Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ITS 3210 Chapter 3 - What Would You Do.

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
21-06-2021
Written in
2020/2021

1. You and your team have been hired to assess the computer security of a small retailer. Where would you begin your assessment? What would you look for? a. I would begin by examining the permissions and security surrounding the database servers, firewalls, and web application server in use by the company. I would also look for any open ports, unneeded access, and public facing interfaces. 2. It appears that someone is using your firm’s corporate directory—which includes job titles, email addresses, and phone numbers—to contact senior managers and directors via text message. The text message requests that the recipient click on a URL, which leads to a website that looks as if it were designed by your human resources organization. Once at this phony website, the employees are asked to enter their bank routing number and account number to be used for electronic deposit of their annual bonus check. You are a member of the IT security group for the firm. What can you do? a. I would put out a memo letting the team know that a phishing attempts going around, and to not click on any suspicious links and to report these suspicious links to IT. I would then remove the upper management cellular numbers from the directory, and attempt to look through the logs for any suspicious access attempts to the directory itself. 3. You are the manager of the IT organization of a small business. The owner calls you late one night and tells you that she just received an anonymous call demanding payment of $10,000 or the company’s customer database will be encrypted and made inaccessible by a logic bomb that has already been planted in the firm’s billing system. What do you say? What can you do? a. I would tell her not to pay it. Immediately pull any back up servers offline to save the information just in case they really do go through with the logic bomb. I would then pull the system off the network for the period that they say they will enact it. 4. Your classmate tells you that he has been working all semester to create a blended threat and that he plans to test it against the university’s computer systems this weekend. What do you say? a. Tell him that I don’t want to know what he plans on doing, and that he should not go through with it. If he does go through with it and the system is compromised and they start to investigate I would tell the truth and admit who initiated the attack

Show more Read less
Institution
Course

Content preview

Chapter 3 – What Would You Do

Farah Zoma

1. You and your team have been hired to assess the computer security of a small retailer. Where
would you begin your assessment? What would you look for?
a. I would begin by examining the permissions and security surrounding the database
servers, firewalls, and web application server in use by the company. I would also look
for any open ports, unneeded access, and public facing interfaces.
2. It appears that someone is using your firm’s corporate directory—which includes job titles, email
addresses, and phone numbers—to contact senior managers and directors via text message. The
text message requests that the recipient click on a URL, which leads to a website that looks as if
it were designed by your human resources organization. Once at this phony website, the
employees are asked to enter their bank routing number and account number to be used for
electronic deposit of their annual bonus check. You are a member of the IT security group for the
firm. What can you do?




m
a. I would put out a memo letting the team know that a phishing attempts going around,




er as
and to not click on any suspicious links and to report these suspicious links to IT. I would




co
then remove the upper management cellular numbers from the directory, and attempt




eH w
to look through the logs for any suspicious access attempts to the directory itself.




o.
3. You are the manager of the IT organization of a small business. The owner calls you late one
rs e
night and tells you that she just received an anonymous call demanding payment of $10,000 or
ou urc
the company’s customer database will be encrypted and made inaccessible by a logic bomb that
has already been planted in the firm’s billing system. What do you say? What can you do?
a. I would tell her not to pay it. Immediately pull any back up servers offline to save the
o

information just in case they really do go through with the logic bomb. I would then pull
aC s


the system off the network for the period that they say they will enact it.
vi y re


4. Your classmate tells you that he has been working all semester to create a blended threat and
that he plans to test it against the university’s computer systems this weekend. What do you
say?
a. Tell him that I don’t want to know what he plans on doing, and that he should not go
ed d




through with it. If he does go through with it and the system is compromised and they
ar stu




start to investigate I would tell the truth and admit who initiated the attack.
5. You are one of the top students in your university’s computer science program of 100 students,
and you have agreed to meet with a recruiter from the Department of Homeland Security. Over
is




dinner, he talks to you about the increasing threat of cyberterrorist attacks launched on the
United States by foreign countries and the need to counter those attacks. The agency has a
Th




strong need for people who can both develop and defend against zero day exploits that could be
used to plant malware in the software used by the government and military computers. At the
end of the dinner, the recruiter asks, “Would such a role be of interest to you?” How do you
sh




respond?
a. That I would be very interested in such an opportunity and to be able to increase my
knowledge regarding something that is not readily available to the public. Plus it would
look amazing on my resume.
6. You are a computer security trainer for your firm’s 200 employees and contract workers. What
are the key topics you would cover in your initial half-hour basic training program on security for



This study source was downloaded by 100000793680026 from CourseHero.com on 06-21-2021 05:40:44 GMT -05:00


https://www.coursehero.com/file/40922854/Chapter-3-What-Would-You-Dodocx/

Written for

Institution
Course

Document information

Uploaded on
June 21, 2021
Number of pages
2
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Available practice questions

$7.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Examhack Stanford University
Follow You need to be logged in order to follow users or courses
Sold
299
Member since
4 year
Number of followers
238
Documents
999
Last sold
1 hour ago
EASY A GRADE!!

Here, you will find simple, articulate well-researched education material for you. .... ALL WORK HAS PASSED WITHOUT NEEDING REVISIONS AND BY THE RUBRIC.

3.8

61 reviews

5
31
4
11
3
5
2
4
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions