Online discussion questions – Apr 1
- How would you explain the difference between a distributed denial of service (DDoS) attack and an intrusion to a non-IT boss or colleagues?
- If an intrusion was indeed occurred and it was the intruder who changed the database index file, why would he/she have done it?
- What would have happened if Mr. Barton “pulled the plug” at the request of Mr. Wells?
- How would you explain “set up parallel systems built from development files, then switch over the those” to your non-IT boss?
Leave a Reply
You must be logged in to post a comment.
10 Responses to Online discussion questions – Apr 1