Which of the following is an example of a user domain vulnerability? a.Your laptop NIC failsb.You spill coffee on your laptopc.Your laptop faces a denial of service attackd.You configure a weak password or share it with others

  1. The potential for a negative event to occur is a vulnerability.  True
    False

 

QUESTION 2

  1. Which of the following is an example of a user domain vulnerability? a.Your laptop NIC failsb.You spill coffee on your laptopc.Your laptop faces a denial of service attackd.You configure a weak password or share it with others 1.00000 point

QUESTION 3

  1. Purchasing cyber insurance to cover the loss of revenue during a denial-of-service attack is an example of which of the following risk management techniques?a.Avoidanceb.Acceptancec.Transferd.Mitigation 

QUESTION 4

  1. Disconnecting a Web server from the Internet so it won’t be hacked  is an example of which of the following risk management techniques?a.Acceptanceb.Transferc.Avoidanced.Mitigation

 

QUESTION 5

  1. Which of the following organizations operates within the Department of Homeland Security, serving as a central point of contact for securing cyberspace.a.NCCICb.NISTc.US-CERTd.Mitre’s CVE

 

QUESTION 6

  1. Which of the following organizations provides guidance documents, such as those in their Special Publications (SP) 800 series?a.NCCICb.NISTc.US-CERTd.Mitre’s CVE

 

QUESTION 7

  1. Which of the following is NOT an unintentional threat?a.A Denial-of-Service attack against the Web server.b.The janitor trips over a cord in the computer room that was exposed on the floor and crashes a server.c.A hard drive in a server fails.d.A hurricane floods the computer room.

QUESTION 8

  1. Which of the following is an example of an intentional threat?a.Malware, such as ransomware, infects a computer b.An electrical fire in the computer roomc.A program was not written with security in mind, so has many bugsd.Cheap hard drives were purchased from China having a high rate of failure

 

QUESTION 9

  1. An attack in which more data that what a program was designed to handle is best described as a/an:a.LDAP Injectionb.Buffer Overflowc.DDoS Attackd.SQL Injection

QUESTION 10

  1. Vulnerability/Threat Pairs. Match the following vulnerabilities with its associated threa

Malware infection—-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Potential for denial-of-service attack to be successful—-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Damage to severs and other IT assets—-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Unauthorized access —-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Unauthorized disclosure of data in a database —-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Resources are unavailable to users when they need them —-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Evaluate the employment of psychoactive drugs in the treatment of disorders over the lifespan from both an ethical and risk-benefits perspective.

describe what you believe are the greatest strengths and weaknesses of using the medications to treat psychological disorders. Evaluate the employment of psychoactive drugs in the treatment of disorders over the lifespan from both an ethical and risk-benefits perspective. Summarize the theories of psychiatric disease and the scientific rationale behind its treatment through the employment of drug therapies. Explain what you believe to be the greatest challenges in the use of psychoactive medications over the next several years.

Evaluate drug therapies for treating the disorder (Schizophrenia) based on the current understanding of the biological basis of the disorder and the corresponding behavioral effects of the disorder.

Evaluate drug therapies for treating the disorder (Schizophrenia) based on the current understanding of the biological basis of the disorder and the corresponding behavioral effects of the disorder. Explain pharmacokinetics and pharmacodynamics in relation to the disorder and corresponding drug treatment. Describe any side effects and adverse effects of the drug treatment and their biological basis, including issues related to contraindications, interactions, drug metabolism, and elimination. In addition, explain risks, benefits, and ethical implications for high-risk and exceptional treatment conditions.

The cultures that we examined created works of art that presented the human body in unique ways (both in terms of physical characteristics and underlying meaning). Discuss the meaning of the unique representations of form that the artists created throughout the periods that we’ve examined. Were there instances in which the representation of the human form was more than just an image of what the artist saw?

The cultures that we examined created works of art that presented the human body in unique ways (both in terms of physical characteristics and underlying meaning). Discuss the meaning of the unique representations of form that the artists created throughout the periods that we’ve examined. Were there instances in which the representation of the human form was more than just an image of what the artist saw? Was the human form intended to represent an idea or address the concerns of the artist or those that commissioned the work? If so discuss what these concerns were and how they were approached through art.

Define the scope of the CWU information system capability you would like to propose: what all will it do and what it won’t it do. Is it a completely new feature for MyCWU? Is it a recombining and completing of existing features?

Define the scope of the CWU information system capability you would like to propose: what all will it do and what it won’t it do.  Is it a completely new feature for MyCWU?  Is it a recombining and completing of existing features?  Explain some of the imperfect aspects of the as-is system that you will propose reworking into your to-be capability.  Remember to choose a scope that’s big enough and interesting enough to let you create a Systems Analysis document using all of the models we have studied this quarter.*