Assignment 2Conducting A Z-Test

Assignment 2Conducting A Z-Test

Assignment 2Conducting A Z-Test

A film exposing the incarceration of people with severe mental illnesses is expected to alter students’ perceptions of those people, according to the study’s author. A convenience sample of 36 students are chosen at random, shown the fulm, and asked to fill out an attitude survey.

For these 36 pupils, the overall mean score on the questionnaire is 70. A comparable group of students who did not watch the video received a score of 75. There is a 12 point spread in the data. By employing a 5% significance level (alpha=.05) and the standard five-step procedure for testing hypotheses. Does screening the film affect how students feel about those who suffer from mental illness on a continual basis? Assignment 2Conducting A Z-Test

  1. When we say “apha =.05,” what exactly do we mean?
  2. What is your baseline assumption? An other explanation?
  3. How many possible negative outcomes are there for this hypothesis?
  4. What is the value of z at the crucial point?
  5. Okay, let’s say we got a z of -2.Is the null hypothesis rejected or not rejected? 5.
  6. Explain your findings in your own words.

Methods of evaluation

discussed the significance of an alpha value of.02

validated both the null and alternative hypotheses.

shown an understanding of whether their hypothesis is one- or two-tailed, and provided an appropriate justification.

written out, including a decision on whether to reject or accept the null hypothesis and a description of the results.

used proper spelling, grammar, and punctuation; shown ethical scholarship through fair depiction and citation of sources; demonstrated command of the English language.

There is a considerable amount of confusion in the industry regarding the differences between vulnerability scanning and penetration testing, as the two phrases are often used interchangeably. However, their meaning and implications are very different. A vulnerability assessment simply identifies and reports noted vulnerabilities, whereas a penetration test (Pen Test) attempts to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible.

Penetration testing typically includes network penetration testing and application security testing; it also includes controls and processes around the networks and applications and should occur from both outside the network trying to come in (external testing) and from inside the network. Assignment 2Conducting A Z-Test

Given this information, review the two links on how Kali Linux is often used in penetration testing, the tools it contains, and how it can assist a penetration tester to identify vulnerabilities in the network:

Once you have done that, answer the following questions as though you were an internal or external penetration test firm assisting a Saudi company in strengthening their systems, framework, and network.

How does the penetration test differ from other types      of security testing—such as a vulnerability assessment?

What is your process for performing the penetration      test?

Discuss the process and tools that would be used.

How will you protect the data during and after testing? Assignment 2Conducting A Z-Test

How will you ensure the availability of the systems and      services while the test is taking place?

These last two will be key. Unless you are performing the penetration test when their users are not active, it will be necessary to catalog how you will do this without disrupting business or destroying data. Assignment 2Conducting A Z-Test