Question: Question 1 . In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits? Question 2. Name and briefly describe

Question 1 . In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits?

Question 2. Name and briefly describe the first element of deterrence.

Question 3. Name and briefly describe the second element of deterrence.

Question 4. Name and briefly describe the third element of deterrence.

Question 5. For each of the following three activities, name the element of deterrence that the activity represents:

A. Having backup non-networked communications systems

B. Using a network firewall

C. Hackback

Question 6. A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?

Question 7. Place the following terms in chronological order:

A. Collect, Exfil and Exploit

B. Establish Persistence

C. Initial Exploitation

D. Install Tools

E. Move Laterally

F. Reconnaissance

Question 8. The cyberattack against Target stores is best described as an attack against which

one of the three elements of the CIA triad?

Question 9. A DDOS attack is best described as an attack against which one of the three elements of the CIA triad?

Question 10.

Why is the failure to provide of an organization to adequately protect data sometimes referred to as a negative externality?

Question 11. We learned of a cyberattack where a country attacked a private company in order

to punish the company for something it did that offended the country. What was the country, and what was the company?

Question 12. Describe an example of social engineering used in a specific cyberattack we learned

about this quarter.

Question 13 (4 points) What four countries are considered by the DoD to be the most

significant threats to the United States in cyberspace?

Question 14 (4 points). Would the attack on the Office of Personnel Management be considered

a targeted or an opportunistic attack? Why? (no credit for an answer without an explanation of

your answer)

Question 15 (6 points) . Describe the difference between a cyber espionage attack and a

disruptive cyberattack. Provide an example of one attack of each type that we learned about this

quarter.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!