Cybercriminal databases | Computer Science homework help

TRUE/FALSE QUESTIONS:

1.      No cybercriminal databases exist that can point investigators to likely suspects.

2.      Complying with regulations and contractual obligations is a benefit of security awareness, training, and education programs.

3.      Deleting the browsing history and cookies in a computer system can be the way to completely delete the recently visited sites.

4.      A malicious driver can potentially bypass many security controls to install malware

5.      A stack overflow can result in some form of denial-of-service attack on a system

 

          MULTIPLE CHOICES QUESTIONS

6.      Broad categories of payloads that malware may carry include which of the following:

A.    Corruption of system or data files

B.     Theft of service in order to make the system a zombie agent of attack as part of a botnet

C.     Theft of information from the system, especially of logins, passwords or other personal details by keylogging or spyware programs;

D.    All of the above

Answer

7.      The _______ category is a transitional stage between awareness and training.

A.    roles and responsibilities relative to IT systems

B.     security basics and literacy

C.     education and experience

D.    security awareness

Answer

8.      What is both a benefit and a potentially harmful implication of multilayer protocols?

A.    throughput

B.     encapsulation

C.     hash integrity checking

D.    logical addressing

Answer

9.      The World Wide Web (WWW) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?

A.    link and document encryption

B.     Secure Socket layer and secure HTTP

C.     Link encryption and secure socket layer

D.    Document encryption and secure HTTP

Answer

10.  An effective way to run a World Wide Web (WWW) service is not by.

A.    Disabling automatic directory listings

B.     Placing the standard WWW computer outside the firewall in the DMZ

C.     Implementing encryption

D.    Relying on third-party providers

Answer

11.  Methods to avoid SQL injection include which of the following?

A.    Providing functions to escape special characters

B.     Techniques for the automatic detection of database language in legacy code.

C.     Techniques for the automatic detection of SQL language in legacy code.

D.    All of the above

Answer

12.  __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual records. resource.

A.    Data perturbation

B.     Database access control

C.     Inference channeling

D.    Output perturbation

Answer

13.  With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.

A.    compromise

B.     inference

C.     partitioning

D.    query restriction

Answer

14.  __________  applications is a control that limits the programs that can execute on the system to just those in an explicit list..

A.    virtualization

B.     white listing

C.     logging

D.    patching

Answer

15.  Matthew recently authored an innovative algorithm for solving a mathematical problem that he would like to share with the world. However, prior to publishing the software code in a technical journal, he would like to obtain some sort of intellectual property protection. Which type of protection is best suited to his needs?

A.    copyright

B.     Trademark

C.    patent

D.    trade secrete

 

Answer

 

16.  Richard received an encrypted message sent to him by Sue. Which key should he use to decrypt the message?

A.    Richard’s public key

B.     Richard’s private key

C.     Sue’s public key

D.    Sue’s private key

Answer

17.  Which of the following malicious code objects might be inserted in an application by a disgruntled software developer with the purpose of destroying system data after the developer’s account has been deleted (e.g. following his/her termination)

A.    Virus

B.     Worm

C.     Trojan horse

D.    Logic bomb

Answer

E.      

FILL-IN THE BLANK QUESTION

18.  The information transfer path by which unauthorized data is obtained is referred to as an ___________ channel

Answer:

19.  ________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

 

Answer:

 

20.  Gust OSs are managed by a ______, or VMM, that coordinates access between each of the guests and the actual physical hardware resources..

Answer:

Answer Table

True/False

Answer

1

 

2

 

3

 

4

 

5

 

Multiple Choice

 

6

 

7

 

8

 

9

 

10

 

11

 

12

 

13

 

14

 

15

 

16

 

17

 

Fill-in-the-blank

 

18

 

19

 

20

 

 

 

SHORT ANSWER QUESTION

21.  How can a web site distinguish between lack of capacity and a denial-of-service attack? For example, web sites often experience a tremendous increase in volume of traffic right after an advertisement with the site’s URL is shown on television during the broadcast of a popular sporting event. That spike in usage is the result of normal access that happens to occur at the same time.   How can a site determine that high traffic is reasonable?

 

Answer:

 

 

22.  What are some of the individual rights associated with information privacy? Do expectations of privacy change depending on the individual’s environment?  If so, how?

 

Answer

 

 

 

 

23.  Why is a firewall a good place to implement a VPN?  Why not implement it at the actual server(s) being accessed?

 

Answer:

 

 

24.  Assume you operate an Apache-based Linux Web server that hosts your company’s e-commerce site.  Assume further that there is a worm called “WorminatorX,” which exploits a (fictional) buffer overflow bug in the Apache Web server package that can result in a remote root compromise.  Construct a simple threat model that describes the risk this represents: assets, vulnerability, attack-vector, attacker(s), likelihood of occurrence, likely impact, and plausible mitigations

 

Answer:

 

25.  Consider a popular DRM system like Apple’s FairPlay, used in to protect audio tracks purchased from the iTunes music store. If a person purchased a track from the iTunes store by an artist managed by a record company such as EMI, identify which company or person fulfils each of the DRM component roles shown in Figure 19.3 of Stallings & Brown.

 

 

Answer:

Essay Help
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.