Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Solved Assignments
Asked Questions
Answered Questions
Anatomy of an Internet Routing Protocol (the book is available through UMGC's library. Sign in with your UMGC credentials when prompted).
Before conducting a penetration test to determine the network's vulnerabilities, you must analyze the services currently running on the network.
What are other SIEM products similar to Splunk? Name at least two. Compare their strengths and weaknesses against Splunk.
How does the use of the HTML5 tag differ from previous versions of HTML when creating navigation?
How many phases in attack lifecycle? Does attacks always flow through all of them in order? If not show an example of an attack that may flow back and forth.
Explore and understand T1559 techniques of MITRE Attack Framework. It has two subclasses, DDE and COM; please make sure you have a good understanding of both.
Discuss how HIPAA compliance affects the implementation of access controls for a cloud-based location.
Explain ways you can further minimize the attack surface of an organization by building on previously implemented HIPAA compliance requirements.
Discuss how meeting HIPAA compliance can minimize the possibility of a data breach when implementing encryption.
Research the term "cyberwar." How does using the internet to wage a cyberwar affect personal and corporate privacy?
What is information security? How has the concept of security for the use of computer systems changed over time?
Discusses How individuals have the responsibility of practicing ethical cybersecurity. The article notes that "it comes down to their ethical yardstick.
Identify security-related threats to the organization. Identify vulnerabilities within the organization's architecture.
Read the Risk Assessment Policy in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of policy.
Do you have experience responding to customer privacy and data protection questionnaires in writing as part of the sales RFP/RFI contracting process?
Discuss the different use of PETs in different countries and associated data privacy management challenges. For example PETS use in China to avoid censorship.
Discuss data breaches trends, impacts & outstanding issues. Discuss the last five years Identity theft trends from the latest FTC Sentinel ID Theft report.
Article "Don't Include Social Engineering in Penetration Tests," discuss whether social engineering should be included as part of a penetration test.
IP software monitors can provide insight into an incident for a forensics evaluation. Use the Internet to research NetFlow, sFlow, and IPFIX.
How comprehensive would you say the States Cybersecurity Strategy is? Does it hit some aspects of the NIST framework, a majority of the NIST framework?
Explain different methods for backing up computer data. Include why it's important to automate the process.
Describe enterprise, national, and international cybersecurity policy issues that arise due to the deployment of cyber-physical systems.
What is the nickname of the malicious actors involved in this conversation? Add the names in the order they appear in the conversation.
What is a recommended cybersecurity policy framework that when deployed would minimize the opportunity for a successful critical infrastructure cyberattack?
What are the primary advantages and disadvantages of each of these features? How do they enhance Wi-Fi security?