Directions: Work each problem on your own paper.  Please be…

Directions: Work each problem on your own paper.  Please be sure to clearly label your work for each problem with the correct problem number so that it is easy for me to find your work.  When you have completed the exam, you will submit a pdf scan of your work.  Your exam cannot be graded without this scan. SHOW ALL WORK. Credit will not be given for answers without supporting work. Take your time and relax! Important:  When you are done you must submit your exam. You may use the following calculators during the exam. TI-84 Graphing Calculator https://www.desmos.com/calculator. https://www.desmos.com/scientific. To take the Exam 2 please click on the link below.  Write down the password:  WeLoveMath.  You will need it to access the exam. Right-click here to open and take Exam 2 in a new tab:  Exam 2

If a cloud computing service can automatically and quickly a…

If a cloud computing service can automatically and quickly adjust its resources, such as computing power, storage, or network bandwidth, to handle sudden changes in demand by scaling up or down in real time, which key characteristic of cloud computing does this describe? 

Alice is investigating a cyberattack where users are unknowi…

Alice is investigating a cyberattack where users are unknowingly redirected from a legitimate website to a malicious or fraudulent one by exploiting common typing mistakes in web addresses or manipulating how a browser finds a site. This deceptive tactic can steal sensitive information, spread malware, or divert traffic away from the intended destination.   What is this type of attack called?

Bob is a system administrator who notices unusual behavior f…

Bob is a system administrator who notices unusual behavior from a trusted employee who has legitimate access to sensitive company data. Alice explains that this insider has been secretly copying confidential files and sending them to a competitor, motivated by financial gain. Such actions exploit authorized access to cause harm without raising immediate suspicion. What type of threat does this represent?

Alice is investigating a type of attack where an attacker us…

Alice is investigating a type of attack where an attacker uses a short-range wireless communication protocol to send unsolicited messages or contacts to nearby devices without their consent. This technique exploits device discovery features to deliver unexpected messages that may cause annoyance or be used in social engineering, but does not typically involve accessing files or data on the target device. What type of attack is this?

If an attacker uses multiple compromised devices spread acro…

If an attacker uses multiple compromised devices spread across different locations to overwhelm a targeted server, network, or service with massive traffic, making it slow or completely unavailable to legitimate users, what type of cyberattack is being described?