Essay Question: Select the most important topic that you learned in Math 34. How will this be helpful to your life? Your essay should be at least 2 paragraphs (250 – 300 words).
Bob encounters a malicious program that spreads by hiding in…
Bob encounters a malicious program that spreads by hiding inside embedded scripts within document files, often taking advantage of the fact that these scripts can execute automatically when the document is opened. Alice explains that this type of malware has the ability to self-replicate and spread across networks, combining the characteristics of a worm with document-based scripting exploits, making it particularly effective at infecting multiple systems quickly through email or file sharing. What type of malware is this?
If you needed a free online service that scans files, URLs,…
If you needed a free online service that scans files, URLs, and hashes by using over 70 antivirus engines to detect malware and security threats, which tool would you use? This platform helps analyze suspicious content by aggregating results from multiple scanners, providing a comprehensive security assessment beyond a single antivirus solution.
Bob is a system administrator who notices unusual behavior f…
Bob is a system administrator who notices unusual behavior from a trusted employee who has legitimate access to sensitive company data. Alice explains that this insider has been secretly copying confidential files and sending them to a competitor, motivated by financial gain. Such actions exploit authorized access to cause harm without raising immediate suspicion. What type of threat does this represent?
If you encountered an individual who uses hacking techniques…
If you encountered an individual who uses hacking techniques to promote political or social causes by disrupting websites, leaking information, or conducting protests through cyberattacks, what type of hacker would this be?
Bob discovers a piece of malicious software deeply embedded…
Bob discovers a piece of malicious software deeply embedded within a computer’s operating system that allows an attacker to gain and maintain unauthorized administrator-level access while actively hiding its presence. Alice explains that this type of malware can disable security software, intercept system calls, and maintain control of the compromised device without being detected—what kind of malware is this?
Bob is observing an online auction where he notices that som…
Bob is observing an online auction where he notices that some bids seem to come from accounts linked to the seller, artificially increasing the final price of the item to deceive genuine bidders. Alice explains that this practice involves placing fake or inflated bids to drive up the auction price dishonestly. What is this type of fraudulent activity called?
If an attacker uses multiple compromised devices spread acro…
If an attacker uses multiple compromised devices spread across different locations to overwhelm a targeted server, network, or service with massive traffic, making it slow or completely unavailable to legitimate users, what type of cyberattack is being described?
What diagnosis is MOST consistent with the patient’s present…
What diagnosis is MOST consistent with the patient’s presentation?
What is the MOST appropriate referral needed to help in the…
What is the MOST appropriate referral needed to help in the management of this patient’s case?