QUESTION 1 1. Differentiate between digital natives and digital immigrants. 2. Discuss the three ways that technology can be abused by individuals. 3. What are (cyber)deviance, cybercrime, and...


QUESTION 1
1. Differentiate between digital natives and digital immigrants.
2. Discuss the three ways that technology can be abused by individuals.
3. What are (cyber)deviance, cybercrime, and cyberterrorism?


QUESTION 2
1. Differentiate between nation-state and non-nation-state hackers.
2. List three key norms and values of the hacker subculture.
3. Identify the various terms used to define and differentiate hackers.
4. Discuss the common types of scans.




QUESTION 3
1. How does a Virus Scanner work?
2. What is a spyware?
3. Differentiate between on-demand virus scanners and ongoing virus scanner.
4. What are the application gateway, application-level proxy, and application proxy?
5. What is the purpose of port scanning?
6. What is the Stateful Packet Inspection (SPI)?


QUESTION 4
1. Differentiate between Denial-of-service (DoS) and Distributed Denial of Service (DDoS).
2. Describe the following items:
 Flood attack
 ICMP flood attack
 UDP flood attack
3. How do you protect the administrator accounts on a server with names that do not
reflect their level of permission?
4. What is a good password?
5. Describe the following items:
 social engineering
 network scanning
 port scanning




QUESTION 5
1. What is the main driving force behind the research into information hiding
techniques?
2. Differentiate between cryptography and steganography.
3. Why should network administrators be more thoroughly checked before they are
employed?
4. Differentiate between Civil and Criminal charges.
5. Answer the following questions:
a) What is the “the three C’s of evidence” when the digital-evidence is handed?
b) What is “Chain of Custody”?
c) What should be included in the Chain of Custody Log?
d) What is the “Chain of custody procedures”?

Jun 10, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here