Question Set 3 – 3.5 Referring to Figure 3.3, which of the f…
Question Set 3 – 3.5 Referring to Figure 3.3, which of the following attack scenarios are presented based on the given AG? (select all that apply) Figure 3.3. Network Setup and Attack Scenario Computer network attack diagram with an attacker, firewall, router, FTP, and a database server, connected by a flowchart of probable attack steps reaching a “local_bof()” function with numerical probabilities.
Read DetailsQuestion Set 3 – 3.3 Referring back to Figure 3.1, which of…
Question Set 3 – 3.3 Referring back to Figure 3.1, which of the following statements are correct? (select all that apply)The temporal metric can be summarized as shown in Figure 3.1 below: (Defined (X) in RC should be Undefined (X)) Figure 3.1. Temporal Metrics Flowchart titled “Temporal Metrics” with three columns indicating stages of exploit code maturity, remediation level, and report confidence.
Read DetailsQuestion Set 4 – 4.4 The list below presents the procedural…
Question Set 4 – 4.4 The list below presents the procedural steps of FNN. Which of the answer options presents their correct order? STEP A: Input the first observation of your dataset in the input layer, each feature in one input node. STEP B:Compare the predicted result to the actual result. Measure the generated error. STEP C: Forward-propagation: from left to right, the neurons are activated in a way that the impact of each neuron’s activation is limited by the weights. Propagate the activations until getting the predicted result y. STEP D: Randomly initialize the network, set weights to small numbers close to 0 (but not 0). STEP E: Repeat previous steps and update the weights after each observation. Or, repeat previous steps but update the weights only after a batch of observations (Batch Learning). STEP F:Back-Propagation: From right to left, the error is back-propagated. Update the weights according to how much they are responsible for the error. The learning rate decides by how much we update the weights.
Read DetailsQuestion Set 3 – 3.7 You can also use the attack countermeas…
Question Set 3 – 3.7 You can also use the attack countermeasure tree (ACT) to model the attack scenarios. For example, Figure 3.4 presents a BGP attack scenario. In the figure, the money value ($) are used to represent how much effort an attacker needs to expend to deploy the attack. Referring to Figure 3.4 and if the attacker’s budget constraint is $2900 (so the sum of the effort spent by the attacker cannot exceed $2900 ), which attack scenarios are possible? (select all that apply) Figure 3.4. Attack Countermeasure Tree Flowchart depicting alternative methods for resetting a BGP session with decision points, actions, and associated costs ranging from 800 to 4000.
Read DetailsGiven the following Circle class code, use the provided UML…
Given the following Circle class code, use the provided UML to write the code of the Cylinder class which is a subclass of the Circle class. ————————————————————————————————————- UML Cylinder – height: double + setHeight(h: double): void + getHeight( ) : double + toString( ) : String +Cylinder( ) +Cylinder(c: String, r: double, h: double)
Read Details