1) Answer the following questions The Parkerian Hexad grew out of the _______ mo
ID: 3904737 • Letter: 1
Question
1) Answer the following questions
The Parkerian Hexad grew out of the _______ model.
Question 1 options:
1)
2)
3)
4)
Save
Question 2 (1 point)
If a computer programmer changes the names of some files in the file directory which of the essential foundation elements has been compromised?
Question 2 options:
1)
2)
3)
4)
Save
Question 3 (1 point)
Which of the following statement is correct?
Question 3 options:
1)
2)
3)
4)
Save
Question 4 (1 point)
In the Nomadic future article the authors talk about a change from the “old tyranny of place” to one of
Question 4 options:
1)
2)
3)
4)
Save
Question 5 (1 point)
The metaphor of the astronaut is used to describe somebody who
Question 5 options:
1)
2)
3)
4)
Save
Question 6 (1 point)
The urban nomad is defined by
Question 6 options:
1)
2)
3)
4)
Save
Question 7 (1 point)
What is the primary reason listed for the lack of discussion of Social Engineering?
Question 7 options:
1)
2)
3)
4)
Save
Question 8 (1 point)
Which of the following human behaviors are not exploited by social engineering attacks?
Question 8 options:
1)
2)
3)
4)
Save
Question 9 (1 point)
Technical attack vectors include all of the following except
Question 9 options:
1)
2)
3)
4)
Save
Question 10 (1 point)
The impact of social engineering on the organization include
Question 10 options:
1)
2)
3)
4)
Save
Question 11 (1 point)
Experts have come to the conclusion that the majority of violations are not caused by
Question 11 options:
1)
2)
3)
4)
Save
Question 12 (1 point)
APTs are primarily targeted at
Question 12 options:
1)
2)
3)
4)
Save
Question 13 (1 point)
Defending against APT attacks has shown that:
Question 13 options:
1)
2)
3)
4)
Save
Question 14 (1 point)
The initial phase in the typical APT lifecycle is
Question 14 options:
1)
2)
3)
4)
Save
Question 15 (1 point)
Leaving a USB key where it could be picked up by an employee is an example of
Question 15 options:
1)
2)
3)
4)
Save
Question 16 (1 point)
To distribute cyberespionage programs, cybercriminals use many of the same methods that they employ to spread other forms of malware – including all the following except:
Question 16 options:
1)
2)
3)
4)
Save
Question 17 (1 point)
First party Cyberinsurance
Question 17 options:
1)
2)
3)
4)
Save
Question 18 (1 point)
Cyberinsurance is a part of which risk management strategy
Question 18 options:
1)
2)
3)
4)
Save
Question 19 (1 point)
Geotaging with EXIF data means
Question 19 options:
1)
2)
3)
4)
Save
Question 20 (1 point)
Usage based insurance (UBI) is designed to
Question 20 options:
1)
2)
3)
4)
Save
Question 21 (1 point)
In the Business Continuity survey the top rated threat to business operations was
Question 21 options:
1)
2)
3)
4)
Save
Question 22 (1 point)
According to NCEI how many weather and climate disasters with excess of $1 billion in losses were there in 2017?
Question 22 options:
1)
2)
3)
4)
Save
Question 23 (1 point)
RMM (remote monitoring and management) tools belong in which pillar of security?
Question 23 options:
1)
2)
3)
4)
Save
Question 24 (1 point)
In the 9 steps to mitigate risk article, establishing a risk profile is part of
Question 24 options:
1)
2)
3)
4)
Save
Question 25 (1 point)
Disaster Recovery-as-a-Service (DRaaS)
Question 25 options:
1)
2)
3)
4)
1)
Clark-Wilson Integrity2)
CMM (Capability Maturity Model)3)
Threats, Assets and Vulnerabilities4)
none of the aboveExplanation / Answer
We are instructed to provide the answer to 4 parts of a given question. Please do not downvote the answer for that reason. Please give a positive rating if you think the answer has helped you.
1. D. None of the above
This is because the Parkerian hexad was based on the CIA triad which is not given as an option hence the correct answer is D.
2. C. Integrity
Changing the names of the files affects its integrity. Hence, the correct answer is C. Integrity.
3. B. A violation of confidentiality always results in loss of exclusive possession
This is because if there is a violation of confidentiality, there is always at least a loss of exclusive possession.
4. C. tyranny of connectivity.
This is because the connectivity is the problem the world is facing with technology right now. And therefore, the nomadic life would require the loss of connectivity and end the tyranny of connectivity.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.