If a cloud computing service can automatically and quickly a…

If a cloud computing service can automatically and quickly adjust its resources, such as computing power, storage, or network bandwidth, to handle sudden changes in demand by scaling up or down in real time, which key characteristic of cloud computing does this describe? 

Alice is investigating a cyberattack where users are unknowi…

Alice is investigating a cyberattack where users are unknowingly redirected from a legitimate website to a malicious or fraudulent one by exploiting common typing mistakes in web addresses or manipulating how a browser finds a site. This deceptive tactic can steal sensitive information, spread malware, or divert traffic away from the intended destination.   What is this type of attack called?

Bob is a system administrator who notices unusual behavior f…

Bob is a system administrator who notices unusual behavior from a trusted employee who has legitimate access to sensitive company data. Alice explains that this insider has been secretly copying confidential files and sending them to a competitor, motivated by financial gain. Such actions exploit authorized access to cause harm without raising immediate suspicion. What type of threat does this represent?

Alice is investigating a type of attack where an attacker us…

Alice is investigating a type of attack where an attacker uses a short-range wireless communication protocol to send unsolicited messages or contacts to nearby devices without their consent. This technique exploits device discovery features to deliver unexpected messages that may cause annoyance or be used in social engineering, but does not typically involve accessing files or data on the target device. What type of attack is this?

If an attacker uses multiple compromised devices spread acro…

If an attacker uses multiple compromised devices spread across different locations to overwhelm a targeted server, network, or service with massive traffic, making it slow or completely unavailable to legitimate users, what type of cyberattack is being described?

A patient presents to physical therapy with an unknown diagn…

A patient presents to physical therapy with an unknown diagnosis with parkinsonian features. Symptoms began two months ago. Upon evaluation, the physical therapist finds the following impairments: Magnetic gait with slow, short and shuffling steps and occasional freezing of gait during turns Cognitive impairment including difficulty with dual tasking (25% dual task cost when counting backwards by 3s while ambulating compared to single task trial) Self report of new-onset urinary incontinence What diagnosis is MOST consistent with this presentation?