Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 . In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits? Question 2. Name and briefly describe

Question 1 . In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits?

Question 2. Name and briefly describe the first element of deterrence.

Question 3. Name and briefly describe the second element of deterrence.

Question 4. Name and briefly describe the third element of deterrence.

Question 5. For each of the following three activities, name the element of deterrence that the activity represents:

A. Having backup non-networked communications systems

B. Using a network firewall

C. Hackback

Question 6. A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?

Question 7. Place the following terms in chronological order:

A. Collect, Exfil and Exploit

B. Establish Persistence

C. Initial Exploitation

D. Install Tools

E. Move Laterally

F. Reconnaissance

Question 8. The cyberattack against Target stores is best described as an attack against which

one of the three elements of the CIA triad?

Question 9. A DDOS attack is best described as an attack against which one of the three elements of the CIA triad?

Question 10.

Why is the failure to provide of an organization to adequately protect data sometimes referred to as a negative externality?

Question 11. We learned of a cyberattack where a country attacked a private company in order

to punish the company for something it did that offended the country. What was the country, and what was the company?

Question 12. Describe an example of social engineering used in a specific cyberattack we learned

about this quarter.

Question 13 (4 points) What four countries are considered by the DoD to be the most

significant threats to the United States in cyberspace?

Question 14 (4 points). Would the attack on the Office of Personnel Management be considered

a targeted or an opportunistic attack? Why? (no credit for an answer without an explanation of

your answer)

Question 15 (6 points) . Describe the difference between a cyber espionage attack and a

disruptive cyberattack. Provide an example of one attack of each type that we learned about this

quarter.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases And Python Programming MySQL MongoDB OOP And Tkinter

Authors: R. PANNEERSELVAM

1st Edition

9357011331, 978-9357011334

More Books

Students also viewed these Databases questions