Differentiate between digital natives and digital immigrants. 2. Discuss the three ways that technology can be abused by individuals. 3. What are (cyber)deviance, cybercrime, and cyberterrorism?
QUESTION 1
1. Differentiate between digital natives and digital immigrants.
2. Discuss the three ways that technology can be abused by individuals.
3. What are (cyber)deviance, cybercrime, and cyberterrorism?
QUESTION 2
1. Differentiate between nation-state and non-nation-state hackers.
2. List three key norms and values of the hacker subculture.
3. Identify the various terms used to define and differentiate hackers.
4. Discuss the common types of scans.
QUESTION 3
1. How does a Virus Scanner work?
2. What is a spyware?
3. Differentiate between on-demand virus scanners and ongoing virus scanner.
4. What are the application gateway, application-level proxy, and application proxy?
5. What is the purpose of port scanning?
6. What is the Stateful Packet Inspection (SPI)?
QUESTION 4
1. Differentiate between Denial-of-service (DoS) and Distributed Denial of Service (DDoS).
2. Describe the following items:
Flood attack
ICMP flood attack
UDP flood attack
3. How do you protect the administrator accounts on a server with names that do not
reflect their level of permission?
4. What is a good password?
5. Describe the following items:
social engineering
network scanning
port scanning
QUESTION 5
1. What is the main driving force behind the research into information hiding
techniques?
2. Differentiate between cryptography and steganography.
3. Why should network administrators be more thoroughly checked before they are
employed?
4. Differentiate between Civil and Criminal charges.
5. Answer the following questions:
a) What is the “the three C’s of evidence” when the digital-evidence is handed?
b) What is “Chain of Custody”?
c) What should be included in the Chain of Custody Log?
d) What is the “Chain of custody procedures”?

Step by step
Solved in 2 steps









