Answer:
B. volunteer bias.
Explanation:
-Experimenter bias is when the expectations of the experimenter in regards to the outcome are communicated to the participants in any form.
-Volunteer bias refers to a situation in which the people that volunteer to take place in a study doesn't represent the general public.
-Research bias is when the experimenter influence the result to get a specific outcome.
-Social desirability bias is when the people taking part in a study give their responses in a way that is viewed as favorable.
According to this, the answer is that the situation would be an example of volunteer bias.
Answer:
TIGER TEAM
Explanation:
Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.
There are different types of penetration testing teams which are: red team, blue team and purple team.
Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.
In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.
Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.
A. fuel ; when you but a car you aren't buying the gas to go in it
Answer:
Yes Juan has done enough to secure the network
Explanation:
All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.
The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network
The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.