Question
Question 1 . In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits? Question 2. Name and briefly describe
Question 1 . In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits?
Question 2. Name and briefly describe the first element of deterrence.
Question 3. Name and briefly describe the second element of deterrence.
Question 4. Name and briefly describe the third element of deterrence.
Question 5. For each of the following three activities, name the element of deterrence that the activity represents:
A. Having backup non-networked communications systems
B. Using a network firewall
C. Hackback
Question 6. A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?
Question 7. Place the following terms in chronological order:
A. Collect, Exfil and Exploit
B. Establish Persistence
C. Initial Exploitation
D. Install Tools
E. Move Laterally
F. Reconnaissance
Question 8. The cyberattack against Target stores is best described as an attack against which
one of the three elements of the CIA triad?
Question 9. A DDOS attack is best described as an attack against which one of the three elements of the CIA triad?
Question 10.
Why is the failure to provide of an organization to adequately protect data sometimes referred to as a negative externality?
Question 11. We learned of a cyberattack where a country attacked a private company in order
to punish the company for something it did that offended the country. What was the country, and what was the company?
Question 12. Describe an example of social engineering used in a specific cyberattack we learned
about this quarter.
Question 13 (4 points) What four countries are considered by the DoD to be the most
significant threats to the United States in cyberspace?
Question 14 (4 points). Would the attack on the Office of Personnel Management be considered
a targeted or an opportunistic attack? Why? (no credit for an answer without an explanation of
your answer)
Question 15 (6 points) . Describe the difference between a cyber espionage attack and a
disruptive cyberattack. Provide an example of one attack of each type that we learned about this
quarter.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started