If you encountered a hacker who deliberately breaks into com…

If you encountered a hacker who deliberately breaks into computer networks with malicious intent to steal data, deploy malware, cause disruption, or achieve financial gain through illegal means, what type of hacker would this be? This individual disregards ethical guidelines and legal boundaries, often working alone or within criminal organizations to exploit vulnerabilities for personal or ideological motives.

If a cloud computing service can automatically and quickly a…

If a cloud computing service can automatically and quickly adjust its resources, such as computing power, storage, or network bandwidth, to handle sudden changes in demand by scaling up or down in real time, which key characteristic of cloud computing does this describe? 

Directions: Work each problem on your own paper.  Please be…

Directions: Work each problem on your own paper.  Please be sure to clearly label your work for each problem with the correct problem number so that it is easy for me to find your work.  When you have completed the exam, you will submit a pdf scan of your work.  Your exam cannot be graded without this scan. SHOW ALL WORK. Credit will not be given for answers without supporting work. Take your time and relax! Important:  When you are done you must submit your exam. You may use the following calculators on your exam. TI-84 Graphing Calculator https://www.desmos.com/calculator. https://www.desmos.com/scientific. To take the Exam 1 please click on the link below.  Write down the password:  Mustangs.  You will need it to access the exam. Right-click here to open and take Exam 1 in a new tab:  Exam 1 When you are finished taking Exam 1 please return to this page and submit your exam.

Alice is investigating a type of attack where an attacker us…

Alice is investigating a type of attack where an attacker uses a short-range wireless communication protocol to send unsolicited messages or contacts to nearby devices without their consent. This technique exploits device discovery features to deliver unexpected messages that may cause annoyance or be used in social engineering, but does not typically involve accessing files or data on the target device. What type of attack is this?

Alice is exploring a specialized search engine designed for…

Alice is exploring a specialized search engine designed for cybersecurity professionals that indexes internet-connected devices such as servers, webcams, routers, and industrial control systems, rather than web pages. This tool enables users to find exposed devices, identify vulnerabilities, and assess the attack surface of networks by scanning for open ports, services, and misconfigurations—what is the name of this powerful website?

Bob encounters a malicious program that spreads by hiding in…

Bob encounters a malicious program that spreads by hiding inside embedded scripts within document files, often taking advantage of the fact that these scripts can execute automatically when the document is opened. Alice explains that this type of malware has the ability to self-replicate and spread across networks, combining the characteristics of a worm with document-based scripting exploits, making it particularly effective at infecting multiple systems quickly through email or file sharing. What type of malware is this?