Tuesday, December 24, 2019

The Effects Of Global Warming On The Earth Essay - 1733 Words

Save the Earth The Earth is slowly dying and we can save it, however, it requires some initiative. Global warming, or climate change, is a very real problem that may soon wipe out the Earth’s resources. Some of which include necessary items such as natural foods and water. This problem doesn’t just happen in some third-world country no one has heard of. This is happening right in our own back yards. This problem has a very simple solution: conserve energy, cut down on Carbon Dioxide emissions, and focus on developing technology that utilizes clean renewable energies. Global warming primarily happens through a process called the greenhouse effect. â€Å"Like global warming, this is a natural phenomenon. As sunlight hits the earth, some of the heat is reflected back into space, while some is absorbed by naturally occurring atmospheric gases such as carbon dioxide and methane. Like insulation, the heated gas and atmosphere keep the earth warm enough to sustain life†(NSU, 2011). While the main purpose of this greenhouse effect is to keep the planet at a sufficient temperature to sustain life, the recent increase in carbon dioxide emissions has led to the Earth overheating. This poor management of energy has led to catastrophic events. Due to climate change, droughts have occurred, sea levels have risen, and storms are more devastating. Climate change has caused temperatures to rise drastically and these temperatures will continue to rise by an unpredictable amount over the nextShow MoreRelatedThe Effects Of Global Warming On Earth1577 Words   |  7 PagesTo sustain life on earth, the earth temperature must be maintain at a very delicate figure. But what if the unthinkable happens? What if the earth’s temperature was to increase by a just mere half a degree, maybe a full or even two or three, the effects could be devastating to the environment, to me and to you. Unfortunately we may have the opportunity to see the effects of the earth temperature rising a few degrees in this lifetime. According to scientist, for hundreds of thousands of years, a phenomenonRead MoreGlobal Warming And Its Effects On The Earth927 Words   |  4 PagesGlobal-Warming Mother Earth is burning as we speak; humanity has killed our precious Earth. Global-warming is a vicious killer that was created by the humans on this Earth, and there s no way to cure it. We,as humans, have the power to cleanse the Earth, but instead we destroy it. Heat is absorded by carbon dixide and greenhouse gases. A greenhouse gas absorb thermal radiation emmited by the Earth s surface. As the sun s energy reaches the Earth’s surface some of it goes back out into spaceRead MoreThe Effects Of Global Warming On The Earth901 Words   |  4 Pages What is Global Warming? Countless feel as if it is a natural phenomenon that the Earth cycles through. They are terribly mistaken. It is the effect of greenhouse gasses that are emitted by the machines we use today. These gasses are becoming trapped in the earth’s atmosphere, causing the temperature to rise. The effects of global warming are all around us and are becoming more prominent. There are already efforts in place to stop it and programs to â€Å"go green†. This climate change is a serious threatRead MoreThe Effects Of Global Warming On The Earth992 Words   |  4 Pagesthe Earth. Global warming is a problem that some people choose to ignore. They claim it doesn’t exist. Global warming is real. It is time for people to stop ignoring it and start finding a solution. What is global warming? Global warming is the result of certain gases building up in the atmosphere that block heat from escaping. These gases are causing a temperature rise in the Earth’s atmosphere and causing climate change. The rise in the Earth’s temperature has had many effects on the Earth itselfRead MoreGlobal Warming And Its Effect On Earth1612 Words   |  7 PagesName: Course: Title: Global Warming Introduction For over a hundred years, humans have understood the possibility of atmospheric warming due to anthropogenic carbon dioxide emissions. As early as 1896, Swedish chemist Svante Arrhenius predicted that a doubling of atmospheric carbon dioxide would raise average global temperatures by 4.95 degrees C (9.0 degrees Fahrenheit) (Valente, 1995). The greenhouse effect, a natural phenomenon that has allowed the development of life on earth, is thought by manyRead MoreThe Effects of Global Warming on the Earth990 Words   |  4 PagesGlobal Warming Earth’s temperature is a vital aspect to Earth and its surroundings. The atmospheric temperature along with natural gases is the significant reasons why Earth inhabits all of its life. When there are changes that alter the natural affects of Earth’s environment there are factors that places the environment at risk. Increase warming of global temperatures account as a major concern of Earth’s surroundings. Global warming is a prominent source to consider how and why the environmentRead MoreThe Effects Of Global Warming On The Earth Essay1320 Words   |  6 PagesGlobal warming is an increase in the earth’s average atmospheric temperature that causes corresponding changes in the climate and the may result from the greenhouse effect. Many people do not believe that this is true. There are multiple studies that provide information to prove global warming is factual. As the years go by, the more damage is being done to our atmosphere and it is affecting the e arth. It is not hard to believe that global warming affects the earth so negatively by the drastic changeRead MoreThe Effects Of Global Warming On Earth882 Words   |  4 Pages Global warming is an increase in the overall temperature of earth atmosphere. Earth s climate is changing, temperatures are rising, snow and rainfall are shifting, and more extreme climate like heavy rainstorms and high temperatures are already affecting the society and economy. Scientists are confident that many of the observed changes are happening because of the global warming. Warming and climate are changing and increasing every year. The main Cause are by people burning fuels to generateRead MoreThe Effects Of Global Warming On The Earth901 Words   |  4 PagesInconvenient â€Å"by Al Gore. In this video Gore is explaining about how the earth has became hotter than it ever has before. The ten hottest years we have ever had have been in the last fourteen years. According to the video the hot test year was in 2005. From Gore’s viewpoint we as the people are causing global warming by ourselves. Because we are the ones that are causing global warming it is having some major effects on the earth. You have Mt. Kilimanjaro, which over the years has had a lot of snow onRead MoreGlobal Warming And Its Effect On The Earth2122 Words   |  9 PagesWhat is global warming and what is the proof that it exists? The topic of whether global warming is real and what the consequences it may have has been heavily debated for quite some time now. The reason why it has been debated for such an extended amount of time is because there are still unknowns to confirm that global warming is a true threat to the earth. Many people do not believe in global warming because they truly do not know the basic concept of global warming. There are missing pieces to

Sunday, December 15, 2019

Assessment for Learning and Teaching Free Essays

The key to effective practice is to be able to work out what a child’s specific needs are at one time, and to find ways of creating opportunities for them to succeed (Moyles and Robinson, 2002:281). Assessment is the process of measuring someone’s knowledge, skills and understanding, therefore to get to know the pupils in my class and to understand their learning and behavioural needs I used assessment strategies. Using assessment strategies allows teachers to evaluate learning needs and allow children to all get the correct teaching they deserve, improving outcomes for all learners and making every child matter. We will write a custom essay sample on Assessment for Learning and Teaching or any similar topic only for you Order Now If we think of our children as plants, summative assessment of the plants is the process of simply measuring them. The measurements might be interesting to compare and analyse, but, in themselves, they do not affect the growth of the plants. Formative assessment, on the other hand, is the garden equivalent of feeding and watering the plants-directly affecting the growth (Clarke, 2001:2). Clarke makes an effective link in this metaphor explaining how formative assessment describes processes of teaching and learning and the importance of this, whereas summative assessment takes place after the teaching and learning.Assessment for learning (formative) informs assessment of learning (summative). Teachers need to use their assessment for learning to facilitate learning and to ensure learning is taking place, this will then inform the assessment of learning when their work is marked or levelled at the end of the term or year to sum up their learning, this is important and will allow teache rs to gain an understanding of where this child is in their learning and to discover what a learner has achieved over the year. Black and Wiliam from Kings College, University of London in 1988 were commissioned to find out whether or not formative assessment could be shown to raise levels of attainment. This research concluded that formative assessment strategies do raise standards of attainment: There is a body of firm evidence that formative assessment is an essential feature of classroom work and that formative assessment is an essential feature of classroom work and that development of it can raise standards (1998:13). In my experiences in schools formative assessment really informed my teaching and practice.The class teacher and assistants carried out observations during group work in lessons, however these observations were not used or looked at during the planning process and so the next lessons were too challenging for some learners. When I took over the teaching and planning, I ensured that I used the observations of pupils to inform my planning of the next lesson. The year one teachers also used th e previous year’s plans and both classes had the exact same plans which were not adapted for their class.In my opinion both classes have different learners with individual needs and the learning was not personalised for them. â€Å"Practitioners will need to plan for each child’s individual learning requirements† (Nutbrown and Clough 2006:10). Formative assessment is essential in teaching and if teachers do not use it effectively they may hinder pupils learning. Teachers need to plan to suit all learners individual needs and abilities and if teachers do not do this â€Å"there is a danger of requiring children to take steps that are too large for them, so they can only follow blindly, without understanding† (Harlen et al, 2003:81).The assessment reform group (1999) discusses assessment for learning in practice and summarises the characteristics of assessment that promotes learning for each individual pupil. These characteristics include sharing learning goals with pupils as this helps them to recognise what they are aiming for, also self- assessment which provides feedback for pupils allowing them to recognise their next steps and how to take them. Furthermore assessment is underpinn ed by confidence that every pupil can improve and this involves both teacher and pupils reflecting on assessment data.These characteristics of assessment were seen whilst in schools and when used well by teachers worked very well. Making the learning intentions clear whilst planning helped when assessing children’s understanding and if they had met the success criteria of the learning intention. â€Å"The learning intention is the heart of formative assessment and needs to be made clear at the planning stage† (Clarke, 2001:8). Sharing the learning intentions with pupils is significant in effecting teaching and assessment, â€Å"research shows that children are more motivated and task oriented if they know the learning intention of the task† (Clarke, S, 2001:19).The learning intention needs to be delivered to the pupils at their level of understanding and in my last placement success criteria were used involve pupils in their own learning which in turn developed self assessment and understanding. In my experiences during the plenary worked well in recapping over the learning intentions, giving the pupils the opportunities to self assess whilst in turn giving the teacher a chance to observe their understanding.Black and Wiliam’s research shows that if peer and self assessment is linked with the learning intentions of a task, children’s progress, persistence and self-esteem is improved (1998). In my teaching I used peer and self assessment in my lessons as it allowed pupils to take responsibility for their learning and increase their understanding. In physical education lessons I encouraged pupils to assess themselves and each other’s performances, saying two things they liked and one thing they could improve on.This was beneficial to pupils as they received praise and ideas from their peers which developed their self-esteem and helped with the understanding of the activity. Assessment for learning seeks to involve pupils in peer assessment so that they can reflect and discuss how they can improve their performance on future occasions (Galton 2007). As a teacher I will encourage the use of paired talk as peer discussions involve children talking to each other in a language they are familiar with and therefore more likely to understand.Peer assessment provides children with the opportunity to discuss with and challenge each other which are valuable experiences that cannot be gained when working alone. Vygotsky and Bruner stress the importance of social interactions between learners as this leads to a greater understandin g of the work being discussed (Pritchard, 2009). Furthermore working with a peer, reading work to each other and supporting each other can aid pupil’s learning as Vygotsky suggests further: A child can perform at a higher level when supported or ‘scaffolded’ by an dult or more experienced peer, described as their ‘level of potential development (Whitebread 2003:97). Black and Wiliam’s research however showed inhibiting factors concerned with effective learning and the use of assessment, â€Å"for primary teachers particularly, there is a tendency to emphasise quantity and presentation of work and to neglect its quality in relation to learning† Furthermore â€Å"the collection of marks to fill up records is given greater priority than the analysis of pupils work to discern learning needs† (1998:4).This was apparent in my experiences as teachers were focusing on quantity of work to go in their files and giving a greater attention to marking work, rather than giving pupil’s feedback and helping them understand how they can move forward in their learning. As Galton suggests â€Å"feedback, in the widest sense, involves more than simply correcting mistakes† (2007:84). To assess pupils understanding teachers must be involved in gathering information about pupils learning and include them in critically and constructi vely reviewing their work.The Assessment Reform group discusses the methods for gaining such information and includes observing pupils, including listening to how they describe their work, questioning using open questions and asking pupils to communicate their thinking in different ways (1998). Questioning is an important strategy that I used in my teaching, not only does it keep pupils alert and on task, it allows teachers to elicit children’s understanding and misconceptions. It also provides an opportunity for children to extend their thinking and promotes inclusion. Effective questioning from the teacher can lead to rich class discussions which provide the teacher with a vast amount of information to assess the children’s understanding (Black et al, 2003). From my experiences open questions were more effective as they â€Å"can encourage self-expression and extended responses† (Tanner and Jones, 2003:49). Closed questions on the other hand worked in certain situations for example testing or behaviour management, however if used often in lessons some pupils were afraid of answering as closed questions suggest there is a right or wrong answer and his hindered their involvement and learning. Tanner and Jones support this: Although closed are adequate for assessing lower-order skills and the recall of information an over-reliance on this restricted form of questioning has negative consequences for learning (2003:49). Questioning and observing pupils learning and understanding has informed my teaching and it needs to be consistent and o ngoing for it to be effective. A good teacher needs to ensure they are supporting or scaffolding a child’s learning by questioning and pre-empting mistakes and checking understanding.Observations are a fundamental part of this process and key to ensuring measures of success (Hargreaves, 2002). The school and classroom environment, and the organisation of resources within it, can have a very significant impact on the quality of children and young people’s learning (DfES, 2001). This statement underpins how important the classroom environment is to pupils learning. The organisation of the classroom is significant and pupils need to be able to work in groups or pairs easily and see the teacher at all times. Cluttered classrooms can take pupils attention away from learning.Therefore the layout and organisation should suit these needs. The role play area is another significant part of a stimulating environment. In my experience creating an exciting role play area that links with pupils learning topic, engages pupils and provides a way for learning to take place through play. Pound suggests that â€Å"play encourages creativity and imagination† (2005:74). The organisation and the physical layout are not the only important factors of the classroom environment, even more significant in supporting the needs of learners are the opportunities and challenges offered by the teacher.Teachers need to build up good relationships and have high expectations of pupils in their learning and behaviour. (Arthur, Grainger and Wray 2006). The Primary National Strategy (DfES, 2005) clarifies what pupils need to learn effectively; according to Maslow’s hierarchy of needs it gives the understanding that children need security, comfort and need to feel confident and self worth. Pupils also need to be stimulated and challenged and given opportunities to use their diverse talents.From my own experiences in schools building up professional rapports with pupils and knowing your learners is crucial, as it allows teachers to meet pupil’s individual needs and en sures that children are confident, happy and engaged in their learning (Hutchin, 2006). I was impressed after observing teaching styles and attitudes used by teachers in schools. The relationship between the teacher and the pupils worked well and it was evident that pupils felt safe, secure and cared for. In order to develop into effective learners within the school context it is clear that young children need love and security† (Whitebread, 2003:6). This had a positive impact on the pupils as learners. In my previous teaching placement we had a pupil who had behaviour and personal difficulties, the teachers were able to support and meet his needs effectively by listening to him and using their teaching and management skills effectively. Emotions play an essential part in teaching and learning. We therefore need to make sure that early year’s settings are emotionally positive and supportive workplaces for all learners† (Pound, 2005:79). Behaviour management is another vital part of the positive learning environment. I struggled at first with my behaviour management skills and my authority was not respected. This was due to a lack of confidence in myself and my management skills. As I went through my placement journey I gained more confidence in my teaching, belief in myself to manage behaviour issues and developed my relationships with the pupils which enabled me to gain their trust and respect.From this I really noticed a positive difference in my behaviour management skills. Research shows that behaviour management is inextricably linked with a positive classroom environment as positive teacher efficiency is vital for effective management. Teachers need to feel, think, and behave more confidently allowing pupils to feel secure and therefore they are more likely to respond positively (Arthur, Grainger and Wray, 2006). It is fundamentally important for teachers to establish their uthority with a new class and also for teachers to understand that authority is earned within the context of relationships built by the teacher. Such relationships are dependent on the teacher conveying respect, enthusiasm and knowledge for what they teach and that authority is communicated through a relaxed confidence in management, teaching and self (Rogers, 2002). Behaviour management skills include using preventative behaviour management strategies effectively. These include establishing and practicing rules and routines.In my experience continuously practicing rules and routines is an effective behaviour preventive strategy. Pupils need to be clear about what is expected of them. Rules set limits to pupils behaviour and pupils have to understand what acceptable behaviour is and what is not. Arthur, Grainger and Wray state how important rules, routines and expectations are in behaviour management: Effective rules provide pupils with a physically and psychologically safe predictable environment and work in a preventative way to establish and keep order and maintain momentum through the lesson (2006:107).In my experience it is vital that pupils understand why they need to act a certain way and to gain maximum effects, the rules teachers give should be positively worded, realistic, focused and consistent. Setting aside time with pupils to raise whole-class awareness and inviting student participating into the understanding of rules, cooperation and behaviour will enhance positive working relationships and learning. Rogers supports this by suggesting â€Å"the process is as important as the outcome† (2002:29).The process of involving and including pupils will motivate them and help give them responsibilities and in turn promote behaviour management. I was able to wor k within a positive classroom environment where the pupils were encouraged and their achievements were fostered and celebrated. In my teaching I encouraged and praised the pupils for the work they had done, making sure they knew that I was proud of their work either by showing it to the rest of the class, putting their work up on display or giving them stickers or well done stones as positive reinforcement. Reinforcement and encouragement are very effective strategies I used and will continue to use in my teaching. â€Å"Students value encouragement and feedback. They benefit from the assurance that you have acknowledged their work; the effort and the direction of their work† (Rogers, 2002:86). It is crucial that pupils gain self worth and self esteem as they are strongly related to educational success and emotional wellbeing. As Whitebread suggests if pupils are to â€Å"thrive emotionally and intellectually, young children need to feel love and self-worth, they need to feel emotionally secure and they need to feel in control† (2003:6).Reinforcement and rewards are the main preventative strategies I used to ensure effective classroom management and behaviour. The reactive strategies I set in place were cautioning by informing pupils what would happen if the unwanted behaviour persisted. The pupils would have their name on the cloud if they had to be reminded more than three times and this was a big deal to the pupils in my class. When pupils worked hard or met learning or behaviour targets they were rewarded with praise, stickers, special privileges or having their name on the sunshine.These rewards worked well as preventative strategies to behavioural issues and also help reorientate those pupils who weren’t working or behaving well because they wanted to be praised and rewarded like their peers. This idea is supported by Skinner who believed that behaviour is shaped by punishment and rewards and that children try and avoid punishments and gain rewards, therefore an action or response is more likely to take place again if it is followed by positive reinforcement (Pritchard, 2009).These rewards and sanctions worked for the class in my previous placement, however every class and child is unique and it is vital for teachers to know his or her learners and thei r individual needs and preferences. Arthur, Grainger and Wray support this by saying â€Å"for rewards and sanctions to be effective they need to be fit for purpose- the reward must be something the pupils like and the sanction something they do not like† (2006:110). Therefore teachers need to know what their learners like and what they don’t like otherwise the rewards and sanctions may have counterproductive effect. In conclusion a positive classroom environment is fundamental for effective behaviour management and learning to take place, furthermore assessment for learning is a crucial part of effective understanding and teaching as Hutchin says â€Å"it is not the assessment itself which is important, but what we do with what we know† (2006:41). Teachers need to reflect on their teaching and assessment as Pollard suggests â€Å"reflecting on teaching provides a focus for analysing and developing learning and teaching† (2005:4). How to cite Assessment for Learning and Teaching, Essays

Saturday, December 7, 2019

Financial Business Ethics and Social Responsibility

Question: Discuss about the Financial Business Ethics and Social Responsibility. Answer: Introduction The indispensability of business ethics and social responsibility has grown in the recent past with many companies focusing on the development of the business image as social and environment friendly business. Especially in the alcohol industry social responsibility has given paramount importance since most of the consumers have become highly concerned about the environment and society and alcohol is still considered a taboo due to its ill effects on the environment as well as the human health. In business could be defined as the codes that distinguish right and wrong (Jenkins, 2009). It is important to mention that business ethics are extremely effective since it helps the business to go in the right direction. Even though it is very tough to define ethics since it is vast subject it could be said a company following ethical practice should be able to keep its stakeholders content with effective returns and good quality products and services and always working in the right path even during competition. Corporate Social Responsibility or CSR is an effective ethical framework which mainly means that an entity be it an organisation or an individual is obligated to work towards the good and welfare of the environment (Thorne et al., 2010). Social responsibilities of the companies help them top come closer to its consumers and gaining their trust and also helps them to contribute substantially to the welfare of the society as well as the environment (Du et al., 2010). Social responsibility of companies should reflect on its work and activities and should also highlight the good that happens due to the implementation of the CSR strategies (Turker, 2009). The New Belgium Brewing Company is one of the renowned names in the alcohol industry in Colorado which specializes in brewing the best quality ales just like Belgium. The company has become a very renowned name eventually after a rugged start from a small garage of Mr. Jeff Lebesch from where it kept on developing. Over the years the company has not only improved its economic performance but has also had a significant influence of its ethical practice on the consumers. The Corporate Social Responsibility practices done by the company has had a strong influence on the consumers in Colorado which has helped the company gain in size and stature across the place. The present study discusses the significant environmental issues that the company has taken up to resolve and also the different social concerns and constantly working on the strategies to ensure they are properly addressed. Even though the company has implemented effective strategies to work towards the different social problems and environmental issues, it being an alcohol company seriously questions the righteousness it shows (Lindgreen Swaen, 2010). As an alcohol brewery its movements for social responsibility could be seriously questioned given the nature of products it sales and hence it becomes extremely important to discuss the e fficacy of the strategies used by the company to get that tag of socially responsible company (Hartman et al., 2014). Hence the present study will take an opportunity to answer that long sticking dogma on the alcohol companies through their social responsibility actions and to analyse whether New Belgium Brewing Company could be given the status of socially responsible company considering the initiatives it takes towards the well being of the society and the environment (Kolk Van Tulder, 2010). Hence it could be stated that the present assignment will try to answer the key questions related to the concepts of business ethics and social responsibility taking NBB as the case study. Discussion on Ethics and Social Responsibility Environmental issues addressed by NBB and its movements towards sustainability New Belgium Brewing Company has always focused sustainability and has tried to work towards the sustainability of the company by ensuring that the company works towards the sustainability of the environment. The company understands that sustainability is an extremely important issue and hence in order to come closer to the consumers and gain their trust as a sustainable business it is important for the company to work towards environmental sustainability. There are number of environmental issues that the company endeavors to address and one of the most key issues that the company tries to address is to make the company environment friendly (Smith et al., 2010). The New Belgium Brewing Company is the chairman of the sustainability subcommittee and the company focuses on making the business eco friendly. In the recent past energy issues have become one of the key environmental issues and the company realises to handle this issue effectively and hence gives on using cost effective eco f riendly energy saving process to run its operation. The company unanimously takes decision on the issues of environment and the issue of energy is given paramount preference to deal with it efficiently (Turker, 20009). The company has taken a strong stance regarding the clean water concept an initiative by the Environmental Protection Agency. The company has showed support in the in the Clean Water Act which clearly shows its support towards a favorable and clean environment. The company takes serious interest in reducing waste and uses a splendid waste management procedure which has helps the company to contribute towards the well being of the environment (Ferrell Fraedrich, 2015). New Belgium Brewing Company has taken initiatives to reduce pollution especially air pollution and water pollution and has also taken initiatives regarding building greener environment. It is important to mention that the company has handled above issues very effectively by implementing a strategic approach towards these environmental issues. The company has developed effective water treatment and uses only 3.5 gallons of water to make 1 gallon of beer which no other company has been able to do, it is at least 20% less than what other companies will use. The company has invested in newer technology which helps to conserve energy and also cost which is an extremely important movement by the company. The company has installed photovoltaic cells and has also unanimously taken the decision of installing wind turbines to use the wind energy for the operation of the business. The company has installed equipments that use low power to brew ales which has made the business energy efficient ( Godos-Dez et al., 2011). The smart grid installation has made it possible. The use of sun tubes that uses low power illuminates the operational area throughout the day. It is essential to mention that the company has not only supported the EPA Clean Water Act but also has developed a strong water manage. It is essential to mention that the company has not only supported the EPA Clean Water Act but also has developed a strong waste water management system which helps the company to use its waste water in the operation purpose again. The extraction of methane from the waste water management helps the company to use it for around 15% of the brewerys power needs. In order to use the maximum of the materials NBB focuses on recycling almost all the solid waste products even the office materials and this helps the company to act as an example for the concept of Reduce, reuse, recycle (Ramasamy Yeung, 2009). With the time passing by the company has had few lessons in its journey which has helped the company to act efficiently in order to conserve energy and develop the make the product system cost effective. The environmental friendliness of the company has helped it to develop implement certain effective strategies which has served its purpose of being environmentally sustainable (Castaldo et al., 2009). From the use of waste water to the use of sun tubes and the application of wind energy has helped the company to develop a strong platform where it can conserve energy and make their operations cost effective. In the last few years the company has completely dependent upon using renewable sources of energy in the form of solar and wind energy which has helped the company to address then environmental issues taken up by the company. The company completely recycles its waste water to use the 99% of it in the production purpose that helps the company to be environmentally sustainable (Peloza Shang, 2011). The company has made significant movements to reduce carbon emission in the year of 2015. It has developed a sustainable supply chain where it has developed a purchasing guideline that helps the company to identify and address the loopholes in the supply chain for sustainable supply of materials. To continue its environment friendly operations and making sure that it can contribute to the well being of the environment the company conducts life cycle analysis which helps it to understand the shelf life of its packaging components and accordingly takes stance to address these issues (Maon et al., 2009). Overall it could be said that these key environmental issues which the company has taken up is addressed effectively with the help of different strategic approach mentioned above. It is true that the company has taken a stance towards effective and better environment and sustainability as it feels that it has some responsibilities towards the environment which has to be fulfilled. It co uld be said that it is not merely a movement to come closer to its consumer base as it has always tried to act in favor of the environment when it was in the phase of becoming a brand and hence it could be said that the company understands its obligations towards the environment and so NBB takes stance towards sustainability which also has a secondary focus on gaining the trust of the consumers that it has been able to manage with strategic approach to environmental sustainability. Social Responsibility and competitive advantage of the company New Belgium Brewing Company is one of the leading alcohol brewery in Colorado but it experience significant competition in the market which clearly points that the company would have to implement certain strategies which help the company to gain competitive advantage in the market. It is important to mention that the social movements of the company are critical in providing competitive advantage in the market. As stated in the earlier section that the company has been able to manage to work sustainably and also work towards safeguarding the environment effectively and this has clearly helped the company to gain competitive advantage in the market. It is important to mention that the company that the company has judiciously used water so far and has published their sustainability report that has helped the consumers to know the possible movements that the company makes to safeguard the environment as well as work on the social concerns have helped the company to gain trust and confide nce of the consumers. Over the last few years the company has developed its market base by gaining the competitive advantage in the market (Carroll Buccholtz, 2014). The company is a consistent employer and provides employment to a large number of people which makes it one of the significant players in the employment market in its area. The philanthropic involvement of the company has helped a lot of people to know about the company and its activities through its sustainability movements effectively. Event sponsorship and involvement in the charity programs have helped the company to let people know about its intentions to work towards the development of the environment and the well being of the society. The attempt of New Belgium Brewing Company towards the environment has been appreciated by people and this has created significant competitive advantage for the company in the market. The company has continued work towards the community by donating $1 for each barrel of beer sold t o the philanthropic needs of the community which has helped the company to give something back to the community which has been hugely appreciated (Zadek et al., 2013). In the local following the company has been able to get success due to its constant service towards the community for charity and for children that clearly differ the company from the other alcohol selling companies. The company states that success for them not only means economic development of the company but also social development which clearly indicates their gesture towards the community. Hence it could be said that the company has focused on consistently contributed to the social concerns which also make it an important performer from the social context. Overall it could be said that the company has built a strong moral support for itself in the market over the years with its effective sustainable responsibilities. So, it could be said that the company has been able to gain competitive advantage in the market t hrough its sustainable activities for the society (Fassin et al., 2011). Alcohol selling and socially responsible business There has been number of arguments about the beer making companies being not socially responsible due to their primary products. It apparently seems that alcohol companies have their primary products that affect the human health and this is where the biggest controversy lies. As far as the operations and movements of the New Belgium Brewing Company are concerned it could be said that the company has been able to act responsible towards the environment as well as towards the society which has to be said as sustainable. Its movements regarding saving energy, effective waste water management, effective handling of the social concerns like unemployment and addressing of charities and helping NGOs clearly indicate the company is not only focused on the economic development of the organisation but it also its social development by coming closer to the consumers through its sustainable operations. According to David Edgar the former director at the Brewing Association in Colorado the compan y has developed a very sustainable brand image among the consumers which clearly shows the effect of acting sustainably (Lindgreen et al., 2010). The company understands that its key assets are quality, responsibility and concern for the society. The company has continuously worked for the welfare of the environment for instance working on the green building project, through energy conservation system, using renewable energy sources for operation et cetera which clearly tells that the company is working only for the sake of profit and clearly feels strongly for the environment and the society which makes the company close to the society and loved by the consumers as well as the society. Given its continuous movements towards safeguarding the environment and working on the social concerns of the society has helped the company to gain the trust of the common people and hence it could be said that the activities of the company shows that it is more than a brewing company and feels for its stakeholders and the environment that establishes the organisation as a socially responsible corporation (Lin et al., 2009). Conclusion Ethics and social responsibility plays a vital role for every business nowadays and the case study of New Belgium Brewing Company has helped to understand that very easily. Over the years the company has been able to gain trust of the consumers through its signature and quality ale and effective sustainable actions which has helped the company to develop a strong position for them in the market (Cavanagh, 2012). This clearly indicates that NBB is not only concerned about its economic profit but also social profit which it has significantly managed by performing social responsibilities that has helped the company to become socially responsible corporation in the Alcohol industry. To conclude it could be said that the social responsibility actions performed by the company NBB has helped the company to reach the pinnacle of success. References Carroll, A.B. and Buchholtz, A.K., 2014.Business and society: Ethics, sustainability, and stakeholder management. Nelson Education. Carroll, A.B. and Shabana, K.M., 2010. The business case for corporate social responsibility: A review of concepts, research and practice.International journal of management reviews,12(1), pp.85-105. Castaldo, S., Perrini, F., Misani, N. and Tencati, A., 2009. The missing link between corporate social responsibility and consumer trust: The case of fair trade products.Journal of business ethics,84(1), pp.1-15. Cavanagh, G.F., 2012.American business values. Pearson Higher Ed. Du, S., Bhattacharya, C.B. and Sen, S., 2010. Maximizing business returns to corporate social responsibility (CSR): The role of CSR communication.International Journal of Management Reviews,12(1), pp.8-19. eon Rossouw, D. and Van Vuuren, L., 2010.Business ethics. Oxford University Press, 2010. Fassin, Y., Van Rossem, A. and Buelens, M., 2011. Small-business owner-managers perceptions of business ethics and CSR-related concepts.Journal of Business ethics,98(3), pp.425-453. Ferrell, O.C. and Fraedrich, J., 2015.Business ethics: Ethical decision making cases. Nelson Education. Godos-Dez, J.L., Fernndez-Gago, R. and Martnez-Campillo, A., 2011. How important are CEOs to CSR practices? An analysis of the mediating effect of the perceived role of ethics and social responsibility.Journal of Business Ethics,98(4), pp.531-548. Griseri, P. and Seppala, N., 2010. Business ethics and corporate social responsibility. Hartman, L.P., DesJardins, J.R. and MacDonald, C., 2014.Business ethics: Decision making for personal integrity and social responsibility. McGraw-Hill. Jenkins, H., 2009. A business opportunitymodel of corporate social responsibility for smallà ¢Ã¢â€š ¬Ã‚ and mediumà ¢Ã¢â€š ¬Ã‚ sized enterprises.Business ethics: A European review,18(1), pp.21-36. Kolk, A. and Van Tulder, R., 2010. International business, corporate social responsibility and sustainable development.International business review,19(2), pp.119-125. Lin, C.H., Yang, H.L. and Liou, D.Y., 2009. The impact of corporate social responsibility on financial performance: Evidence from business in Taiwan.Technology in Society,31(1), pp.56-63. Lindgreen, A. and Swaen, V., 2010. Corporate social responsibility.International Journal of Management Reviews,12(1), pp.1-7. Lindgreen, A., Swaen, V. and Johnston, W.J., 2009. Corporate social responsibility: An empirical investigation of US organizations.Journal of business ethics,85(2), pp.303-323. Maon, F., Lindgreen, A. and Swaen, V., 2009. Designing and implementing corporate social responsibility: An integrative framework grounded in theory and practice.Journal of Business Ethics,87(1), pp.71-89. Peloza, J. and Shang, J., 2011. How can corporate social responsibility activities create value for stakeholders? A systematic review.Journal of the academy of Marketing Science,39(1), pp.117-135. Ramasamy, B. and Yeung, M., 2009. Chinese consumers perception of corporate social responsibility (CSR).Journal of Business Ethics,88(1), pp.119-132. Smith, N.C., Palazzo, G. and Bhattacharya, C.B., 2010. Marketings consequences: Stakeholder marketing and supply chain corporate social responsibility issues.Business Ethics Quarterly,20(04), pp.617-641. Thorne, D.M., Ferrell, O.C. and Ferrell, L., 2010.Business and society: A strategic approach to social responsibility and ethics. South-Western Cengage Learning. Turker, D., 2009. How corporate social responsibility influences organizational commitment.Journal of Business Ethics,89(2), pp.189-204. Turker, D., 2009. Measuring corporate social responsibility: A scale development study.Journal of business ethics,85(4), pp.411-427. Zadek, S., Evans, R. and Pruzan, P., 2013.Building corporate accountability: Emerging practice in social and ethical accounting and auditing. Routledge.

Saturday, November 30, 2019

The Powers Above Essays - Greek Mythology, Mythology, Religion

The Powers Above The Powers Above Lana Fourdyce Classic Civilization 115: Section G The Powers Above The relationship between gods and mortals in mythology has long been a complicated topic. The gods can be generous and supportive, and also devastating and destructive to any group of humans. Mortals must respect the powers above them that cannot be controlled. The gods rule over destiny, nature, and justice, and need to be recognized and worshipped for the powerful beings as they are. Regardless of ones actions, intentions, and thoughts, the gods in Greek myth have ultimate power and the final decision of justice over nature, mortals, and even each other. Justice is a very important ruling power for both gods and mortals. For instance, in Sophocles tragedy, Antigone, justice prevails over king Creons actions. He sentences his own niece to death for giving her deceased brother, a pronounced enemy of Thebes, a proper burial. In return for his rigid ruling he loses his wife and son to tragic deaths. Creon puts his own citys justice before the determined justice of the gods, and pays dearly for it. Antigone also receives justice for her actions even though she dies. She did go against the law of her mortal king, but did obey the law of the gods, and therefore died a hero and martyr. The laws of the gods gives dishonor to those who do not properly respect their family members. In order to keep her honor and self-respect, Antigone had to break her citys law, even if it meant death. Justice can also be associated with the goddess of Earth, Justice. Antigone follows the laws of the gods that will live on forever, not Creons mere proclamations of power. Antigone will not let her sister die with her because Justice does not allow people to die heroes if the do not deserve it. Order is more important than justice to Creon, and it is one of the causes of his eventual downfall. Zeus and the other sky gods like order and law. Antigone looks to the gods and goddesses of the earth that live in the underworld, and will not take a mere mortal mans rules over the gods. She says the she does not fear any mortals words enough that she would pay the price the gods demand from those who break their laws (Antigone, 458). The gods do recognize courageous and just people, but these people do not always come to a happy end, as in Antigones case. Justice may not rule the gods as entirely as it rules mortals, because the gods ultimately decide what is just or unjust. Antigone also speaks of the power of Hades when she refers to her brothers. She tells Creon that Hades will apply equal laws to both, even though one is an enemy of Thebes. Antigone realizes that Thebes laws and enemies are not necessarily the laws and enemies of the gods. Creons regard for the laws of the city causes him to abandon all other beliefs. He feels that all should obey the laws set forth by him, even if other beliefs, moral, or religions, state otherwise. Antigone, on the other hand, holds the beliefs of the gods in high reverence. She feels that the laws of the gods should be obeyed above all others, especially when in respect to family. Her beliefs in The sacred laws that Heaven holds in honor are for more important than those set by the king (Antigone 78). The king cannot, and should not in the gods eyes, override her belief in the God. Mortals that hold state law over devine law in Greek myths always come to a dreadful doom, usually by being punished by the gods. The gods have power over the weather, which in turn rules over humans. Zeus, the king of all gods, rules over storms, thunder, and lightening. He and other gods can produce earthquakes, tornadoes, and other devastating natural disasters at any moment if they see fit. In Euripides The Bacchae, Zeus power creates a lightening bolt that burns down Semeles house and kills her. Zeus mere presence in the form of a god is enough to kill Semele. Most every god or goddess has power over

Tuesday, November 26, 2019

How to Create a Mad Scientist Costume

How to Create a Mad Scientist Costume A mad scientist costume is great for Halloween, inspiring images of how science can run amock, creating horrific monstrosities. Here are tips on how to create a great mad scientist costume: Hair ... or not The decision on what sort of hair to have is an important one. You can go with wild hair (such as Albert Einstein and Doc Brown from the Back to the Future movies) or bald, the Lex Luthor route. If going for wild hair, there are inexpensive wigs available in most costume shops. Alternately, you can create your own with a bald cap by gluing fabric hair (from local fabric or craft stores) onto it - perhaps different colored hair. Or, if your hair is long enough, you can use styling gel and unusual hair colorings to get the desired effect. A bald cap (especially nice for female mad scientists) will also do. To really complete the look, you may want to use some fake skin to cover up your eyebrows. This will create an effect that youve lost all your hair due to the bizarre potions youve tested on yourself. A middle approach between the two is to glue chunks of fabric hair onto the bald cap, so that it looks like your hair is falling out in chunks. Again, using hair with strange colors might be useful. Other Headgear Some sort of eyewear is generally a good idea. Find an old pair of glasses with bulky frames, perhaps from a thrift store, and pop out the lenses. You might want to decorate them by gluing or taping object to them, like bottlecaps, beads, etc. Tape (duct tape) or Band-Aids can be used to make the glasses look like theyve been broken and mended. Goggles are also a nice alternative. A goattee is a nice addition for a mad scientist. If you cant or dont want to grow your own, you can glue some fur into your chin. Try to frame it into a sharp point, perhaps using a bent paperclip or piece of cardboard as a frame to mount it on. Lab Coat The lab coat is, of course, the crucial element of the mad scientist costume. This is what translates the costume from random weirdo to mad scientist. Around Halloween, lab coats are pretty easy to find anywhere costumes are sold. You can also get actual lab coats at medical supply stores, thrift stores, and the like. If you have trouble finding one, you can contact your local hospital to find out where they are sold locally. Personally, the best lab coat Ive ever seen is the Mad Scientists Union Local #3.14. I didnt buy it online, so I cant attest to this vendor, but the lab coat is very cool. You can also decorate the labcoat with pins, stickers, stencils, decals, rips, scorch marks, food spills, equations, and the like ... whatever you feel comfortable with based on the cost of the lab coat. Pants - The Easy Part Generally, dark pants or a dark skirt will work to finish the outfit. A goofy pair of shoes, such as bowling shoes, would do well to complete the outfit. Final Accessories A pocket protector (try office supply stores) is a perfect addition to the costume. Fill it up with as many pens and pencils as you can. Throw in a compass, ruler, spiral notepad, and calculator if you can. Heck, carry around an abacus if you can find one. Another nice accessory would be a beaker filled with strange-colored liquid. Exotic colors of punch (i.e. Kool-Aid) can create this. Add some dry ice so smoke will drift off of it. Note: If you do have a potion with dry ice in it, do not drink. A flourescent stick, like what you get at the circus, can be inserted to make it glow ... and is great for stirring up your concoction. Some Last Comments The unbridled wackiness is the best part of the mad scientist costume. Be funny and nuts, and youll pull it off. Anything you can think of to add to the costumes eccentricity is a plus. Try to go as cheap as you can, since you may want to make a real mess of the costume to create the right mood. Old pants, tattered lab coats, funny shoes, out of style glasses ... thrift stores are the perfect place to get components for the mad scientist costume. Mad Scientist Sidekick Costumes Robot costumeBride of Frankenstein costumeCousin It costumeFrank-Einstein costumeGeeky Science Nerd costumeGhostbuster costume

Friday, November 22, 2019

Aristotle slavery

Aristotle believes that some people are by nature slaves. What Is his argument for that claim? Do you agree with Aristotle that a slave-holding society can be democratic? According to Aristotle, a slave is the property of its master, and that any piece of property can be regarded as a tool enabling a man to live. The slave, therefore, is a living tool of the master, whose purpose is to allow the master to live well. A slave belongs to a master, but a master doesnt belong to a slave. The rule of a master over a slave, then, is exercised with a view to the masters and the slaves goals or nterests. He represents slaves as a tool in his definition of slavery. Aristotle continues his definition of slave by explaining that those people who are slaves are naturally born as slaves and they are naturally the property of some one else. Those who are as different [from other men] as the soul from the body or man from beast and they are in this state if their work is the use of the body, and if this is the best that can come from them are slaves by nature. For he is a slave by nature who is capable of belonging to another which is also why he belongs to another nd who participates in reason only to the extent of perceiving it, but does not have it. Slaves are tools but they are alive and they belong to their masters. But when he widens his explanations about slavery, he states that all slavery instituted by human convention Is not compatible with Justice by saying the distinction between slave and free Is one of convention only, and In nature there Is no difference, so that this form of rule Is based on force and Is therefore not Just. Therefore, If someone Is not naturally born as a slave, it is unjust to refer him as a slave in his opinion. This critic of Aristotle means that if the slavery is built up my laws or is enforced by some particular communities; these are unjust because they are unnatural and they have no equivalency in nature. In his arguments, the people the laws treat as slaves and those they treat as free which coul d Justify the legal difference are indistinguishable. So, when Aristotle claims are scrutinized it is obvious to see that in some points Aristotle seems as accepting that some in fact, some legal methods which make people slaves are unjust. But he defends some dfferences between people and these differences make slavery Just. If legal slavery represents these Inherent differences It Is Just, but If It Is contrary to his then It Is totally unjust. Aristotle also states In Polltlcs that: the one strong for servile labor, the other upright, and although useless for such services, useful for political life in the arts both of war and peace. But the opposite often happensthat some have the souls and others have the bodies of freemen. And doubtless if men differed from one another in the mere forms of their bodies as uch as the statues of the Gods do from men, all would acknowledge that the inferior class should be slaves of the superior. It is clear, then, that some men are by nature free, and others slaves, and that for these latter slavery is both expedient and right. and this claim takes us to the point that distinguishing the differences among people. Also, there are some natural differences between people and these differences can Justify slavery or being someones living tool. Human beings are divided into groups according to different categorizations. The first partnerships among human eings would have been between persons who cannot exist without one another. There are two groups of people in this case; male and female for the sake of reproduction. and he continuous this discrimination by explaining the second partnership:the naturally ruling and ruled, on account of preservation. First, the ones who have less knowledge and who have more knowledge to manage with life. First group cannot properly exercise the practical virtues on their own and they have less chance to achieve the happiness. So, to treat someone as a living tool as Aristotle did, is not a complication to achieve the happiness. Furthermore, it is better to do so in order to give him the best possible use of that entity for the happiness. Where then there is such a difference as that between soul and body, or between men and animals, the lower sort are by nature slaves, and it is better for them as for all inferiors that they should be under the rule of a master. For he who can be, and therefore is, anothers and he who participates in rational principle enough to apprehend, but not to have, such a principle, is a slave by nature. By looking all these things Aristotle indicates about slavery, still it is not valid to defense the existence of slavery no matter what. Because in Aristotle arguments he defends that to be a natural slave is better for a slave, but to decide such an important in a human beings life is not possible, therefore not valid or ethic. Because it is unknown that if someone really unable to sustain his life and achieve the happiness especially for a short time of period. People may give their whole life to achieve the happiness and they can reach this aim maybe at the end of their lives, nd die as a happy human being without being treated as a slave by someone elses orders. Aristotle claims that natural slaves are people Whose condition is such that their function is the use of their bodies and nothing better can be expected of them. But by saying that he does not exactly mean not able to think or understand. Because if it was so that would be impossible for masters to expect all those things that slaves virtue is. But they are not the only one who are incapable to understand it, it is the majority of the society. Thus, if that would be an acceptable argument that, it would be necessary to agree that most people are incapable of true virtue and therefore they are all slaves which is impossible and completely absurd . Also another issue can be changed in a contrary way to what Aristotle claims. He distinguishes people as slaves and non-slaves, or the ruled ones and the rulers. But this grouping method can be collected in one group by using some techniques such as education. Even assuming that to be natural slave is natural and Just;it is quite logical to give a ualified education to group which includes the slaves and elevate them to the identical level as the rulers are. It is much beneficial to look for solutions rather than just categorizing people and treat them by some criteria without even questioning their rationality. Although the basic claims Aristotle makes, he is unable to explain not explain why some people are both weak and also have lack of knowledge and why some people are both strong and capable of knowledge. His arguments are also weak about why the children of natural slaves appears like natural rulers and how someone can ecome a slave even that not being captured in a war r how one can become a slave while he or she is the child of a natural master. When it is looked from different perspectives and from the society that we live in, all these reasons given above makes us to stand Just opposite to Aristotles thoughts and believing that it is unjust to enslave someone no matter what. Nobody is capable enough to decide whether someone has enough knowledge or not; or unable to sustain their lives and achieve the happiness, therefore it does not make any sense to try clarify the slavery is Just in todays conditions.

Wednesday, November 20, 2019

Problems and issue Essay Example | Topics and Well Written Essays - 500 words

Problems and issue - Essay Example As will be noted in the following analysis, the choice of sovereignty as the premier definition and explicate her of what a state truly is will be predicated upon the understanding of the fact that without a degree and level of sovereignty, no control or direction could be provided to either the population, territory, or government within such a system. In such a way, by defining sovereignty as the primary and fundamental compound of statehood, it is the hope of this author that the reader will gain a further understanding of why challenges to sovereignty account for the lion’s share of all conflict that takes place between states within the current world. In such a way, it is necessary for the reader to understand that sovereignty is the most important metric and defining the way in which the territory of state is appreciated and understood. Within such an understanding, one can realize that without a sovereign level of governance, it would be impossible to definitively demarcate borders and regions of control; due to the fact that without any control whatsoever (sovereignty) such a territorial understanding and definition would be meaningless. Similarly, with regards to the population, a level of sovereignty is absolutely required due to the fact that without this, no definitive goals or programs can be affected (Lewis, 2010). Finally, the issue of sovereignty is perhaps most specific with regards to the government of the state. Without an overall level of sovereignty over the territory and people to which the state intends to govern, the entire idea, definition, an understanding of statehood evaporates. Although it should not be understood that sovereignty in and of itself is the only determinant to statehood, it must be realized and appreciated that this determinant impacts strongly and primarily upon all of the

Tuesday, November 19, 2019

Effectiveness of Appreciative Inquiry Research Proposal

Effectiveness of Appreciative Inquiry - Research Proposal Example Introduction The main objective of this research is to explore the best and unexplored potential in the people and the existing system of the local Qatari transportation company and its surroundings in order to solve the underlying problems and obstacles in strategic operational areas. The changing systems within and outside the local Qatari transportation company are required to be studied in order to explore the underlying deficiencies in the area of operation of the transportation company through the process of unconditional and positive inquiry. The three important research questions that would be considered in the appreciative inquiry of the local Qatari transportation company are given: RQ1: How can Appreciative Inquiry prove to be effective? RQ2: What did Appreciative Inquiry hope to achieve? RQ 3: According to different stakeholders, were the anticipated goals achieved? The addressing of such areas of deficiency would help to fix the underlying problems in an efficient way th at was never thought before. Theoretical framework Appreciative Inquiry is a method of conducting an inquiry through the framing of a questionnaire and asking such questions to the stakeholders of the organization in order to search for the underlying problems and difficulties in the areas of operation, finance, human resource and associated areas. The objective of appreciative inquiry is to identify the areas of deficiency of the organization through unconditional positive statements and then analyzing the collected information through inquiry in order to determine the organizational deficiencies that are required to be solved. Appreciative inquiry studies the changing internal and external conditions involving the people, process and the communities and also explores the best potential of the organizational components that have never been explored and could be used to solve the organizational deficiencies. The art and practice of asking positive questions in an appreciative inquir y which is the subject of the research question enable the organization to anticipate the areas of concern and increase the positive potential in order to cope up with the problems. The identification of the areas of organizational concern and the exploration of the best potential of the resources in the changing systems of the organization helps to increase the operational efficiency (Tiem and  Rosenzweig, 2006, p.88). For example, in the local Qatari transportation company appreciative inquiry hopes to achieve performance efficiency by using the unexplored potential of the people and the process as well the external supporting systems for the organization. The appreciative inquiry lays the foundation for fulfillment of the anticipated goals for the shareholders. Appreciative inquiry brings about sudden changes in the process for improving operational efficiency that were never envisaged before the inquiry. Proposed methods The proposed method of conducting the research includes collection of data with the help of a designed questionnaire. In the paper qualitative research methodology has been selected mainly because it is less time consuming and less costly. The data required for quantitative analysis may be flawed and this will not lead to flawless conclusion. The questionnaire would contain unconditional positively framed questions which focus on the research perspective of appreciative inquiry. The data would be collected through self administered questionnaires with 50

Saturday, November 16, 2019

Abu Sayyaf Group Essay Example for Free

Abu Sayyaf Group Essay Abdurajak Janjalani’s religious and political thoughts provided the basis for ASG’s original ideology.23 The initial premise for creating the group was for a Muslim Mujahideen that would be committed to â€Å"a struggle in the cause of Allah† or â€Å"fighting and dying for the cause of Islam.†24 To his ASG followers Janjalani was more than a leader, he provided their ideological path and enlightenment. Janjalani was well educated and knowledgeable of various areas that impacted the Muslim population in the Philippines. These included the historical, religious, economic, political, and social conditions that existed at the time25 and it was his aim to build his idea of an Islamic state in the southern Philippines to improve those conditions.26 Funding to initiate and support the movement in the beginning was supposedly supplied by Mohammed Jamal Khalifa, Osama bin Laden’s brother-in-law.27 This was the first reported link to Al Qaeda. Later, in 1992, Janjalani and his group established an official headquarters in Isabela, Basilan naming the Camp Al-Madinah Mujahideen, but the camp was captured by the Philippine Marines in 1993 forcing ASG to relocate and establish a new base in Patikul, Sulu. This fostered greater cooperation and alliance with Ghalib Andang who led the Sulu-based unit of the ASG.28 Working together the combined ASG forces began an aggressive recruiting effort to expand their manpower, acquire arms and munitions, and began the lucrative series of fund-raising activities in kidnappings and demanding high ransoms.29 Before his death in 1998, Janjalani delivered eight radical ideological messages called Khutbahs. These Khutbahs are regarded as primary sources of his radical Islamic thought and depicted the depth of his Abu Sayyaf . . .5 understanding of Wahabi Islam. One of the Khutbahs exposed an intense resentment of Christian missionaries in Mindanao, especially those regarded as criticizing Islam. His interpretation was that â€Å"aggressive preaching of Christian missionaries in Mindanao thus insulted Islam and provoked Muslims to respond violently. As a result, the bombing of the Christian missionary ship M/V Doulos in 1991 was retaliation against Christian missionaries who used derogatory words against Islam and called Allah a false God.†

Thursday, November 14, 2019

The Themes of Wilderness and the White Man in William Faulkners The Be

The Themes of Wilderness and the White Man in William Faulkner's The Bear  Ã‚  Ã‚   William Faulkner's The Bear is bilateral in subject and plot. The first half of the story looks at the wilderness and the virtues man can learn from it. The second half applies these virtues to civilization, exposing the white man's corruption and misuse of the land. A careful look at the interaction of these two halves reveals a single unifying theme: man must learn virtue from nature. Faulkner believed humility, pride, courage, and liberty would be almost impossible for man to learn without the wilderness to teach him. The first half of the story tells a bittersweet tale of a boy who wished to learn humility and pride in order to become skillful and worthy in the woods but found himself becoming so skillful so fast that he feared he would never become worthy because he had not learned humility and pride though he had tried, until one day an old man who could not have defined either led him as though by the hand to where an old bear and a little mongrel dog showed him that, by possessing one thing other, he would possess them both. (283) The "old man" is Sam Fathers, "son of a Negro slave and an Indian king." While he "could not have defined either" pride or humility, he nevertheless understood them through his Indian and Negro heritage. The boy is Isaac, or Ike, McCaslin, the protagonist who learns virtue from the wilderness and repudiates his grandfather's corrupt inheritance. The above passage describes the high point of the first half of the story in which Ike saves his little dog from the crush of the towering bear. Ike is so close to the bear he can see "that there [is] a big wood tick just inside his off hind leg." This act gives h... ...ty once had pride and humility in the wilderness, but abandoned it along with the wilderness. Faulkner illustrates these differences with the story's two contrasting themes. Yet by melding the two parts into one and tying them inseparably together, he effectively communicates the duality of grief felt by the boy. Isaac loses the wilderness he so loved and respected, and in doing so, the heritage he otherwise might have. Works Cited Brooks, Cleanth. William Faulkner: Toward Yoknapatawpha and Beyond. New Haven: Yale University Press, 1978. Evans, David H. "Taking the Place of Nature: 'The Bear' and the Incarnation of America." Faulkner and the Natural World: Faulkner and Yoknapatawpha, 1996. Ed. Donald M. Kartiganer and Ann J. Abadie. Jackson: UP of Mississippi, 1999. Faulkner, William. â€Å"The Bear.† Uncollected Stories of William Faulkner. Vintage: 1997.

Monday, November 11, 2019

The Two Fishermen

1. For what newspaper does Michael Foster work for? (1-2) Michael Foster works for the town paper, the Examiner. He is a reporter. 2. Why did Michael not want to be seen with Smitty? (3-4) Michael didn’t want to be seen with Smitty because Smitty is a hangman. Every hangman is hated because people think that he is cruel and because he kills prisoners who are friends or parents with people in the town. If Michael is seen to be friend with Smitty, he would have a bad reputation and people of his town would hate him because he is supporting someone that all the others hated. It won’t only affect his life, but also his work, because no one will collaborate with him anymore and he could never become a reporter for city paper as he always wished. 3. Explain the final scene of the story? (5-6) The story finished with Smitty giving two big fish folded in a newspaper to Michael in front of everyone in the jail. But Michael let the other fisherman take the fish and through it at Smitty. First, the fish in this situation symbolize the friendship between Michael and the hangman and the newspaper represents the society, the people how hated, ridicule and criticize Smitty. When Smitty give Michael the newspaper folded fish, he is offering Michael to become his friend, and saying that Michael will need to deny other people’s judgments about him to become his friend, just like he needs to unwrap the newspaper to see the fish. The reporter, by accepting it, is accepting the friendship and the condition. Then, Michael let the other fisherman take his fish and through it at Smitty. By doing it, the young reporter is letting others to break the friendship between him and the hangman. He rejected the friendship and betrayed the hangman. In other words, he could unwrap the newspaper that folded the fish. After, when Smitty saw the fish, he could hardly believe it. Michael run off shamefully. Morley Callaghan, at the final scene, showed two conflicts. The first one is man versus society. This one is very evident. We can see clearly Smitty facing the whole society that criticizes, hates him. The second one is man versus himself. The man is Michael. He has to choose between Smitty and the rest of the society. He had the opportunity to explore the true personality of the hangman unlike other people and he knows that he is a really good guy. Even though he knows that there’s no reason Smitty should be hated, he still doesn’t want to be seen with him. We could see clearly his inner conflict when Morley wrote, â€Å" «it’s different now, it’s different,  » he kept thinking, as he held the fish in the newspaper tight under his arm. † Michael, at that moment, was questioning himself if he should help Smitty but risk his own reputation. At the end, â€Å"the expression on Smitty’s face as he saw the fish on the road made Michael hot with shame and he tried to get out of the crowd. † This shows that Michael is sorry for the hangman, but he couldn’t â€Å"get rid of the newspaper† The author, though the story showed us how a person can be betrayed even though he is a good friend and kind and moral person. 4. Explore the importance of the fish? (7-8) The fish in the short story â€Å"The Two Fishermen† is a very important symbol, a symbol of friendship. Smitty gives Michael a fish to show that he valued the time they spent together and that he was enjoying Michael and the company. It is a sign of their friendship. But Morley Callaghan, the author, added some detail to the simple fish. She gets it wrapped with newspaper. She gave the newspaper importance by repeating it various times, â€Å"[†¦] two good-sized salmon-bellied lake trout, folded in a newspaper†; â€Å"[†¦] he was carrying the fish, folded in the newspaper. † And â€Å"he held the fish in the newspaper. The use of newspaper means that Michael would be able to become real friend with Smitty only if he denies all the critics from other people and deny what the rest of the society thinks, like he would need to unwrap the fish from the newspaper to really see the fish. So, when Michael accepts the fish in front of everyone, he accepts the condition and the friendship, because if he doesn’t want to be friend, he could not take the fish and do like if he doesn’t know the hangman. Then, when he lets the other fisherman to through the fish at Smitty, he lets him at the same time break the friendship. Somehow, he betrayed Smitty and lets the newspaper to separate him and the fish forever. The fish is also a Christian symbol. It is a secret code used and only recognized by Christians to connect with each other without revealing themselves to the oppressors. This could also be linked to the Two Fishermen because their friendship is something secret. Their meeting is something secret too. Only they know why Smitty offers a fish instead of something else. In brief, the author used the fish as a very important symbol in this short story.

Saturday, November 9, 2019

Introduction of Information Security Systems Cis4385

1. Which if the following IPv6 address type is assigned to multiple interfaces but packets will only be delivered to one? a. Multicast b. Anycast c. Unicast d. Broadcast Grade:1 User Responses:b. Anycast Feedback:a. An anycast address is assigned to a group of interfaces on multiple nodes. Packets are delivered to the â€Å"first† interface only. 2. Routers operate at which OSI layer? a. Physical b. Transport c. Network d. Session Grade:1 User Responses:c. Network Feedback:a. Routers operate at the network layer making routing decisions based on IP addresses. 3. Which of the following is NOT a private IPv4 address? Choose all that apply. a. 192. 168. 5. 60 b. 172. 25. 6. 4 c. 10. 0. 6. 5 d. 26. 68. 6. 1 Grade:1 User Responses:d. 26. 68. 6. 1 Feedback:a. The private IP address ranges are as follows. IP Class Assigned Range Class A 10. 0. 0. 0-10. 255. 255. 255 Class B 172. 16. 0. 0-172. 31. 255. 255 Class C 192. 168. 0. 0-192. 168. 255. 2554. What is a server that evaluates Internet requests from LAN devices against a set called? a. Proxy b. Firewall c. Load balancer d. NAT server Grade:1 User Responses:a. Proxy Feedback:a. A server that evaluates Internet requests from LAN devices against a set of rules is called a proxy server. NAT servers perform private to public address translation; load balancers manage traffic between cluster hosts; and a firewall filters traffic based on access control lists.5. Which type of device maintains awareness of the status of connections, thereby preventing IP spoofing attacks? a. Stateless packet filterin g firewall b. Stateful packet filtering firewall c. NAT filter d. Application-level gateway Grade:1 User Responses:b. Stateful packet filtering firewall Feedback:a. A stateful packet filtering firewall is one that monitors the state of each connection by examining the header of each packet. Read this  Chapter 2 – Why Security is Needed A stateless packet filtering firewall does not do this. NAT filters perform only private-to-public address translation. An application-level gateway provides protection to a specific application such as FTP.6. Which of the following firewall services works at the session layer of the OSI model? a. Application layer gateway b. Stateful filtering c. NAT d. Circuit-level gateway Grade:0 User Responses:c. NAT Feedback:a. Circuit-level gateways work at the Session Layer of the OSI model and apply security mechanisms when a TCP or UDP connection is established; they act as a go between for the Transport and Application Layers in TCP/IP.After the connection has been made, packets can flow between the hosts without further checking. Circuit-level gateways hide information about the private network, but they do not filter individual packets.7. Which of the following are the two main functions of a proxy server? a. Caching of web pages b. NAT c. Domain authentication d. DHCP Grade:1 User Respo nses:a. Caching of web pages,c. Domain authentication Feedback:a. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time. b. A proxy server secures a network by keeping machines behind it anonymous; it does this through the use of NAT. It also improves web performance by caching web pages from servers on the Internet for a set amount of time.8. Which of the following devices can detect but not prevent attacks across the entire network? a. NIDS b. Host-based IDS c. NIPS d. Protocol Analyzer Grade:1 User Responses:a. NIDS Feedback:a. Network Intrusion Detection Systems (NIDS) detect but do not prevent attacks across the entire network. Host-based IDS can protect only the host on which it is installed. Network Intrusion Protection Systems (NIPS) can detect and prevent attacks across the entire network. A Protocol Analyzer ca n capture traffic but not act upon it.9. When a NIPs blocks legitimate traffic, what is it known as? a. False negative b. True negative c. False positive d. True positive Grade:1 User Responses:c. False positive Feedback:a. A blocking of traffic is a positive action, and when it is in response to legitimate traffic, it is considered a false action; thus it is a false positive. A false negative would be when an action is NOT taken on traffic that is not legitimate. The other two options are normal actions; a true negative is the allowing of legitimate traffic, whereas a true positive is the blocking of illegitimate traffic.10. Which of the following types of NIPS reacts to actions that deviate from a baseline? a. Signature-based b. Heuristic c. Anomaly-based d. Bit blocker Grade:1 User Responses:c. Anomaly-based Feedback:a. Anomaly-based NIPS recognizes traffic that is unusual and reports it. Signature-based NIPs are configured with the signatures of attacks. Heuristics looks for pat terns in the traffic, whereas bit blocker is a not a type of NIPs.11. Which of the following systems attempt to stop the leakage of confidential data, often concentrating on communications? a. DHCP b. DNS c. DLP d. STP Grade:1 User Responses:c. DLP Feedback:a. Data loss prevention (DLP) systems are designed to protect data by way of content inspection. They are meant to stop the leakage of confidential data, often concentrating on communications. As such, they are often also referred to as data leak prevention (DLP) devices, information leak prevention (ILP) devices, and extrusion prevention systems.Regardless, they are intended to be used to keep data from leaking past a computer system or network and into unwanted hands.12. When a company buys fire insurance they are ____________ risk. a. accepting b. avoiding c. transferring d. reducing Grade:1 User Responses:c. transferring Feedback:a. It is possible to transfer some risk to a third-party. An example of risk transference (also k nown as risk sharing) would be an organization that purchases insurance for a group of servers in a datacenter.The organization still takes on the risk of losing data in the case of server failure, theft, and disaster, but transfers the risk of losing the money those servers are worth in the case they are lost.13. Which of the following processes block external files that use JavaScript or images from loading into the browser? a. URL filtering b. Content filtering c. Malware inspection d. Blacklists Grade:1 User Responses:b. Content filtering Feedback:a. Content filtering is a process that blocks external files that use JavaScript or images from loading into the browser. URL filtering blocks pages based on the URL.Malware inspection looks for malware based on a signature file, and blacklists are items to be denied by spam filters.14. Which of the following actions should NOT be taken for the default account on a network device? a. Delete it. b. Change the password. c. Disable it. d. Leave it as is. Grade:1 User Responses:d. Leave it as is. Feedback:a. The default account has a well-known username and password, so it should be either deleted or disabled, or at a minimum its password should be changed.15. Firewall rules are typically based in all but which of the following? a. IP addresses b. MAC addresses c. Port numbers . Content type Grade:1 User Responses:d. Content type Feedback:a. Firewall rules are typically based on IP addresses, MAC addresses, or port numbers, but they cannot filter for content.16. Which of the following is the target of a double tagging attack? a. VPNs b. VLANs c. Collision domains d. DMZs Grade:1 User Responses:b. VLANs Feedback:a. A double tagging attack can enable the attacker to view traffic from multiple VLANs.17. A network created to allow access to resources from the Internet, while maintaining separation from the internal network is called a ______? a. VPN b. VLAN c. Honeypot d. DMZ Grade:1User Responses:d. DMZ Feedback:a. When talking about computer security, a Demilitarized Zone (DMZ) is a special area of the network (sometimes referred to as a subnetwork) that houses servers which host information accessed by clients or other networks on the Internet, but which does not allow access to the internal network.18. How can access to the remote management of a router be protected? a. Content filtering b. ACLs c. Firewalls d. IPS Grade:0 User Responses:c. Firewalls Feedback:a. Remote access to a router is usually done via Telnet or SSH. The port used (vty line) can be secured using an access control list. The other options can all be used to help protect routers but not access the remote management function.19. You need to allow access from your network to all web sites. What port numbers should be opened in the firewall? Choose all that apply. a. 25 b. 443 c. 80 d. 119 e. 22 f. 23 Grade:1 User Responses:c. 80 Feedback:a. HTTP and HTTPS are the two services you need to allow access to use ports 80 and 443 res pectively.20. Which of the following mitigation techniques can prevent MAC flooding? a. Secure VLANs b. Prevent ICMP responses c. 802. 1x d. 802. 1q Grade:1 User Responses:c. 802. 1x Feedback:a.MAC flooding, which involves overwhelming the memory of the switch with MAC frames sourced from different MAC addresses, can be prevented by requiring authentication on each port through 802. 1x. Secure VLANs cannot prevent this because the frames don’t need to enter a VLAN to cause the problem. ICMP is at Layer 3, these frames are at Layer 2, and 802. 1q is a VLAN tagging protocol that does not prevent frames from entering the switch through access ports.21. Which of the following attacks cannot be mitigated with a flood guard? a. Smurf attack b. Fraggle c. Teardrop attack d. Session theft Grade:1 User Responses:d.Session theft Feedback:a. The smurf, fraggle, and teardrop attacks all involve sending a flood of packets to a device, using different types of malformed packets. A session theft attack is when a session cookie is stolen and used to authenticate to a server.22. Loop protection is designed to address problems that occur with which device? a. Switch b. Hub c. Router d. Firewall Grade:0 User Responses:b. Hub Feedback:a. Loops occur when switches have redundant connections causing a loop. Loop guard (or loop protection) can prevent loops on the switch.23. When creating an ACL which of the following statements is NOT true? a.The order of the rules is important for proper functioning b. You must include a deny all statement at the end of the rule set for proper functioning c. The more specific rules should be placed at the beginning of the rule list d. Once created, the ACL must be applied to an interface Grade:1 User Responses:b. You must include a deny all statement at the end of the rule set for proper functioning Feedback:a. There is an implied deny all statement at the end of each ACL and it is not required to include one.24. Which of the following is a n example of insecure network bridging in a LAN? a. Laptop connected to a hotspot and an ad hoc network . Laptop connected to a wireless network and the wired LAN at the same time c. Router connected to two subnets d. PC connected with two NIC to the same LAN Grade:1 User Responses:b. Laptop connected to a wireless network and the wired LAN at the same time Feedback:a. When a laptop connects to a wireless network and the wired LAN at the same time, it can create a bridge between the two allowing access to the LAN. The other scenarios do not create a security problem for the LAN.25. When the administrator creates a rule on the firewall to prevent FTP traffic, this is a type of __________rule. . implicit deny b. implicit allow c. explicit deny d. explicit allow Grade:1 User Responses:c. explicit deny Feedback:a. When traffic is specified to be prevented, it is an explicit deny. When it is denied simply because it was not specifically allowed, that is an implicit deny.26. Network Acces s Control (NAC) is an example of_______________. a. role-based management b. rules-based management c. port-based access d. application layer filtering Grade:1 User Responses:b. rules-based management Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed.Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so on—effectively weeding out those who would perpetuate malicious attacks.27. What type of device is required for communication between VLANs? a. Hub b. Switch c. Router d. Firewall Grade:1 User Responses:c. Router Feedback:a. Hosts in different VLANs are also in different subnets and routing must be performed for them to communicate.28. Which of the following would be least likely to be placed in the DMZ? a. Web server b. DNS server c. Domain controller d. FTP serverGrade:1 User Responses:c. Domain controller Feedback:a. All th e options except a domain controller are often placed in the DMZ so they are accessible to the outside world. A DC however is sensitive and should NOT be placed in the DMZ.29. Subnetting a network creates segmentation at which layer of the OSI model? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4 Grade:1 User Responses:c. Layer 3 Feedback:a. Subnetting a network creates segmentation using IP addresses, which is Layer 3.30. What service is required to represent multiple private IP addresses with a single public IP address? a. NAT b. DHCP c. DNS d. DLP Grade:0User Responses:a. NAT Feedback:a. Network Address Translation (NAT) is required to represent multiple private IP addresses with a single public IP address. The specific form of NAT required to represent multiple private IP addresses with a single public IP address is called Port Address Translation (PAT).31. Which of the following is NOT a remote access protocol? a. MS-CHAP b. CHAP c. LDAP d. PAP Grade:1 User Responses:c. LDAP Feedb ack:a. Lightweight Directory Access Protocol is used for accessing directory services such as Active Directory. It is not used in remote access. All other options are remote access protocols.32. Which of the following devices are susceptible to war dialing? a. Modems b. Firewalls c. Content filters d. Load balancers Grade:0 User Responses:a. Modems Feedback:a. Any devices that accept phone calls such as modems or PBX systems with remote phone access are susceptible to war dialing.33. When computers are not allowed to connect to the network without proper security patches and virus updates, the network is using a form of _____________. a. PAT b. DAC c. NAC d. DMZ Grade:0 User Responses:d. DMZ Feedback:a. Network Access Control (NAC) uses rules by which connections to a network are governed.Computers attempting to connect to a network are denied access unless they comply with rules including levels of antivirus protection, system updates, and so on—effectively weeding out those who would perpetuate malicious attacks.34. Which of the following items do not need to be changed on a new router to ensure secure router management? a. IP address b. Administrator name c. Administrator password d. IOS version Grade:1 User Responses:d. IOS version Feedback:a. All the options except the IOS version can be set to defaults from the factory and should be changed because they are well known.35. Which of the following is NOT an example of cloud computing? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1 User Responses:d. BaaS Feedback:a. Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) are all forms of cloud computing.36. On which concept is cloud computing based? a. load balancing b. virtualization c. RAID d. DLP Grade:1 User Responses:b. virtualization Feedback:a. All forms of cloud computing use virtualization.37. A three legged perimeter is a form of ______________. a. VPN b. DMZ c. NAT d. ACL Grade:1 User Responses:b. DMZ Fee dback:a. A three-legged perimeter is a firewall or server with three NICs: one pointed to the LAN, one to the Internet, and one to the DMZ.38. Which of the following is NOT a benefit provided by subnetting? a. It increases security by compartmentalizing the network. b. It is a more efficient use of IP address space. c. It reduces broadcast traffic and collisions. d. It eases administration of the network. Grade:1 User Responses:d. It eases administration of the network. Feedback:a. Subnetting provides a number of benefits but easing administration is not one of them.39. Which of the following is the result of implementing VLANs? . Larger broadcast domains b. Smaller collision domains c. Smaller broadcast domains d. Larger collision domains Grade:1 User Responses:c. Smaller broadcast domains Feedback:a. VLANs break up the network into subnets and as such result in smaller broadcast domains.40. Which of the following services helps conserve public IP addresses? a. NAT b. DHCP c. DNS d . SLIP Grade:0 User Responses:c. DNS Feedback:a. By allowing the use of private IP addresses inside each network and by representing those groups of private IP addresses with a single public IP address, public IP addresses are conserved by NAT.41. Which of the following remote access protocols are used with VPNs? Choose all that apply. a. PPTP b. PPP c. L2TP d. SLIP Grade:1 User Responses:c. L2TP,d. SLIP Feedback:a. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up. /b. Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling protocol (L2TP) are used with VPNs. PPP and SLIP are used for dial-up.42. Which of the following security protocols operates at the network layer of the OSI model? a. IPSec b. SSH c. SSL d. TLS Grade:1 User Responses:a. IPSec Feedback:a.One of the key features of IPSec is its operation at the network layer enabling it to protect any type of communication operating at th e upper layers of the OSI model.43. Which of the following are components of SNMP? Choose all that apply. a. NMS b. IPSec c. Agent d. CARP Grade:1 User Responses:b. IPSec,c. Agent Feedback:a. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates. /b. The three components of SNMP are a network management system (NMS), agent software, and the managed device, where the agent software operates.44. SSL is designed as a secure replacement for which of the following? a. PPP b. Telnet c. TLS d. SSH Grade:0 User Responses:d. SSH Feedback:a. SSL is designed as a secure replacement for Telnet, which transmits in clear text.45. Which of the following protocols supersedes SSL? a. SSH b. TLS c. S/MIME d. EAP Grade:0 User Responses:a. SSH Feedback:a. TLS 1. 2, the latest version, is used when establishing an HTTPS connection and supersedes SSLv3.46. The operation of which of the following protocols makes the SY N flood attack possible? a. IPX/SPX b. AppleTalk c. TCP/IP d. RIP Grade:1 User Responses:c. TCP/IP Feedback:a.TCP/IP uses a three-way handshake for its connection, and the SYN flood attack attempts to take advantage of the operation of this connection operation.47. Which of the following provides secure web access? a. SFTP b. HTTP c. HTTPS d. SSH Grade:1 User Responses:c. HTTPS Feedback:a. HTTPS uses port 443 and is the standard for secure web access.48. SCP is a secure copy protocol that uses the port of which other protocol for transfers? a. HTTPS b. SSH c. SSL d. FTPS Grade:0 User Responses:d. FTPS Feedback:a. Secure copy (SCP) is another example of a protocol that uses another protocol (and its corresponding port). It uses SSH and ultimately uses port 22 to transfer data.49. Which of the following protocols is abused when a ping flood occurs? a. SNMP b. IGMP c. ICMP d. EIGRP Grade:0 User Responses:a. SNMP Feedback:a. Ping floods use ICMP echo request packets aimed at the target. 50. Which of the following security mechanisms are built into IPv6? a. IPSec b. SSL c. HTTPS d. EAP Grade:1 User Responses:a. IPSec Feedback:a. IPv6 has IPSec support built in.51. What method is used by SSL to obtain and validate certificates? a. SPI b. PKI c. TLS d. EAP Grade:1 User Responses:b. PKI Feedback:a.SSL and TLS use a public Key Infrastructure (PKI) to obtain and validate certificates.52. What port number does FTPS use to protect the transmission? a. 21 b. 88 c. 443 d. 445 Grade:0 User Responses:a. 21 Feedback:a. FTPS uses SSL or TLS over port 443 to make a secure connection.53. Which of the following protocols uses port 22, normally used by SSH, to make a secure connection? a. FTPS b. SCP c. SFTP d. SSL Grade:0 User Responses:b. SCP Feedback:a. Secure FTP (SFTP) uses port 22, the port for SSH, which is why it is also sometimes called SSH FTP.54. Which protocol uses ports 161 and 162? a. SMTP b. IMAP4 . SNMP d. IGMP Grade:0 User Responses:a. SMTP Feedback:a. SNMP is used to collect information about and make changes to devices on the network. It uses ports 161 and 162.55. Which protocol uses the same port as HTTPS? a. SCP b. FTPS c. SFTP d. IMAP4 Grade:0 User Responses:c. SFTP Feedback:a. FTP secure (FTPS) uses port 443, which is also used by HTTPS.56. Which protocol uses port 69? a. SCP b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:c. TFTP Feedback:a. TFTP uses port 69.57. What port number is used by Telnet? a. 80 b. 443 c. 21 d. 23 Grade:1 User Responses:d. 23 Feedback:a. Port 23 is used by Telnet.58. Which port does HTTP use? a. 80 b. 443 c. 21 d. 23 Grade:0 User Responses:b. 443 Feedback:a. HTTP uses port 80.59. Which port does SCP use to transfer data? a. 80 b. 22 c. 21 d. 23 Grade:0 User Responses:c. 21 Feedback:a. SCP uses SSH and thus port 22 to transfer data.60. Which protocol uses port 443? a. HTTPS b. FTPS c. TFTP d. IMAP4 Grade:1 User Responses:a. HTTPS Feedback:a. HTTPS uses port 443.61. Which two protocols use port 22? a. HTTPS b. FT PS c. SSH d. SCP Grade:2 User Responses:c. SSH,d. SCP Feedback:a. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port. b. SCP uses SSH and thus port 22 to transfer data, so both protocols use this port.62. Which ports does the NetBIOS protocol uses? Choose all that apply. a. 138 b. 139 c. 137 d. 140 Grade:3 User Responses:a. 138,b. 139,c. 137 Feedback:a. The NetBIOS protocol uses ports 137 through 139. /b. The NetBIOS protocol uses ports 137 through 139. /c. The NetBIOS protocol uses ports 137 through 139.63. What protocol uses port 53? a. HTTPS b. FTPS c. SSH d. DNS Grade:0 User Responses:b. FTPS Feedback:a. DNS uses port 53.64. Which port number does RDP use? a. 3389 b. 1723 c. 1701 d. 140 Grade:1 User Responses:a. 3389 Feedback:a. Port 3389 is used for Remote Desktop (RDP).65. What protocol uses port 25? a. HTTPS b. SMTP c. SSH d. DNS Grade:1 User Responses:b. SMTP Feedback:a. SMTP uses port 25.66. Which of the following statements is true regarding WP A and WPA2? (Choose all that apply. ) a. WPA uses 256-bit encryption. b. WPA2 uses 128-bit encryption. c. WPA uses TKIP. d. WPA2 uses AES. Grade:2 User Responses:c. WPA uses TKIP. ,d. WPA2 uses AES. Feedback:a. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES. /b. WPA uses TKIP 128-bit encryption, whereas WPA2 uses 256-bit AES.67. Which statement is NOT true with regard to WPA2? a. Uses AES encryption b. Meets requirements of 802. 11i c. Uses TKIP encryption d. Uses 256 bit encryption Grade:1 User Responses:c. Uses TKIP encryption Feedback:a. WPA uses TKIP but WPA2 uses AES.68. Which of the following is the security provided in the original 802. 11 standard? a. WPA b. WPA2 c. WEP d. CCMP Grade:1 User Responses:c. WEP Feedback:a. Wired Equivalent Privacy (WEP) is the security provided in the original 802. 11 standard.69. What is the authentication system that calls for a supplicant, authenticator, and authentication server called? . EAP b. WPA c. WPA2 d. WEP Grade:1 Us er Responses:a. EAP Feedback:a. Extensible Authentication Protocol (EAP) is an authentication system that calls for a supplicant, authenticator, and authentication server.70. Which of the following implementations of EAP requires certificates on the client and the server? a. EAP-FAST b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:d. EAP-TLS Feedback:a. EAP-TLS requires certificates on the client and the server.71. Which of the following versions of EAP is Cisco proprietary? a. LEAP b. EAP-TTLS c. PEAP d. EAP-TLS Grade:1 User Responses:a. LEAP Feedback:a. Lightweight EAP is a version that works only on Cisco devices unless the device is from a partner that participates in the Cisco Compatible Extensions program.72. Why are MAC filters not effective in preventing access to the WLAN? a. The MAC addresses of allowed devices are contained in the beacon frames sent by the AP. b. The MAC addresses of allowed devices are contained in any frames sent by the allowed device. c. The admi nistrative effort to maintain the MAC list is prohibitive. d. If the user changes his MAC address, the filter will disallow entry. Grade:1 User Responses:b.The MAC addresses of allowed devices are contained in any frames sent by the allowed device. Feedback:a. The MAC addresses of allowed devices are contained in any frames sent by the allowed device and can be seen by those using wireless protocol analyzers. The MAC address can then be spoofed for entry.73. Which of the following frame types contain the SSID? (Choose all that apply. ) a. Beacon frames b. Data frames c. Association frames d. Authentication frames Grade:3 User Responses:b. Data frames,c. Association frames,d. Authentication frames Feedback:a. The SSID is contained in all frames.If the SSID is hidden, it is removed only from the beacon frames. /b. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames. /c. The SSID is contained in all frames. If the SSID is hidden, it is removed only from the beacon frames.74. TKIP was designed to correct the shortcomings of which of the following? a. EAP b. WPA c. WEP d. WPA2 Grade:1 User Responses:c. WEP Feedback:a. TKIP was designed to correct the shortcomings of WEP. It was a temporary solution for use until the 802. 1x standard was completed.75. Which of the following encryption protocols is used with WPA2? . TKIP b. CCMP c. WEP d. DES Grade:1 User Responses:b. CCMP Feedback:a. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol used with WPA2. It addresses the vulnerabilities of TKIP and meets requirements of IEEE 802. 11i.76. Which antenna types would be best for shaping the signal away from the front of the building for security purposes while still providing coverage in the other part of the building? (Choose all that apply. ) a. Yagi b. Omni c. Parabolic dish d. Semidirectional Grade:2 User Responses:a. Yagi,d. Semidirectional Feedback:a.You can us e a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario. /b. You can use a yagi antenna, which is a type of semidirectional antenna, to shape the coverage area as called for in the scenario.77. How can you keep the existing radiation pattern of the antenna while reducing the coverage area? a. Increase the power of the transmitter. b. Decrease the power of the transmitter. c. Change the polarity of the antenna. d. Remove one of the attenuators from the line. Grade:1 User Responses:b. Decrease the power of the transmitter.Feedback:a. Reducing the power level maintains the radiation pattern while making the area of radiation smaller.78. What organization created WPA? a. FCC b. Wi-Fi Alliance c. IEEE d. ISO Grade:1 User Responses:b. Wi-Fi Alliance Feedback:a. The Wi-Fi Alliance created WPA to address the weaknesses of WEP.79. To which standard is WPA2 designed to adhere? a. 802. 16 b. 802. 11f c. 802. 11i d. 802. 11e Grade:1 User Responses:c. 802. 11i Feedback:a. WPA2 is designed to adhere to the 802. 11i security standard.80. Which of the following is the weakest form of security? a. TKIP b. WPA c. WEP d. EAP Grade:1User Responses:c. WEP Feedback:a. WEP is the weakest form of security. It has been cracked and is not suitable for Enterprise WLANs.81. A ______________ attack intercepts all data between a client and a server. a. DDoS b. Man-in-the-middle c. Replay d. Smurf Grade:1 User Responses:b. Man-in-the-middle Feedback:a. Man-in-the-middle is a type of active interception. If successful, all communications now go through the MITM attacking computer.82. When a group of compromised systems attack a single target it is a called a _______________ attack. a. DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1User Responses:a. DDoS Feedback:a. A distributed denial-of-service attack occurs when a group of compromised systems launches a DDoS attack on a single target.83. When valid data transmissions are maliciously or fraudulently repeated, it is called a _______________ attack. a. DDoS b. man-in-the middle c. replay d. smurf Grade:1 User Responses:c. replay Feedback:a. When valid data transmissions are maliciously or fraudulently repeated, it is a called a replay attack.84. What attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork? a.DDoS b. Man-in-the middle c. Replay d. Smurf Grade:1 User Responses:d. Smurf Feedback:a. A smurf attack sends large amounts of ICMP echoes, broadcasting the ICMP echo requests to every computer on its network or subnetwork. The ICMP request is sent to a broadcast address. When all hosts receive the ICMP broadcast request, these host send ICMP replies to the source address, which has been set to the address of the target.85. Changing your MAC address to that of another host is called ___________________. a. spear phishing b. spoofing c. pharming d. vishing Grade:1 User Responses:b . spoofing Feedback:a.Spoofing is when an attacker tails the IP or MAC address of another computer.86. Which of the following is more an aggravation than an attack? a. Spear phishing b. Spoofing c. Spam d. Vishing Grade:1 User Responses:c. Spam Feedback:a. Spam or unwanted email is more an aggravation than an attack.87. Which of the following uses instant messaging as its vehicle? a. Spim b. Spoofing c. Phishing d. Vishing Grade:1 User Responses:a. Spim Feedback:a. Spam Over Instant Messaging (SPIM) uses IM to deliver the spam.88. When VoIP phone calls are used in the pursuit of social engineering, it is called__________. a. spim b. poofing c. phishing d. vishing Grade:1 User Responses:d. vishing Feedback:a. Vishing is phishing performed with VoIP calls, which are harder to trace than regular calls.89. What type of attack is an advanced scan that tries to get around firewalls and look for open ports? a. DDoS b. Man-in-the-middle c. Xmas attack d. Smurf Grade:1 User Responses:c. Xmas attack Feedback:a. Usually using Nmap, the Xmas attack is an advanced scan that tries to get around firewalls and look for open ports.90. __________________ is when an attacker redirects one website’s traffic to another bogus and possibly malicious website. a.DDoS b. Pharming c. Xmas attack d. Smurf Grade:1 User Responses:b. Pharming Feedback:a. Host files and vulnerable DNS software can also be victims of pharming attacks. Pharming is when an attacker redirects one website’s traffic to another bogus and possibly malicious website. Pharming can be prevented by carefully monitoring DNS configurations and host files.91. ___________ is when a person that is not normally authorized to a server manages to get administrative permissions to resources. a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:1 User Responses:d. Privilege escalation Feedback:a.Privilege escalation is when a person that is not normally authorized to a server manages to get adminis trative permissions to resources.92. Which problem is the most difficult to contend with? a. Malicious insider threat b. Fraggle attack c. Distributed denial-of-service d. Whaling Grade:1 User Responses:a. Malicious insider threat Feedback:a. Because the attacker already is inside the network with company knowledge, a malicious insider threat is the most difficult to contend with.93. What type of attack can DNS poisoning lead to? a. Whaling b. Pharming c. Spear phishing d. Privilege escalation Grade:0User Responses:c. Spear phishing Feedback:a. Pharming attacks lead users from a legitimate website to a malicious twin. The easiest way to do this is to poison the DNS cache so that the DNS server sends them to the malicious site.94. Strong input validation can help prevent ____________________. a. bluesnarfing b. SQL injection c. session highjacking d. header manipulation Grade:0 User Responses:c. session highjacking Feedback:a. SQL injection attacks user input in web forms that is not correctly filtered. This can be prevented with input validations.95. LDAP injection is an attack on __________________servers. . SQL b. directory c. web d. email Grade:1 User Responses:b. directory Feedback:a. Lightweight Directory Access Protocol is a protocol used to maintain a directory of information such as user accounts or other types of objects.96. XML injection can be prevented with __________________. a. IDS b. IPS c. input validation d. complex passwords Grade:0 User Responses:d. complex passwords Feedback:a. The best way to protect against this (and all code injection techniques for that matter) is to incorporate strong input validation.97. The .. / attack is also known as ________________. a. irectory traversal b. SQL injection c. session highjacking d. header manipulation Grade:1 User Responses:a. directory traversal Feedback:a. Directory traversal, or the .. / (dot dot slash) attack is a method to access unauthorized parent (or worse, root) directories.98. ___________ __ is when commands and command syntax are entered into an application or OS. a. Directory traversal b. Command injection c. Command highjacking d. Code manipulation Grade:1 User Responses:b. Command injection Feedback:a. Command injection is when commands and command syntax are entered into an application or OS.99. Buffer overflows operate against the _________ of the computer. a. NIC b. disk c. CPU d. memory Grade:1 User Responses:d. memory Feedback:a. A buffer overflow is when a process stores data outside of the memory that the developer intended.100. What is the difference between an XSS and XSRF attack? a. The XSS attack exploits the trust a user’s browser has in a website, whereas the XSFR attack exploits the trust that a website has in a user’s browser. b. The XSFR attack exploits the trust a user’s browser has in a website, whereas the XSS attack exploits the trust that a website has in a user’s browser. . The XSS attack creates a buffer overflow on the website, whereas the XSFR attack creates a buffer overflow on the client. d. The XSS attack creates a buffer overflow on the client, whereas the XSFR attack creates a buffer overflow on the website. Grade:1 User Responses:a. The XSS attack exploits the trust a user’s browser has in a website, whereas the XSFR attack exploits the trust that a website has in a user’s browser. Feedback:a. The XSS attack exploits the trust a user’s browser has in a website. The converse of this: the XSRF attack exploits the trust that a website has in a user’s browser. In this attack (also known as a one-click attack), the user’s browser is compromised and transmits unauthorized commands to the website.101. _______________ are placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place. a. Landing spots b. Backdoors c. Hotspots d. Code heels Grade:1 User Responses:b. Backdoors Feedback:a. Backdoors a re placed by programmers, knowingly or inadvertently, to bypass normal authentication and other security mechanisms in place.102. An XSS attack is also called a(n) __________________ attack. a. Zero day b. Command injection . Xmas d. Cross site scripting Grade:1 User Responses:d. Cross site scripting Feedback:a. XSS attacks, also called cross site scripting attacks, exploit the trust a user’s browser has in a website through code injection, often in webforms.103. ______________can be used by spyware and can track people without their permission. a. MAC addresses b. Cookies c. IP addresses d. Attachments Grade:1 User Responses:b. Cookies Feedback:a. Cookies are text files placed on the client computer that store information about it, which could include your computer’s browsing habits and possibly user credentials.104. Which of the following attachments is the riskiest to open? a.. exe b.. pdf c.. doc d.. txt Grade:1 User Responses:a.. exe Feedback:a. A . exe or executa ble file is one that contains a program that will do something, perhaps malicious to the computer.105. Stolen cookies can be used to launch a(n) ____________________. a. XSS attack b. SQL injection c. session highjack d. header manipulation Grade:1 User Responses:c. session highjack Feedback:a. Session cookies authenticate you to a server and can be used to highjack your session.106. Header manipulation alters information in ______________ headers. a. LDAP b. file c. HTTP . SQL Grade:1 User Responses:c. HTTP Feedback:a. Header manipulation alters information in HTTP headers and falsifies access.107. An ActiveX control is an example of a(n) _________________. a. cookie b. add-on c. cipher d. virus Grade:1 User Responses:b. add-on Feedback:a. You can enable and disable add-on programs such as ActiveX controls in the Programs tab by clicking the Manage add-ons button in Internet Explorer.108. When an attack targets an operating system vulnerability that is still unknown to the world in general, it is called a __________. a. P2P attack b. zero day attack c. whaling attack d. DDoS attack Grade:1User Responses:b. zero day attack Feedback:a. A zero day attack targets an operating system vulnerability that is still unknown to the world in general.109. __________________is a concept that refers to the monitoring of data in use, data in motion, and data at rest. a. DLP b. DHCP c. DEP d. DMS Grade:1 User Responses:a. DLP Feedback:a. Data Loss Prevention (DLP) is a concept that refers to the monitoring of data in use, data in motion, and data at rest. It does this through content inspection and is designed to prevent unauthorized use of data as well as prevent the leakage of data outside the computer (or network) that it resides.110. Which form of DLP is typically installed in data centers or server rooms? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:c. Storage DLP Feedback:a. Storage DLP systems are typically installed in data centers or server rooms as software that inspect data at rest.111. Which of the following is an example of drive encryption? a. AppLocker b. BitLocker c. Windows defender d. Trusted Platform Module Grade:1 User Responses:b. BitLocker Feedback:a. To encrypt an entire hard disk, you need some kind of full disk encryption software.Several are currently available on the market; one developed by Microsoft is called BitLocker.112. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is ____________ than software encryption. a. more difficult to crack b. easier to use than software encryption c. faster than software encryption d. can be used to calculate data other than encryption keys Grade:1 User Responses:c. faster than software encryption Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors.This means that they are used for encryption during secure login/authentication processes, during digital signings of da ta, and for payment security systems. The beauty of hardware-based encryption devices such as HSM (and TPM) is that it is faster than software encryption.113. A _________________ is a chip residing on the motherboard that actually stores the encrypted keys. a. DLP b. DHCP c. DEP d. TPM Grade:1 User Responses:d. TPM Feedback:a. A Trusted Platform Module (TPM) chip is one residing on the motherboard that actually stores the encrypted keys.114. Which of the following is NOT required to encrypt the entire disk in Windows?Choose all that apply. a. TPM chip or USB key b. A hard drive with two volumes c. HSM Module d. Cryptoprocessor Grade:2 User Responses:c. HSM Module,d. Cryptoprocessor Feedback:a. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encrypting the entire disk in Windows. /b. Hardware security modules (HSMs) are physical devices that act as secure cryptoprocessors; however, they are NOT a part of encry pting the entire disk in Windows.115. Probably the most important security concern with cloud computing is _______________. . less secure connections b. loss of physical control of data c. weak authentication d. bug exploitation Grade:1 User Responses:b. loss of physical control of data Feedback:a. Probably the most important security control concern is the physical control of data that is lost when an organization makes use of cloud computing.116. Which of the following is NOT a solution to security issues surrounding cloud computing? a. Complex passwords b. Strong authentication methods c. Standardization of programming d. Multiple firewalls Grade:1 User Responses:d. Multiple firewalls Feedback:a. Solutions to these security issues include complex passwords, strong authentication methods, encryption, and standardization of programming.117. Which form of DLP is typically installed on individual computers? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 Us er Responses:a. Endpoint DLP Feedback:a. Endpoint DLP systems run on an individual computer and are usually software-based. They monitor data in use such as email communications and can control what information flows between various users.118. Where could you disable the use of removable media on a computer? a. Device manager . BIOS c. Control panel d. Programs and features Grade:1 User Responses:b. BIOS Feedback:a. BIOS settings can be used to reduce the risk of infiltration including disabling removable media including the floppy drives and eSATA and USB ports.119. What are two shortcomings of using BitLocker drive encryption? a. Weak encryption b. Expensive c. Performance suffers d. Shorter drive life Grade:2 User Responses:c. Performance suffers,d. Shorter drive life Feedback:a. A drive encrypted with BitLocker usually suffers in performance compared to a nonencrypted drive and could have a shorter shelf life as well. /b. A drive encrypted with BitLocker usually suffers in perfo rmance compared to a nonencrypted drive and could have a shorter shelf life as well.120. Which form of DLP is typically installed on the perimeter of the network? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solutions that are often installed on the perimeter of the network. They inspect data that is in motion.121. Software as a service (SaaS) is a type of _____________ computing. a. HSM b. cloud c. role-based d. TPM Grade:1 User Responses:b. cloudFeedback:a. Software as a Service (SaaS) is the most commonly used and recognized example of cloud computing. SaaS is when users access applications over the Internet that are provided by a third party.122. Which form of DLP inspects ONLY data in motion? a. Endpoint DLP b. Network DLP c. Storage DLP d. Comprehensive DLP Grade:1 User Responses:b. Network DLP Feedback:a. Network DLP systems can be software or hardware solut ions that are often installed on the perimeter of the network. They inspect data that is in motion.123. Which of the following is NOT an example of cloud services? a. SaaS b. IaaS c. PaaS d. BaaS Grade:1User Responses:d. BaaS Feedback:a. Examples of cloud services include Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).124. When an electronic control suffers an error, reports the error, and shuts down, it is called_____________. a. Failopen b. Failsafe c. Failclose d. Failshut Grade:1 User Responses:b. Failsafe Feedback:a. When the control fails and shuts down, it is a failsafe. When it fails and leaves a vulnerable system, it is a failopen.125. What should be the first thing you check when an intrusion has been detected? a. Firewall logs b. Server logs c. Workstation logs d.Security patches Grade:1 User Responses:a. Firewall logs Feedback:a. Logging is also important when it comes to a firewall. Firewall logs should be the first th ing you check when an intrusion has been detected. You should know how to access the logs and how to read them.126. Which log on a Windows server is where you could learn if Joe logged in today? a. Applications b. System c. Security d. DNS Grade:1 User Responses:c. Security Feedback:a. The security log contains entries about logins and access to resources both successful and unsuccessful.127. Which of the following is NOT an example of physical security? a. Mantraps b.Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:b. Security logs Feedback:a. Security logs track activities on the network which is logical not physical security.128. Which of the following is NOT a type of door lock? a. Cipher b. Keyed c. Cardkey d. Mantrap Grade:1 User Responses:d. Mantrap Feedback:a. A mantrap is a two door system designed to prevent tailgating.129. Which of the following is NOT an example of operating system hardening? a. Disabling unnecessary services b. Removing the N IC c. Protecting management interfaces d. Password protection Grade:1 User Responses:b. Removing the NIC Feedback:a.Hardening the system should not reduce its functionality, and removing the NIC would do that.130. Which of the following standards is often referred to as port-based security? a. 802. 1x b. 802. 11 c. 802. 11n d. 802. 1 Grade:1 User Responses:a. 802. 1x Feedback:a. 802. 1x enforces perimeter security by keeping the port of the station closed until authentication is complete.131. In which type of monitoring is network traffic analyzed for predetermined attack patterns? a. Signature-based monitoring b. Anomaly-based monitoring c. Behavior-based monitoring d. Reactive-based monitoring Grade:1 User Responses:a. Signature-based monitoringFeedback:a. Network traffic is analyzed for predetermined attack patterns. These attack patterns are known as signatures.132. A(n) __________________ uses baseline reporting and other analyses to discover vulnerabilities and weaknesses in s ystems. a. NAT b. SPA c. SLA d. PSK Grade:1 User Responses:b. SPA Feedback:a. The security posture can be defined as the risk level to which a system, or other technology element, is exposed. Security Posture Assessments (SPA) use baseline reporting and other analyses to discover vulnerabilities and weaknesses in systems.133. Which of the following indicate a problem currently occurring? . Trends b. Baselines c. Alarms d. Averts Grade:1 User Responses:c. Alarms Feedback:a. Although alerts indicate an issue that MAY need attention, alarms indicate a problem currently occurring.134. Which of the following are detection controls? (Choose all that apply. ) a. IDS b. IPS c. Video cameras d. Security guard Grade:2 User Responses:a. IDS,c. Video cameras Feedback:a. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it. /b. Detection controls, such as Intrusion Detection systems and video cameras record only activity; they do not prevent it.135. Which of the following is designed to prevent tailgating? a. Mantraps b. Security logs c. Video surveillance d. Hardware locks Grade:1 User Responses:a. Mantraps Feedback:a. Mantraps use double doors to prevent tailgating.136. Which of the following is a proximity reader? a. a security card that transmits the location of the holder b. a device that tracks how close an individual is c. a security card reader that can read the card from a distance d. a card reader that locks the door when the holder is a certain distance from the door Grade:1 User Responses:c. security card reader that can read the card from a distance Feedback:a. These cards use radio waves to transmit to the reader.137. By frequently updating systems and by employing other methods such as group policies and baselining, you _____________ the systems. a. brace b. harden c. virtualize d. hardline Grade:1 User Responses:b. harden Feedback:a. By frequently updating systems and by employing other metho ds such as group policies and baselining, you harden the system.138. Installing service packs is a part of the ___________ process. a. baselining b. hardening c. scaling . security templating Grade:1 User Responses:b. hardening Feedback:a. Hardening the OS is accomplished through the use of service packs, patch management, hotfixes, group policies, security templates, and configuration baselines.139. ______________ can be described as unauthorized WAPs that inadvertently enable access to secure networks. a. Rogue access points b. Evil twin c. War driver d. Phisher Grade:1 User Responses:a. Rogue access points Feedback:a. Rogue access points can be described as unauthorized wireless access points/routers that enable access to secure networks.They differ from an Evil twin in that an Evil twin is strategically placed for the purpose of accessing the network or performing a high jacking attack, whereas rogue access points generally may be placed by employees for their convenience.140. W hich wireless attacks include the introduction of radio interference? a. Rogue Access Point b. Evil twin c. War driver d. Bluesnarfing Grade:1 User Responses:b. Evil twin Feedback:a. The evil twin attack includes jamming the network to cause the stations to associate with the evil twin AP.141. When executing the Evil twin attack, what value must match on the Evil twin and the legitimate AP? . IP address b. SSID c. MAC address d. Admin password Grade:1 User Responses:b. SSID Feedback:a. The Evil twin attack includes jamming the network to cause the stations to associate with the Evil twin AP. The stations will not roam to the Evil twin unless the SSID is the same as the legitimate AP.142. ________________ is when a person attempts to access a wireless network, usually while driving in a vehicle. a. War chalking b. Radiophishing c. War driving d. Bluesnarfing Grade:1 User Responses:c. War driving Feedback:a. War driving is when a person attempts to access a wireless