QUESTION 11. Differentiate between digital natives and digital immigrants.2. Discuss the three ways that technology can be abused by individuals.3. What are (cyber)deviance, cybercrime, and cyberterrorism?
QUESTION 21. Differentiate between nation-state and non-nation-state hackers.2. List three key norms and values of the hacker subculture.3. Identify the various terms used to define and differentiate hackers.4. Discuss the common types of scans.
QUESTION 31. How does a Virus Scanner work?2. What is a spyware?3. Differentiate between on-demand virus scanners and ongoing virus scanner.4. What are the application gateway, application-level proxy, and application proxy?5. What is the purpose of port scanning?6. What is the Stateful Packet Inspection (SPI)?QUESTION 41. Differentiate between Denial-of-service (DoS) and Distributed Denial of Service (DDoS).2. Describe the following items: Flood attack ICMP flood attack UDP flood attack3. How do you protect the administrator accounts on a server with names that do notreflect their level of permission?4. What is a good password?5. Describe the following items: social engineering network scanning port scanning
QUESTION 51. What is the main driving force behind the research into information hidingtechniques?2. Differentiate between cryptography and steganography.3. Why should network administrators be more thoroughly checked before they areemployed?4. Differentiate between Civil and Criminal charges.5. Answer the following questions:a) What is the “the three C’s of evidence” when the digital-evidence is handed?b) What is “Chain of Custody”?c) What should be included in the Chain of Custody Log?d) What is the “Chain of custody procedures”?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here