Programmers. Exam 2025 Questions and
Answers
Secure - ANS Protects the integrity of a system. A system whose resources are used and
accessed as intended under all circumstances.
Cracker - ANS Someone attempting to breach security.
Threat - ANS The potential for a security violation.
Attack - ANS An attempt to break security.
Denial-of-Service (DoS) - ANS An attack that attempts to disrupt or prevent legitimate use of
a system.
Trojan Horse - ANS A code segment that tries to misuse its environment.
Virus - ANS A malicious fragment of code embedded in a legitimate program.
Worm - ANS Similar to a virus, but self replicates throughout a network.
Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
,Domain - ANS Specifies resources a process may access. Specifies a set of objects and the
operations that may be invoked on those objects. Set of access rights.
Protection - ANS A mechanism for controlling the access of programs, processes, or users to
the resources defined by a computer system.
Security - ANS Requires not only an adequate protection of system, but also consideration of
the external environment within which the system operates (i.e., threats and attacks).
Breach of Confidentiality - ANS Gaining access to information, credit card numbers, personal
information, etc.
Breach of Integrity - ANS Modified data.
Breach of Availability - ANS Destruction of data.
Theft of Service - ANS Unauthorized use of resources such as using a server as a personal file
server.
Trap Door - ANS A hole purposely left in a software program that only the programmer is
capable of using.
UNIX Domain Association - ANS A UNIX domain is associated with a user.
Masquerading - ANS The most common method used by an attacker.
Principle of Least Privilege - ANS Where just enough privilege is given to perform a task.
Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
,Need-to-Know Principle - ANS Where a process is only given access to resources it currently
needs.
Copy and Owner Rights - ANS Rights needed to change entries in a column of an access
matrix.
Control Rights - ANS Rights needed to change entries in a row of an access matrix.
Role-Based Access Control - ANS A type of control where privileges and programs are
assigned roles, and users are assigned roles based on passwords.
Compiler-Based Enforcement - ANS A type of enforcement where protection needs are
declared rather than programmed.
Kernel-Based Enforcement - ANS Enforcement provided by the subsystem designer.
The 4 Levels of Security - ANS Physical - site must be secured.
Human - only appropriate users have access.
OS - system must be able to protect itself.
Network - network must be secured.
Logic Bomb - ANS A security incident initiated when certain logical conditions are met.
Stack and Buffer Overflow - ANS A tactic used to gain access to a system by writing into the
stack so that a return address will specify malicious code to be run.
Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
, Symmetric Encryption - ANS A type of encryption where the same key is used to encrypt and
decrypt.
Asymmetric Encryption - ANS A type of encryption where 2 different keys are used to
encrypt and decrypt.
Encryption - ANS Places constraints on the receivers.
Authentication - ANS Places constraints on the senders.
SSL - ANS Allows two computers to communicate securely.
Passwords - ANS The most common authentication mechanism.
Digital Certificate - ANS A public key that has been digitally signed by a certificate authority.
Paired Passwords - ANS One is provided by the system and the other is provided by the user.
Two-Factor Authentication - ANS Authentication using something you know and something
you have.
Intrusion Detection System (IDS) - ANS Detects attempted or successful intrusions into a
system or network.
Intrusion Prevention System (IPS) - ANS Detects and attempts to prevent an intrusion into a
system or network.
Port - ANS A connection point via which an OS communicates with a device.
Pg. 4 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.