Directions: Work each problem on your own paper.  Please be…

Directions: Work each problem on your own paper.  Please be sure to clearly label your work for each problem with the correct problem number so that it is easy for me to find your work.  When you have completed the exam, you will submit a pdf scan of your work.  Your exam cannot be graded without this scan. SHOW ALL WORK. Credit will not be given for answers without supporting work. Take your time and relax! Important:  When you are done you must submit your exam. You may use the following calculators on your exam. TI-84 Graphing Calculator https://www.desmos.com/calculator. https://www.desmos.com/scientific. To take the Exam 1 please click on the link below.  Write down the password:  Mustangs.  You will need it to access the exam. Right-click here to open and take Exam 1 in a new tab:  Exam 1 When you are finished taking Exam 1 please return to this page and submit your exam.

Alice is investigating a type of attack where an attacker us…

Alice is investigating a type of attack where an attacker uses a short-range wireless communication protocol to send unsolicited messages or contacts to nearby devices without their consent. This technique exploits device discovery features to deliver unexpected messages that may cause annoyance or be used in social engineering, but does not typically involve accessing files or data on the target device. What type of attack is this?

Alice is exploring a specialized search engine designed for…

Alice is exploring a specialized search engine designed for cybersecurity professionals that indexes internet-connected devices such as servers, webcams, routers, and industrial control systems, rather than web pages. This tool enables users to find exposed devices, identify vulnerabilities, and assess the attack surface of networks by scanning for open ports, services, and misconfigurations—what is the name of this powerful website?

Bob encounters a malicious program that spreads by hiding in…

Bob encounters a malicious program that spreads by hiding inside embedded scripts within document files, often taking advantage of the fact that these scripts can execute automatically when the document is opened. Alice explains that this type of malware has the ability to self-replicate and spread across networks, combining the characteristics of a worm with document-based scripting exploits, making it particularly effective at infecting multiple systems quickly through email or file sharing. What type of malware is this?

If you needed a free online service that scans files, URLs,…

If you needed a free online service that scans files, URLs, and hashes by using over 70 antivirus engines to detect malware and security threats, which tool would you use? This platform helps analyze suspicious content by aggregating results from multiple scanners, providing a comprehensive security assessment beyond a single antivirus solution.

Bob is a system administrator who notices unusual behavior f…

Bob is a system administrator who notices unusual behavior from a trusted employee who has legitimate access to sensitive company data. Alice explains that this insider has been secretly copying confidential files and sending them to a competitor, motivated by financial gain. Such actions exploit authorized access to cause harm without raising immediate suspicion. What type of threat does this represent?

Bob discovers a piece of malicious software deeply embedded…

Bob discovers a piece of malicious software deeply embedded within a computer’s operating system that allows an attacker to gain and maintain unauthorized administrator-level access while actively hiding its presence. Alice explains that this type of malware can disable security software, intercept system calls, and maintain control of the compromised device without being detected—what kind of malware is this?

Bob is observing an online auction where he notices that som…

Bob is observing an online auction where he notices that some bids seem to come from accounts linked to the seller, artificially increasing the final price of the item to deceive genuine bidders. Alice explains that this practice involves placing fake or inflated bids to drive up the auction price dishonestly. What is this type of fraudulent activity called?