CIS 170 Midterm Exam Solution https://hwguiders.com/downloads/cis-170-midterm-exam-solution CIS 170 Midterm Exam Solution • Question 1 Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer. • Question 2 Child pornography is an example of which type of computer crime? • Question 3 Agnew argues that crime is due to a lack of attachment to parents. • Question 4 _____________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future • Question 5 Which of the following forms of technology expanded the scope of hacker activities? • Question 6 The primary avenue of redress for corporations
Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting. In order to prove that the network breach was a terrorist attack the company would need to provide electronic evidence of these types of information warfare. Information warfare is a term often used interchangeably with cyberterrorism but provides a deeper understanding in the shift of how data has become fundamental to society. As governments, companies and people shift to the use of digital information so have the methods used to attack (Gilmer, 2001). In order to combat this aspect of terrorism, the military have adopted computer forensics as part of their defenses (Vacca & Rudolph, 2011).
Attackers find deleted unencrypted copies of several files you created and stored as encrypted. 7. Another user makes destructive changes to one of your spreadsheets. 8. An attacker can access the Web server.
Port scans are the way in for the attacker. The port scan lets the attacker know what ports on a machine are open. This is basically an unlocked door into that machine. The attacker can gain access to information they will use in their attack on the system itself. These attacks can lead to the theft of any information stored in the network and is a serious threat to information security.
Capstone | Smiley Face Killer | Unit 5 Assignment 2 | | Cristina Barton | 4/24/2014 | | Keith Hunter Jeperson Born on April 6, 1955, is a Canadian serial killer known as the “Smiley Face Killer” (The serial killer hit list). He is known as the Smiley face killer for the smiley face he drew on many of his letters to the media and prosecutors. He embarked on a murderous spree in the United States during the early 1990’s. He had a violent and troubled childhood under a domineering, alcoholic father. His family treated him like an outcast, and he got teased by other children because of his big size at a young age.
Spyware is almost exactly as it sounds, a spying program. This type of malware will record the users input and transmit it back to the hacker to access at his leisure. This type of spyware is called a key logger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. The more advanced versions of spyware can siphon off network data that will allow the hacker access to files, encryption keys, and other sensitive information. The final malware I will cover is the zombie.
9. Assuming Miss Meanor is found guilty, when will the Judge impose sentence? 10. What is the maximum sentence to be imposed? Scenario #2 Frank Felon a native of Akron Ohio was arrested by officers from the Cleveland Police Department for allegedly committing felonious assault on Vince Victim also of Akron during a tailgate party prior to the Barry Manilow concert at the “Q” Arena on June 29, 2011.
Dennis Rader recounts that he developed his fantasies about torture, control and bondage at this early age, while he was still in grade school. Dennis says and admits that as he was growing into manhood he fantasied about tying up girls and telling them what to do. Dennis confesses to having tortured cat and dogs by hanging them and thus having to keep this secret from others and rightly so did it very good. As a young adult Dennis was a polite and quite young man who would prefer to keep to himself. Like other young adults of his time Dennis was not very much into the fashions or music of the times and would tend to be more focused and studious.
It will inform you on how hackers and system administrators used ping sweeps and port scans. While describing some of these notorious computer activities, these techniques will also be shown how system administrators can use to benefit the company. Two techniques that are used to attack a network is ping sweep and port scans. These activities can be used with malicious intent against, as well as, in effort to try to protect a network. Ping sweeps and port scans has been a notorious and yet a useful tool for hackers and system administrators.
On Thursday, April 18th, three days after the attack, a Massachusetts Institute of Technology police officer was found dead near the campus. That same night a SUV was hijacked, keeping the victim in the car. The victim later escaped and the police tracked the two suspects as they were driving in two different vehicles. Police pursued the stolen vehicles to the Boston suburb of Watertown. Between the hours of 12:00AM and 1:00AM on April 19th Dzhokar and Tamerlan were spotted and they engaged in a shoot-out with the officers.