100% satisfaction guarantee Immediately available after payment Read online or as PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

AP COMPUTER SCIENCE PRINCIPLES MIDTERM EXAM WITH VERIFIED ANSWERS

Rating
-
Sold
-
Pages
29
Grade
A+
Uploaded on
02-11-2024
Written in
2024/2025

AP COMPUTER SCIENCE PRINCIPLES MIDTERM EXAM WITH VERIFIED ANSWERS

Institution
AP COMPUTER SCIENCE PRINCIPLES
Course
AP COMPUTER SCIENCE PRINCIPLES

Content preview

AP COMPUTER SCIENCE PRINCIPLES
MIDTERM EXAM WITH VERIFIED
ANSWERS




Internet uusers uneed uto ube uable uto utransfer uprivate udata uonline, ulike ucredit ucard
unumbers uand usocial usecurity unumbers. uSome ucryptographic ualgorithms uhelp uensure

uthis usafety.

What umakes ucryptographic ualgorithms usecure?

a. uThe ualgorithms uused ufor ucryptography uare ua usecret.
b. uThe ualgorithms uused ufor ucryptography uhave ubeen uused ufor usuch ua ulong utime uthat
uwe uthey uare usecure.

c. uThe ualgorithms uused ufor ucryptography uare usolvable, ubut uthe usolutions uare ukept
uunder ua usecure ugovernment uprotection uservice.

d. uThe ualgorithms uused ufor ucryptography uare ubased uon uintractable u(or uunsolvable)
uproblems, umaking uthem uextremely udifficult uto ubreak. u- ucorrect uanswers-d



Alice uposts ua ukey ufor uencrypting uthat uanyone ucan uaccess. uBob uuses uthat ukey uto
uencrypt ua umessage, uthen usends uit uto uAlice. uWhen uAlice ureceives uthe umessage, ushe

udecrypts uit uusing ua uprivate ukey.

What ukind uof uencryption uprocess uis uthis?
a. uVigenere ucipher
b. uSymmetric uencryption

,c. uCertificate uauthority uprocess
d. uPublic ukey uencryption u- ucorrect uanswers-d

What uis ua uDistributed uDenial uof uService u(DDoS) uattack?

a. uA ucoordinated ueffort uby ua ugroup uto usimultaneously uattempt uto ugain uentry uto uforeign
ugovernment's uservers uor usystems

b. uAn uattempt uto ucompromise ua usingle utarget uby uflooding uit uwith urequests ufrom
umultiple usystems. u

c. uAn uattempt uto uharass uor uextort uall ucustomers uof uone uor umore uInternet uService
uProviders u(ISPs).

d. uAn ueffort uby unetwork uengineers uto ufocus uall usystems uon ucatching ua uuser uor
ucomputer uthat uhas uillegally ugained uaccess. u- ucorrect uanswers-b



When ustoring udata udigitally, uwhether uthrough ucloud ucomputing uor ulocally, uthere uis uan
uincreased urisk uof utheft udue uto uthe urelative uease uof uaccessing uthe uinformation.

Which uof uthe ufollowing uis uNOT uan uexample uof usecurity uand uprivacy uconcerns uthat
uarise ufrom ustoring udata udigitally?



a. uA umanager ulooks uup uan uemployee's ubirthday uin uthe uonline ucompany udirectory uin
uorder uto uplan ua usurprise ubirthday uparty ufor uthem uat uthe uoffice.

b. uAn uinsurance ucompany uhas ua ubreach uin utheir userver uthat uwas uaccessed uthrough
ustolen uuser ucredentials uand umore uthan u80 umillion urecords uwere ucompromised.

c. uA ucompany upays ufor ua uDistributed uDenial uof uService u(DDoS) uattack uthat ushuts
udown ua ucompetitors uwebsite ufor uan uextended uperiod uof utime.

d. uA ucelebrity's uphone uis uremotely uaccessed uand uphotos uare udownloaded uand usold uto
ua umagazine ucompany. u- ucorrect uanswers-a



Not uall uuses uof udata uare ufor uthe ugreater ugood. uOne uof uthe uways uthat uhackers uare
uable uto uabuse uthe usystem uis uto uinfiltrate usystems uand ucollect ularge udata-sets uthat

uthey uare unot usupposed uto uhave uaccess uto. uThis ubegan uwith uphone unumbers uand

uaccess uto ulong udistance ucalling uand uhas utransformed uinto ua ucriminal uenvironment

uwhere uuser uidentities uare ubought uand usold uon uthe ublack umarket.

Why umight ua uhacker uwant uto uextract ua uuser uprofile ufrom uan uinnocent usite uthat uhas unot
ufinancial uconnections?



a. uSite udata uusually uincludes uother usites uvisited uin utheir usearch uhistory.
b. uUsers umight uuse usimilar upasswords uon uother usites.
c. uAll usites uare uconnected uon uthe uinternet.
d. uA uuser's uname uis uall uthat uis uneeded uto ubreach ua ubank. u- ucorrect uanswers-b

Which uof uthe ufollowing uscenarios uis umost ucharacteristic uof ua uphishing uattack.
u



a. uYou uget uan uunwanted uemail utrying uto usell uyou ua ulow uquality uproduct uor uservice uthat
useems u"fishy."

, b. uYou uaccidentally uinstall ua upiece uof usoftware uthat umonitors uyour uactivity uto usteal
upersonal uinformation ulike uyour upasswords, udate uof ubirth, usocial usecurity unumber, uetc.

c. uYou uaccidentally urun ua upiece uof ucode uthat uautomatically uspreads ufrom uone
ucomputer uto uanother, uexploiting ua ucommon uvulnerability

d. uYou uget uan uemail ufrom uthe uIT usupport udesk uthat uasks uyou uto usend ua ureply uemail
uwith uyour uusername uand upassword uto uverify uyour uaccount u- ucorrect uanswers-d



Caesar uCipher uis uan uolder uand usince uoutdated uencryption utechnique uused uby uJulius
uCaesar uto u"hide" umessages uhe usent uto uhis utroops. uUsing uCaesar uCipher, ueach uletter

uin uthe ualphabet uis utranslated uto ua uletter uwith uthe usame ugiven uoffset ufrom uthe uoriginal

uletter. uCharacters uthat uare unot uA-Z uremain uas uis.

For uexample, uif uthe umessage uis uHI uZOE uand uthe ushift uis u2, uthe uthe uencrypted
umessage uis: uJK uBQG usince uthe uletter u"J" uis utwo uletters uafter u"H" uin uthe ualphabet, uand

u"K" uis utwo uletters uafter uthe u"I" uin uthe ualphabet, uetc. uNotice uthat usince uthe u"Z" uis uat uthe

uend uof uthe ualphabet uand uthe ushift uis u2, uthe ualgorithm uhas uto uwrap uback uaround uto

uthe ubeginning uof uthe ualphabet uso uthat u"Z" utranslates uto u"B". uSuppose uthat uyou uwant

uto uencrypt uthe ufollowing umessage: uREMAIN uHOME. uOf uthe ufollowing, uwhich uwould

ube ua upotential uencrypted umessage uusing uCaesar uCipher?



a. uTGPBKP uJPQG
b. uSFNCKO uIPNF
c. uUHPDLQ uKRPH
d. uPFLBHO uINND u- ucorrect uanswers-c

Fill uin uthe ublank uof uthe ufollowing ustatement: u"______ uencryption uis ua umethod uof
uencryption uinvolving uone ukey ufor uboth uencryption uand udecryption."



a. uSymmetric
b. uSSL
c. uAsymetric
d. uPublic uKey u- ucorrect uanswers-a

Ransomware uis ua urelatively unew uform uof uattack uon ua ucomputer usystem. uA
uransomware uattack uis uwhen uan uindividual uor ugroup uof uindividuals utargets uan

uorganization's userver uand uis uable uto uuse ua usophisticated uform uof uenryption uto ulock

udown uthe uorganization's ufiles. uEffectively, uthe uorganization ucannot ugain uaccess uto

utheir uown udata, ucausing umajor udisruptions. uThe uterm u"Ransomware" ucomes ufrom uthe

ufact uthat uthe uorganization uis uasked ufor umoney uin uexchange ufor ubeing ugranted uaccess

uto utheir ufiles.

Of uthe ufollowing, uwhich uis uthe uLEAST ueffective uway ufor uan uorganization uto uprotect
uagainst uRansomware?



a. uInstall uanti-virus usoftware uon uits uservers.
b. uMake usure uthat uits uoperating usystem usoftware uupdates uare uimplemented uon ua
ufrequent ubasis.

Written for

Institution
AP COMPUTER SCIENCE PRINCIPLES
Course
AP COMPUTER SCIENCE PRINCIPLES

Document information

Uploaded on
November 2, 2024
Number of pages
29
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Registerednurse Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
22
Member since
1 year
Number of followers
3
Documents
5164
Last sold
1 week ago

3.0

2 reviews

5
0
4
0
3
2
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions