Your work has been saved and submitted
Written Feb 13, 2024 7:35 PM - Feb 13, 2024 7:46 PMAttempt
1 of 2
Attempt Score
2 / 2 - A
Overall Grade (Highest Attempt)
2 / 2 - A
Question 1
1 / 1
point
Match each description on the left with the corresponding term on the right.
__3
__
The ability to think like a hacker
__2
__
The removal of clutter; only the needed information is provided for an object-
oriented mentality
__5
__
Devices and applications that exhibit human intelligence and behavior, including
robots, self-driving cars, medical diagnosis, and voice- and natural-language
recognition
1
.
Attack Vector
2
.
Abstraction
3
.
Adversarial Thinking
4
.
Encapsulation
5
.
Artificial Intelligence
Hide question 1 feedback
These definitions are all related to ways a hacker might think, or technologies they might use in attacks, which you will encounter in this course. Dig into your glossary to find out more!
Question 2
1 / 1 point
Match each description on the left with the corresponding term on the right.
__4
__
The ability to only use a resource as it was designed to be used; this may mean that a piece of equipment is not being used maliciously or in a way that could be detrimental to the overall system
__1
__
All accesses to objects should be checked to ensure that they are allowed
__3
__
The approach used to assault a computer system or network; because it is a fancy way of saying “method or type of attack,” the term may refer to a variety of 1
.
Complete Mediation
2
.
Adversarial Thinking
3
.
Attack Vector
4
.
Encapsulation
5
.
Artificial Intelligence