Question
26. TTs play a central role in cyber threat information and cyber threat intelligence gathering for all the following apart from? TTs are relevant for
26. TTs play a central role in cyber threat information and cyber threat intelligence gathering for all the following apart from?
TTs are relevant for Indicators, Incidents, Campaigns, and Threat Actors.
They do not hold a close relationship with Exploit Targets that characterize the specific targets that the TTs seek to exploit!
STIX leverages community knowledge and best practices to define a new TP structure for representing TTP information.
Portions of the TTP construct utilize defined extension points to enable leveraging of other existing standardized approaches.
27. TTs consist of the specific adversary behaviour (attack patterns, malware exploits) exhibited including all the following except.
TTP resources are leveraged on (tools, infrastructure, personas)
TTP leverages on Information on the victims targeted (who, what or where)
TTP leverages on relevant exploit targets being targeted
TTP leverages on intended effects but not relevant to kill chain phases
28. The following statements explains intellectual property except?
Intellectual property is any unique product of the human intellect that has a commercial value such as trade secrets, trademarks, patents and Copywrite
Some examples of intellectual property include Books, Songs, musical recordings,Movies, Paintings
New ideas in the form of inventions and artistic works can improve the quality of life for the members of society.
All the above are correct
29. Under intellectual property, the following explains trade secrets except?
A trade secret is a confidential piece of intellectual property that provides a company with a competitive advantage.
Examples of trade secrets include formulas, processes, proprietary designs, strategic plans, customer lists, and other collections of information. Coca-cola,
The right of a company to protect its trade secrets is widely recognized by governments around the world.
A company must not sign a confidentiality agreement to maintain its rights to a trade secret from being discovered.
30. The following Statements explains trademark and service marks except?
A trademark is a word, symbol, picture, sound, or colour used by a business to identify goods and allow a company to establish a "brand name.". E.g. Nike, Apple, MS,
A service mark is a mark identifying a service.
Society does not benefit from branding because branding allows consumers to have more confidence in the quality of the products they purchase.
By granting a trademark or service mark, a government gives a company the right to use it and the right to prevent other companies from using it.
31. Which of the following statements does not explain Patents under intellectual property?
A patent is a way the government provides an inventor with an exclusive right to a piece of intellectual property.
A patent is quite different from a trade secret because a patent is a public document that provides a detailed description of the invention.
The owner of the patent can prevent others from making, using, or selling the invention for the lifetime of the patent, which is currently 20 years.
No one has the right to make use of its ideas after the patent expires
32. Copyright law defines how the government provides authors with certain rights to original works that they have written. The owner of a copyright has the following principal rights except?
The right to reproduce the copyrighted work
The right to produce new works derived from the copyrighted work is denied by law
The right to distribute and display copies of the work to the public
The right to perform the work in public.
33. The following are some of the penalties for hacking apart from?
The maximum penalty imposed for violating the Computer Fraud and Abuse Act is 20 years in prison and a $250,000 fine.
Privacy Act: This law makes it illegal to intercept telephone conversations, email, or any other data transmissions.
It also makes it a crime to access stored email messages without authorization.
However, in other countries, it is not a crime to access stored email messages without authorization
34. The maximum penalties for hacking are severe. The Computer Fraud and Abuse Act criminalizes a wide variety of hacker-related activities, including all except?
Transmitting code (such as a virus or worm) that causes damage to a computer system
Accessing with authorization any computer connected to the Internet, even if no files are examined, changed, or copied
Transmitting classified government information
Trafficking in computer passwords, Computer fraud, Computer extortion
35. All the following statements explain ethics and ethical reasoning apart from?
Ethics is the philosophical study of morality, a rational examination of people's moral beliefs and behaviour.
Ethics is the rational, systematic analysis of conduct that can cause benefit or harm to other people.
In ethical and unethical hacking, because ethics is based on reason, people are required to explain why they hold the opinions they do.
This concept does not allow us to compare ethical evaluations. For example, Scammers say spam is good and hackers say if they hack for common good then it is ok.
36. In ethics and ethical reasoning, two people can reach a different conclusion based on all the following statements apart from?
We can weigh the facts and the reasoning process behind their conclusions to determine the stronger line of thinking.
Every society has rules of conduct describing what people ought and ought not to do in various situations. We call these rules morality.
It's important to note that ethics is not focused on the voluntary, moral choices people make because they have decided they ought to take one course of action rather than an alternative.
Ethics is not concerned about involuntary choices or choices outside the moral realm.
37. Which of the following does not explains why we study ethics?
Ethical analvsis can provide a structured wav to evaluate an issue and choose a course of action
Ethica analvsis can help illuminate multible sides of an issue
Ethical analysis cannot help produce persuasive arguments
In your personal and professional life, you will confront difficult decisions that you will have to apply ethical and unethical choices
38. The following are all definitions of ethics apart from?
Ethics are set of beliefs about right and wrong behaviour but ethical behaviour conforms to social norms
Virtues: Habits that incline people to do what is acceptable
Vices: Habits of unacceptable behaviour
Virtues and vices define a personal value system and its scheme of moral values
39. In Moral and Ethics, the following statement explains moral codes and morality apart from?
Moral code describes a set of rules but not ethical rules
Establishes boundaries of generally accepted behaviour
Different rules that often have contradictions
Morality describes social conventions about right and wrong and widely shared
40. All the following explains why Morality may vary from jurisdiction to jurisdiction except?
Age, Gender and Cultural group
Ethnic background and Religion
Work experience and marital status
Life experiences and Education
41. The following explains the differences between Morals, Ethics, and Laws apart from?
Morals: one's personal beliefs about right and wrong
Ethics: standards or codes of behaviour expected of an individual by a group
Law: a system of rules that tells us what we can and cannot do and are enforced by a set of institutions
Answer a and b above are not correct
42. The following statements are correct when explaining how facial recognition systems works and the privacy issues?
A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.
Multiple methods in which facial recognition systems work, in general, they work by comparing selected facial features from given image with faces within a database.
Faces are not protected under British law, unlike other biometrics such as DNA and fingerprints.
The government has been successful since 2012 to pass legislation updating biometrics protections.
43. Regarding how facial recognition systems works there are challenges in developing trends in public and private space. Which of the following is not correct regarding privacy?
Opens up to abuse
Not accurate enough
Protect privacy
Invade privacy
44. Some of the challenges facing how facial recognition systems works in the UK includes all the following except?
The Police National Database has snowballed to contain about 20m faces.
The Home Office Database has snowballed to contain about 2000m faces at present.
A large proportion of the people included have never been charged or convicted of an offence.
Unlike DNA and fingerprints, this data can also be acquired without a person's knowledge or consent
45. The following are some on the challenges the UK government must address regarding facial recognition systems errors except?
Police forces must provide demonstrably sound evidence to show that live facial recognition (LFR) technology is strictly necessary, balanced and effective in each specific context in which it is deployed.
A high rate of "false negatives match" are generated
Software flag innocent members of the public to police as wanted criminals.
The technology was less accurate for women and Black, Asian and Minority Ethnic (BAME) subjects
46. Internet privacy involves the right or mandate of personal privacy concerning all the following apart from?
The storing
Retrogressing
Provision to third parties
Displaying personal information via the internet
47. Online surveillance promotes all the following surveillance factors apart from?
Identifying and prosecuting criminals
Extending security to create a more secure society
Encourages a feeling of safety
'Nothing to hide - nothing to fear' argument
48. Online surveillance promotes all the following privacy factors apart from? Promoters of privacy debates includes:
The growth of monitoring without democratic oversight and debate
More information is being collected which are available for more people for a variety of reasons
The growth in monitoring promotes security and privacy for user
Intensification of surveillance: moved into the traditionally unobserved parts of social life (home, phone, computer devices, education, health and travel)
49. Regarding the Right to Privacy, Article 8 of the Human Rights Act states all the following except?
Everyone has the right to respect for his private and family life, his home and his correspondence.
An absolute right as national security; public safety or the economic well-being of the country as law enforcement and intelligence agencies have been not given significant exemptions
Privacy is a fundamental human right recognized in the UN Declaration of Human Rights, the International Covenant on Civil and Political Rights
50. Which of the following statement is wrong? Surveillance refers to routine and everyday activities of citizens. Meaning:
To watch over someone
Processes with special note taken of certain human behaviours that goes beyond ordinary curiosity
Always directed towards some specific purpose
Cyber stalking a victim
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started