Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) Answer the following questions The Parkerian Hexad grew out of the _______ mo

ID: 3904737 • Letter: 1

Question

1) Answer the following questions

The Parkerian Hexad grew out of the _______ model.

Question 1 options:

1)

2)

3)

4)

Save

Question 2 (1 point)

If a computer programmer changes the names of some files in the file directory which of the essential foundation elements has been compromised?

Question 2 options:

1)

2)

3)

4)

Save

Question 3 (1 point)

Which of the following statement is correct?

Question 3 options:

1)

2)

3)

4)

Save

Question 4 (1 point)

In the Nomadic future article the authors talk about a change from the “old tyranny of place” to one of

Question 4 options:

1)

2)

3)

4)

Save

Question 5 (1 point)

The metaphor of the astronaut is used to describe somebody who

Question 5 options:

1)

2)

3)

4)

Save

Question 6 (1 point)

The urban nomad is defined by

Question 6 options:

1)

2)

3)

4)

Save

Question 7 (1 point)

What is the primary reason listed for the lack of discussion of Social Engineering?

Question 7 options:

1)

2)

3)

4)

Save

Question 8 (1 point)

Which of the following human behaviors are not exploited by social engineering attacks?

Question 8 options:

1)

2)

3)

4)

Save

Question 9 (1 point)

Technical attack vectors include all of the following except

Question 9 options:

1)

2)

3)

4)

Save

Question 10 (1 point)

The impact of social engineering on the organization include

Question 10 options:

1)

2)

3)

4)

Save

Question 11 (1 point)

Experts have come to the conclusion that the majority of violations are not caused by

Question 11 options:

1)

2)

3)

4)

Save

Question 12 (1 point)

APTs are primarily targeted at

Question 12 options:

1)

2)

3)

4)

Save

Question 13 (1 point)

Defending against APT attacks has shown that:

Question 13 options:

1)

2)

3)

4)

Save

Question 14 (1 point)

The initial phase in the typical APT lifecycle is

Question 14 options:

1)

2)

3)

4)

Save

Question 15 (1 point)

Leaving a USB key where it could be picked up by an employee is an example of

Question 15 options:

1)

2)

3)

4)

Save

Question 16 (1 point)

To distribute cyberespionage programs, cybercriminals use many of the same methods that they employ to spread other forms of malware – including all the following except:

Question 16 options:

1)

2)

3)

4)

Save

Question 17 (1 point)

First party Cyberinsurance

Question 17 options:

1)

2)

3)

4)

Save

Question 18 (1 point)

Cyberinsurance is a part of which risk management strategy

Question 18 options:

1)

2)

3)

4)

Save

Question 19 (1 point)

Geotaging with EXIF data means

Question 19 options:

1)

2)

3)

4)

Save

Question 20 (1 point)

Usage based insurance (UBI) is designed to

Question 20 options:

1)

2)

3)

4)

Save

Question 21 (1 point)

In the Business Continuity survey the top rated threat to business operations was

Question 21 options:

1)

2)

3)

4)

Save

Question 22 (1 point)

According to NCEI how many weather and climate disasters with excess of $1 billion in losses were there in 2017?

Question 22 options:

1)

2)

3)

4)

Save

Question 23 (1 point)

RMM (remote monitoring and management) tools belong in which pillar of security?

Question 23 options:

1)

2)

3)

4)

Save

Question 24 (1 point)

In the 9 steps to mitigate risk article, establishing a risk profile is part of

Question 24 options:

1)

2)

3)

4)

Save

Question 25 (1 point)

Disaster Recovery-as-a-Service (DRaaS)

Question 25 options:

1)

2)

3)

4)

1)

Clark-Wilson Integrity

2)

CMM (Capability Maturity Model)

3)

Threats, Assets and Vulnerabilities

4)

none of the above

Explanation / Answer

We are instructed to provide the answer to 4 parts of a given question. Please do not downvote the answer for that reason. Please give a positive rating if you think the answer has helped you.

1. D. None of the above

This is because the Parkerian hexad was based on the CIA triad which is not given as an option hence the correct answer is D.

2. C. Integrity

Changing the names of the files affects its integrity. Hence, the correct answer is C. Integrity.

3. B. A violation of confidentiality always results in loss of exclusive possession

This is because if there is a violation of confidentiality, there is always at least a loss of exclusive possession.

4. C. tyranny of connectivity.

This is because the connectivity is the problem the world is facing with technology right now. And therefore, the nomadic life would require the loss of connectivity and end the tyranny of connectivity.