Practice Exercises
1
.
Your supervisor has asked you to lead a team to adopt a Technical Reference Model (TRM) framework for your organization’s computing system. What must you and your team consider to determine the best TRM for your organization?
2
.
As you and your team adopt a TRM framework, you are considering OMA and SOA. Explain the difference between the two architectures.
3
.
The Open Web Application Security Project (OWASP) identified the top ten risks for cybersecurity. Select any three of these risks and explain how you will address these concerns in your organization’s information security policy.
4
.
Explain why the walled garden approach goes against the principles of the OWP.
5
.
How can backhaul help with poor network bandwidth issues?
6
.
As your organization’s cybersecurity chief, you must assess your organization’s cyber risks. To do this, what questions will you ask?
7
.
As a cybersecurity expert, you have been asked to handle penetration testing for your organization’s software cybersecurity solutions. Explain the steps you will follow in this process.
8
.
Your organization’s cloud network has become vulnerable to phishing attacks. What does this mean, and how will you address it?
9
.
After your organization began operating in the metaverse, they were warned about cyber-attacks from botnets. What are botnets, and how do you deal with them?
10
.
While AI poses additional cyberthreats, it can also be a tool to promote cybersecurity. How?
11
.
Create a list of questions you could ask during an interview with a company to ensure that it follows the principles of responsible computing.
12
.
What are some of the things that you should consider when applying responsible computing to smart ecosystems solutions?
13
.
You share files in the cloud with colleagues in multiple countries. As you do this, which of the pillars of responsible computing are you most concerned about and why?