the right to make use of its ideas after the patent expires

32. Copyright law defines how the government provides authors with certain rights to original works that they have written. The owner of a copyright has the following principal rights except?

The right to reproduce the copyrighted work

The right to produce new works derived from the copyrighted work is denied by law

The right to distribute and display copies of the work to the public

The right to perform the work in public.

33. The following are some of the penalties for hacking apart from?

The maximum penalty imposed for violating the Computer Fraud and Abuse Act is 20 years in prison and a $250,000 fine.

Privacy Act: This law makes it illegal to intercept telephone conversations, email, or any other data transmissions.

It also makes it a crime to access stored email messages without authorization.

However, in other countries, it is not a crime to access stored email messages without authorization

34. The maximum penalties for hacking are severe. The Computer Fraud and Abuse Act criminalizes a wide variety of hacker-related activities, including all except?

Transmitting code (such as a virus or worm) that causes damage to a computer system

Accessing with authorization any computer connected to the Internet, even if no files are examined, changed, or copied

Transmitting classified government information

Trafficking in computer passwords, Computer fraud, Computer extortion

35. All the following statements explain ethics and ethical reasoning apart from?

Ethics is the philosophical study of morality, a rational examination of people's moral beliefs and behaviour.

Ethics is the rational, systematic analysis of conduct that can cause benefit or harm to other people.

In ethical and unethical hacking, because ethics is based on reason, people are required to explain why they hold the opinions they do.

This concept does not allow us to compare ethical evaluations. For example, Scammers say spam is good and hackers say if they hack for common good then it is ok.

36. In ethics and ethical reasoning, two people can reach a different conclusion based on all the following statements apart from?

We can weigh the facts and the reasoning process behind their conclusions to determine the stronger line of thinking.

Every society has rules of conduct describing what people ought and ought not to do in various situations. We call these rules morality.

It's important to note that ethics is not focused on the voluntary, moral choices people make because they have decided they ought to take one course of action rather than an alternative.

Ethics is not concerned about involuntary choices or choices outside the moral realm.

37. Which of the following does not explains why we study ethics?

Ethical analvsis can provide a structured wav to evaluate an issue and choose a course of action

Ethica analvsis can help illuminate multible sides of an issue

Ethical analysis cannot help produce persuasive arguments

In your personal and professional life, you will confront difficult decisions that you will have to apply ethical and unethical choices

38. The following are all definitions of ethics apart from?

Ethics are set of beliefs about right and wrong behaviour but ethical behaviour conforms to social norms

Virtues: Habits that incline people to do what is acceptable

Vices: Habits of unacceptable behaviour

Virtues and vices define a personal value system and its scheme of moral values

39. In Moral and Ethics, the following statement explains moral codes and morality apart from?

Moral code describes a set of rules but not ethical rules

Establishes boundaries of generally accepted behaviour

Different rules that often have contradictions

Morality describes social conventions about right and wrong and widely shared

40. All the following explains why Morality may vary from jurisdiction to jurisdiction except?

Age, Gender and Cultural group

Ethnic background and Religion

Work experience and marital status

Life experiences and Education

41. The following explains the differences between Morals, Ethics, and Laws apart from?

Morals: one's personal beliefs about right and wrong

Ethics: standards or codes of behaviour expected of an individual by a group

Law: a system of rules that tells us what we can and cannot do and are enforced by a set of institutions

Answer a and b above are not correct

42. The following statements are correct when explaining how facial recognition systems works and the privacy issues?

A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.

Multiple methods in which facial recognition systems work, in general, they work by comparing selected facial features from given image with faces within a database.

Faces are not protected under British law, unlike other biometrics such as DNA and fingerprints.

The government has been successful since 2012 to pass legislation updating biometrics protections.

43. Regarding how facial recognition systems works there are challenges in developing trends in public and private space. Which of the following is not correct regarding privacy?

Opens up to abuse

Not accurate enough

Protect privacy

Invade privacy

44. Some of the challenges facing how facial recognition systems works in the UK includes all the following except?

The Police National Database has snowballed to contain about 20m faces.

The Home Office Database has snowballed to contain about 2000m faces at present.

A large proportion of the people included have never been charged or convicted of an offence.

Unlike DNA and fingerprints, this data can also be acquired without a person's knowledge or consent

45. The following are some on the challenges the UK government must address regarding facial recognition systems errors except?

Police forces must provide demonstrably sound evidence to show that live facial recognition (LFR) technology is strictly necessary, balanced and effective in each specific context in which it is deployed.

A high rate of "false negatives match" are generated

Software flag innocent members of the public to police as wanted criminals.

The technology was less accurate for women and Black, Asian and Minority Ethnic (BAME) subjects

46. Internet privacy involves the right or mandate of personal privacy concerning all the following apart from?

The storing

Retrogressing

Provision to third parties

Displaying personal information via the internet

47. Online surveillance promotes all the following surveillance factors apart from?

Identifying and prosecuting criminals

Extending security to create a more secure society

Encourages a feeling of safety

'Nothing to hide - nothing to fear' argument

48. Online surveillance promotes all the following privacy factors apart from? Promoters of privacy debates includes:

The growth of monitoring without democratic oversight and debate

More information is being collected which are available for more people for a variety of reasons

The growth in monitoring promotes security and privacy for user

Intensification of surveillance: moved into the traditionally unobserved parts of social life (home, phone, computer devices, education, health and travel)

49. Regarding the Right to Privacy, Article 8 of the Human Rights Act states all the following except?

Everyone has the right to respect for his private and family life, his home and his correspondence.

An absolute right as national security; public safety or the economic well-being of the country as law enforcement and intelligence agencies have been not given significant exemptions

Privacy is a fundamental human right recognized in the UN Declaration of Human Rights, the International Covenant on Civil and Political Rights

50. Which of the following statement is wrong? Surveillance refers to routine and everyday activities of citizens. Meaning:

To watch over someone

Processes with special note taken of certain human behaviours that goes beyond ordinary curiosity

Always directed towards some specific purpose

Cyber stalking a victim

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Big Data Systems A 360-degree Approach

Authors: Jawwad ShamsiMuhammad Khojaye

1st Edition

0429531575, 9780429531576

Students also viewed these Databases questions