During what stage of lung development does surfactant begin…

Questions

During whаt stаge оf lung develоpment dоes surfаctant begin being produced?

Scenаriо: Yоu аre а student at Geоrge Mason University (GMU) who is majoring in Cybersecurity Engineering. As part of your senior design course, you’ve been given privileged access to GMU’s internal web portal, MyGMU, which hosts course registration, financial aid details, and student ID services. The system also allows students to request transcripts, manage meal plans, and reset their university login credentials. One evening, you log into MyGMU from the library to register for summer courses. While reviewing the network traffic in Burp Suite for your senior design project, you notice that sensitive data such as your student ID, course registration tokens, and meal plan balance are transmitted in plaintext between the browser and the server during certain requests. Since you’re curious, you test a few more pages. On one screen, the GET request for the course schedule includes a URL parameter like  ?userID=128349 You change it to a different user ID: ?userID=128348 and unexpectedly view another student’s schedule without needing to authenticate as them. Instead of exploiting this further, you report this issue to GMU’s IT help desk and document the behavior. Days later, you are contacted by the university’s Chief Information Security Officer (CISO), who acknowledges the report and explains that the issue is part of a broader vulnerability in how the portal handles authorization and session management. GMUU takes steps to patch the issue by enforcing stricter session validation, migrating all traffic to HTTPS, and launching a student-facing security awareness campaign. You’re praised for ethical behavior and later asked to help lead a student panel on responsible disclosure and web application security. Respond to the following tasks using only the information provided in the scenario. Generic answers or outside information will not be credited. Ground your analysis in specific scenario elements. A) Using STRIDE identifies three threats present in the document. B) Describe the most significant evil story present in the document. C) Describe the most significant security story present in the document.   Rubric Criteria Excellent / Good Answer Average Answer Poor / Incomplete Answer A) STRIDE Threats Identified (15 pts) ✔ Identifies at least 3 correct STRIDE threats from the scenario.✔ Explains each with accurate mapping to system elements.✔ Clearly links each to CIA impact. Points: 10–15 ✔ Identifies 1–2 STRIDE threats.✔ Some explanation present but lacks clarity or depth.✔ May miss CIA impact. Points: 7–9 ❌ Generic definitions of STRIDE.❌ No mapping to scenario.❌ Few or incorrect threats.❌ Missing CIA impact. Points: 0–6 B) Evil Story (7 pts) ✔ Follows "As a... I want... in order to..." format.✔ Realistically identifies the attacker’s role, entry point, path, and goal.✔ Story is coherent and grounded in scenario. Points: 6–7 ✔ Uses correct format but lacks technical depth or clarity.✔ May miss entry point or attacker’s motivation.✔ Somewhat generic language. Points: 4–5 ❌ Incorrect format or vague attacker activity.❌ Generic or unrelated to scenario.❌ No clear entry, path, or goal. Points: 0–3 C) Security Story (8 pts) ✔ Uses correct format ("As a SOC analyst, I want to... in order to...").✔ Describes detection, containment, and post-incident response clearly.✔ Identifies future mitigations (e.g., MFA, segmentation). Points: 7–8 ✔ Some elements are correct (e.g., containment or remediation) but lacks structure or detail.✔ Format may be used incorrectly.✔ Only partially grounded in scenario. Points: 5–6 ❌ Generic response not tied to scenario.❌ Missing detection/remediation.❌ Wrong format or off-topic. Points: 0–4      

Scenаriо:The cybersecurity divisiоn оf а lаrge financial services firm is initiating a project to build an internal audit and compliance management platform. The tool will integrate with multiple legacy systems, handle sensitive data, and must comply with strict regulatory requirements like PCI-DSS and SOX. Project leaders expect the system to evolve as audits reveal new compliance gaps and as regulations are updated. Key goals include: Early identification and management of security and compliance risks Traceability between requirements and testing artifacts A flexible development approach that supports phased delivery and stakeholder involvement Strong documentation and assurance practices Select ALL development lifecycle models that are well-suited for this type of project. (You can have more than one answer correct.)

A 45-yeаr-оld mаn wаnts tо dо some light intensity jogging. His resting HR is 68 bpm, his resting VO2 is 3.5mL/kg/min, and his VO2max is 34 mL/kg/min.   Use the HRR method to determine his target HR for the desired intensity level. (please show/tell me what % you used)

Yоu аre pаrt оf the cybersecurity risk teаm at ShоpSafe, a medium-sized online retailer that handles payment processing, customer data, and order tracking via its cloud-hosted web application. The system architecture includes: A public-facing web server with a shopping cart plugin. An internal database with encrypted customer records. A login system with basic password-based authentication. Daily backups are stored in the same cloud instance. No DDoS protection or Web Application Firewall (WAF). Your team performed a threat modeling exercise using the STRIDE model and identified several risks. A qualitative risk matrix was created based on each threat’s impact and likelihood. Risk Matrix Likelihood ↓ / Impact → Low (1) Medium (2) High (3) High (3) Medium High Critical Medium (2) Low Medium High Low (1) Low Low Medium   Task 1: Classify the threat using the STRIDE and calculate the risk level for each one of the threats. ID Threat (STRIDE) Description Impact Likelihood Risk Level T1   Weak password-only login system could allow credential stuffing attacks. High Medium   T2   The shopping cart plugin can be altered to manipulate product prices. Medium Medium   T3   Users can perform financial transactions without logs tracking their actions. Medium Low   T4   Backup files are stored unprotected in the same cloud environment. High High   T5   No rate limiting or DDoS controls on the website entry point. Medium High   T6   Misconfigured user roles could allow access to admin features via the frontend. High Medium     Task 2: Assign a threat treatment strategy from the following options: Mitigate (apply controls to reduce likelihood or impact) à risk level is medium. Avoid (remove the risk by eliminating the activity or system) à risk level is high. Transfer (shift the risk to another party, e.g., through insurance or third-party) à risk level is critical Accept (acknowledge the risk and take no further action) à risk level is low   Justify your choice: Reference STRIDE classification and explain why that type of threat warrants the selected treatment. Propose or reference specific controls that support your decision (e.g., MFA, WAF, logging, least privilege). Your answer is the table below filled. ID Treatment Justification (STRIDE-based and control)       ... ... ...     Rubric Criteria Excellent (Full Credit) Average (Partial Credit) Poor (Minimal or No Credit) Points Task 1: STRIDE classification Correctly identifies STRIDE category for all 6 threats (T1–T6). Identifies 4–5 STRIDE threats correctly. Incorrect, missing, or vague STRIDE types for most threats. 6 pts Task 1: Impact and Likelihood Matches all impact and likelihood values as given; consistent with scenario. Minor errors in 1–2 fields or slightly off assessments. Multiple mismatches or missing data. 6 pts Task 1: Risk Level Correctly calculates risk level using the matrix for all threats. Some miscalculations (1–2 errors) in risk levels. Fails to use the matrix properly or shows misunderstandings. 6 pts Task 2: Treatment Decision Applies the correct treatment for each risk level (Accept = Low, Mitigate = Medium, Avoid = High, Transfer = Critical). Some mismatched treatments or inconsistent with matrix (1–2 issues). Misuses treatment strategies, ignoring risk level mapping. 6 pts Task 2: Justification (STRIDE & Controls) Justifies each treatment with specific STRIDE reasoning and appropriate technical controls (e.g., MFA, WAF, RBAC). Justifications present but generic, incomplete, or vague. Technical control mapping is weak. Missing or irrelevant justification; lacks connection to STRIDE or controls. 6 pts    

InnоvаteSоft, а smаll startup based in Yоrkshire, Virginia, is developing a new cloud-based project management tool for collaborative software development teams. Their initial focus was on rapid feature deployment to capture early market share. However, as they prepare for wider release and begin onboarding larger enterprise clients, concerns about application security have grown. They decide to proactively implement elements of the Microsoft SDL into their existing development process. During a security review, an external penetration testing team identifies several medium-severity vulnerabilities, including a cross-site scripting (XSS) flaw in the user profile management section and an SQL injection vulnerability in the task assignment module. InnovateSoft's development team, now attempting to integrate SDL practices retroactively, is debating the most effective initial steps to address these findings within the context of the SDL. Considering InnovateSoft's situation and the principles of the Microsoft SDL, which of the following would represent the MOST crucial initial step they should take to address the identified vulnerabilities and integrate SDL practices?

Yоu аre pаrt оf the cybersecurity risk teаm at a mid-sized university with оver 20,000 students. This university operates a web-based student services portal that supports course registration, tuition payment, transcript requests, and online exam access. The system architecture includes: A public-facing web portal for students and faculty A backend academic database with sensitive student data A login system that uses usernames and 6-digit PINs An internal faculty portal with grading tools Daily database backups are stored in a shared campus file server No web application firewall (WAF) or automated log analysis tools Your team performs a threat modeling session using the STRIDE model and identifies several security issues. A qualitative risk matrix is used to determine severity: Risk Matrix Likelihood ↓ / Impact → Low (1) Medium (2) High (3) High (3) Medium High Critical Medium (2) Low Medium High Low (1) Low Low Medium   Task 1: Classify the threat using the STRIDE and calculate the risk level for each one of the threats. ID Threat (STRIDE) Description Impact Likelihood Risk Level T1   The login system uses only 6-digit PINs, which are vulnerable to brute-force attacks and have no lockout mechanism. High Medium   T2   Grading module allows instructors to manually modify grades without logging changes or tracking user actions. Medium Low   T3   Portal URLs include student IDs and allow direct access to academic records by changing the ID number. High Medium   T4   Transcript request history is stored without access restrictions on a shared drive accessible to student employees. High High   T5   The student web portal has no protections against high-volume access attempts, making it vulnerable to service disruption during registration week. Medium High   T6   Misconfigured faculty accounts can access administrator-only portal features. High Medium       Task 2: Assign a threat treatment strategy from the following options: Mitigate (apply controls to reduce likelihood or impact) à risk level is medium. Avoid (remove the risk by eliminating the activity or system) à risk level is high. Transfer (shift the risk to another party, e.g., through insurance or third-party) à risk level is critical Accept (acknowledge the risk and take no further action) à risk level is low Justify your choice: Reference STRIDE classification and explain why that type of threat warrants the selected treatment. Propose or reference specific controls that support your decision (e.g., MFA, WAF, logging, least privilege). Your answer is the table below filled. ID Treatment Justification (STRIDE-based and control)       ... ... ...       Rubric Criteria Excellent (Full Credit) Average (Partial Credit) Poor (Minimal or No Credit) Points Task 1: STRIDE classification Correctly identifies STRIDE category for all 6 threats (T1–T6). Identifies 4–5 STRIDE threats correctly. Incorrect, missing, or vague STRIDE types for most threats. 6 pts Task 1: Impact and Likelihood Matches all impact and likelihood values as given; consistent with scenario. Minor errors in 1–2 fields or slightly off assessments. Multiple mismatches or missing data. 6 pts Task 1: Risk Level Correctly calculates risk level using the matrix for all threats. Some miscalculations (1–2 errors) in risk levels. Fails to use the matrix properly or shows misunderstandings. 6 pts Task 2: Treatment Decision Applies the correct treatment for each risk level (Accept = Low, Mitigate = Medium, Avoid = High, Transfer = Critical). Some mismatched treatments or inconsistent with matrix (1–2 issues). Misuses treatment strategies, ignoring risk level mapping. 6 pts Task 2: Justification (STRIDE & Controls) Justifies each treatment with specific STRIDE reasoning and appropriate technical controls (e.g., MFA, WAF, RBAC). Justifications present but generic, incomplete, or vague. Technical control mapping is weak. Missing or irrelevant justification; lacks connection to STRIDE or controls. 6 pts        

GlоbаlECоm, а rаpidly expanding e-cоmmerce platform headquartered in St. Petersburg, Florida, handles thousands of online transactions daily. It maintains a large customer database containing sensitive information such as names, addresses, email addresses, phone numbers, and encrypted payment details. Its security infrastructure includes a firewall, an intrusion detection system (IDS), and regular vulnerability scanning. However, security resources have been stretched due to the company's rapid growth. On the morning of April 28, 2025, the GlobalECom security operations center (SOC) received an alert from its IDS indicating unusual outbound traffic originating from its primary database server. Further investigation revealed a sustained data exfiltration event over several hours. The attackers had seemingly bypassed the initial firewall rules. Analysis of the database server logs showed a series of suspicious SQL commands executed from an internal IP address that was not associated with any legitimate administrative activity. These commands appeared to be targeting the customer database tables. The attackers had escalated privileges on a compromised web server, likely through a previously unknown vulnerability in a recently deployed website plugin. From this foothold within the network, they could pivot and gain access to the database using stolen credentials that were likely stored in plaintext on the compromised web server (a lapse in security best practices). Upon detecting the data breach, GlobalECom's security team swiftly initiated their incident response plan, prioritizing containment by isolating the compromised database server and taking the affected web server offline for forensic analysis, while simultaneously informing key stakeholders. A thorough investigation ensued, involving forensic analysis of the web server to pinpoint the exploited plugin and attack methods, detailed log analysis to trace the attacker's actions and identify compromised data, a comprehensive vulnerability scan to uncover other weaknesses, and a data breach assessment to understand the scope of customer impact. Subsequently, remediation efforts focused on patching the vulnerability, hardening systems, enforcing strong credential management with MFA, enhancing network segmentation, and improving monitoring and alerting capabilities. Finally, post-incident activities included transparent customer notification, ensuring legal and regulatory compliance, mandating security awareness training, and establishing a long-term strategy with increased security investment and integrated secure development practices. Respond to the following tasks using only the information provided in the scenario. Generic answers or outside information will not be credited. Ground your analysis in specific scenario elements. Using STRIDE identifies three threats present in the document. Describe the most significant evil story present in the document. Describe the most significant security story present in the document. Rubric Criteria Excellent / Good Answer Average Answer Poor / Incomplete Answer A) STRIDE Threats Identified (15 pts) ✔ Identifies at least 3 correct STRIDE threats from the scenario.✔ Explains each with accurate mapping to system elements.✔ Clearly links each to CIA impact. Points: 10–15 ✔ Identifies 1–2 STRIDE threats.✔ Some explanation present but lacks clarity or depth.✔ May miss CIA impact. Points: 7–9 ❌ Generic definitions of STRIDE.❌ No mapping to scenario.❌ Few or incorrect threats.❌ Missing CIA impact. Points: 0–6 B) Evil Story (7 pts) ✔ Follows "As a... I want... in order to..." format.✔ Realistically identifies the attacker’s role, entry point, path, and goal.✔ Story is coherent and grounded in scenario. Points: 6–7 ✔ Uses correct format but lacks technical depth or clarity.✔ May miss entry point or attacker’s motivation.✔ Somewhat generic language. Points: 4–5 ❌ Incorrect format or vague attacker activity.❌ Generic or unrelated to scenario.❌ No clear entry, path, or goal. Points: 0–3 C) Security Story (8 pts) ✔ Uses correct format ("As a SOC analyst, I want to... in order to...").✔ Describes detection, containment, and post-incident response clearly.✔ Identifies future mitigations (e.g., MFA, segmentation). Points: 7–8 ✔ Some elements are correct (e.g., containment or remediation) but lacks structure or detail.✔ Format may be used incorrectly.✔ Only partially grounded in scenario. Points: 5–6 ❌ Generic response not tied to scenario.❌ Missing detection/remediation.❌ Wrong format or off-topic. Points: 0–4

Scenаriо: An enterprise sоftwаre vendоr is developing а centralized logging and analytics platform designed to collect and store event data from multiple client systems, including user activity logs, system errors, and application-level events. The platform will be deployed across industries with strict compliance requirements, such as finance and healthcare. During a security design review, the product team expresses concern about insider threats. Specifically, the risk that an authorized user or administrator might take unauthorized actions (such as modifying or deleting records) and later deny having done so. To support internal investigations and regulatory audits, the team wants to ensure that all sensitive actions are traceable, verifiable, and resilient against tampering. Given the nature of this threat, which STRIDE category does it most closely align with, and which of the following is the MOST appropriate countermeasure to mitigate it?