Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Short Quiz Class Activity Student Name: Student ID: Q1) Match the terms with the

ID: 3873961 • Letter: S

Question

Short Quiz Class Activity Student Name: Student ID: Q1) Match the terms with the statements as given below: 10 Marks Terms: 1. Cyber slam 2. Amplification Attack 3. Resources that can be attacked by Dos 4. Flooding Attack 5. Reflection Attack 6. Patent 7. Unintentional threats 8. Alien software 9. Cybercrime 10. Copyright Statements A. network bandwidth, system resources, application resources B. overwhelms the capacity of the network connection to the target organization C. an attack on a specific app by sending requests to consume large amounts of resources, limiting a servers ability to handle valid requests from other users D. an attack that generates multiple response packets for each original packet sent E. a direct attack that sends packets to a known service on the intermediary with a spoofed source address of the actual target system F. Refers to illegal activities conducted over computer networks, particularly the internet G. An official document that grants the holder exclusive rights on an invention or a process for a specified period of time. H. Acts performed without malicious intent that nevertheless represent a serious threat to information security L. A statutory grant that provides the creators or owners of intellectual property with ownership of the property, also for a designated period. J. Clandestine software that is installed on your computer through duplicitous methods

Explanation / Answer

Multiple choice questions:

1. Vulnerability - threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

2. Cybercrime - Cyber crime, or computer oriented crime, is crime that involves a computer and a network. Thecomputer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".

3. Processes of risk management.

4. Theft of equipment and information.

5. Firewall.

True/False questions.

1. True

2. True

3. True

4. False

5. True

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote