Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

4. In an indirect attack approach The criminal breaks into a system using his or

ID: 379717 • Letter: 4

Question

4. In an indirect attack approach The criminal breaks into a system using his or her own computer b. a. c. d. e. The nefarious message appears to be coming from a trusted source Data traveling over a network is monitored without detection The attacker uses someone else's computer to commit a crime The criminal makes fictitious threats and warnings of attacks 5. A Denial of Service Attack a. b. c. d. e. Redirects users to nefarious websites when they attempt to access a known site. Monitors data travelling over any network and is difficult to detect Prevents site access by sending too many requests at one time Bypasses security to allow an attacker access at will Deploys hacker-code not really understood by the user 6. Which of the following is an example of an Information Control System? a. b. c. d. e. Intrusion Detection System High-availability Computing Encryption Secure Sockets Layer All of the above are examples 7. Which of the following is a goal of Artificial Intelligence? a. b. c. d. e. To allow any size network to benefit equally from interacting To increase the degree of trust between interacting parties To develop computer systems which perform human intelligence functions To find knowledge which is novel, interesting, plausible and understandable To treat information as if it were golden

Explanation / Answer

Answer 4: Option: D: The attacker uses someone else’s computer to commit a crime.

In indirect attack means an attack launched by a attacker from a third party computer as it become more difficult to track the origin of the attack.

Answer 5: Option: C: Prevent site access by sending too many requests at one time.

Denial of service attacks means attacking the network to bring it down by sending useless traffic by affecting the host device which is connected to the internet.

Answer 6: Option A: Intrusion detection system

In which the information is collected from several sources and processed.

Answer 7: Option C: To develop the computer systems which perform human intelligence functions.

The main goal of the AI is to generate a computer system which perform the human intelligence function such as understand, thinking, learning, behaving like humans.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote