Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

Computer Security Principles and Practice - Complete test bank - exam questions - quizzes (updated 2025)

Note
-
Vendu
-
Pages
194
Grade
A+
Publié le
22-08-2025
Écrit en
2025/2026

Computer Security Principles and Practice - Complete test bank - exam questions - quizzes (updated 2025)

Établissement
Computer Security Principles And Practice,Stalling
Cours
Computer Security Principles and Practice,Stalling











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
Computer Security Principles and Practice,Stalling
Cours
Computer Security Principles and Practice,Stalling

Infos sur le Document

Publié le
22 août 2025
Nombre de pages
194
Écrit en
2025/2026
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

Chapter
#ho1



Chapter 1 – Computer Systems Overview


TRUE/FALSE QUESTIONS:
T F 1. Threats are attacks carried out.
T F 2. Computer security is protection of the integrity, availability, and
confidentiality of information system resources.

T F 3. Data integrity assures that information and programs are changed only
in a specified and authorized manner.

T F 4. Availability assures that systems works promptly and service is not
denied to authorized users.

T F 5. The “A” in the CIA triad stands for “authenticity”.

T F 6. The more critical a component or service, the higher the level of
availability required.

T F 7. Computer security is essentially a battle of wits between a perpetrator
who tries to find holes and the administrator who tries to close them.

T F 8. Security mechanisms typically do not involve more than one particular
algorithm or protocol.

T F 9. Many security administrators view strong security as an impediment to
efficient and user-friendly operation of an information system.

T F 10. In the context of security our concern is with the vulnerabilities of
system resources.

T F 11. Hardware is the most vulnerable to attack and the least susceptible to
automated controls.

T F 12. Contingency planning is a functional area that primarily requires
computer security technical measures.

T F 13. X.800 architecture was developed as an international standard and
focuses on security in the context of networks and communications.

T F 14. The first step in devising security services and mechanisms is to
develop a security policy.

T F 15. Assurance is the process of examining a computer product or system
with respect to certain criteria.




SCHOLARVAULT

, Chapter
#ho1



MULTIPLE #hoCHOICE #hoQUESTIONS:
1. assures #hothat #hoindividuals #hocontrol #hoor #hoinfluence #howhat #hoinformation
#horelated #hoto #hothem #homay #hobe #hocollected #hoand #hostored #hoand #hoby #howhom #hoand #hoto

#howhom #hothat #hoinformation #homay #hobe #hodisclosed.



A. Availability B. # h o System #hoIntegrity
C. # h o Privacy D. # h o Data #hoIntegrity
2. assures #hothat #hoa #hosystem #hoperforms #hoits #hointended #hofunction #hoin #hoan
#hounimpaired #homanner, #hofree #hofrom #hodeliberate #hoor #hoinadvertent #hounauthorized
#homanipulation #hoof #hothe #hosystem.



A. System #hoIntegrity B. # h o Data #hoIntegrity
C. # h o Availability D. # h o Confidentiality
3. A #holoss #hoof is #hothe #hounauthorized #hodisclosure #hoof #hoinformation.
A. confidentiality B. # h o integrity
C. # h o authenticity D. # h o availability
4. A #ho level #hobreach #hoof #hosecurity #hocould #hobe #hoexpected #hoto #hohave #hoa
#hosevere #hoor #hocatastrophic #hoadverse #hoeffect #hoon #hoorganizational #hooperations,

#hoorganizational #hoassets, #hoor #hoindividuals.



A. low B. # h o normal
C. #homoderate D. # h o high
5. A #hoflaw #hoor #howeakness #hoin #hoa #hosystem’s #hodesign, #hoimplementation, #hoor
#hooperation #hoand #homanagement #hothat #hocould #hobe #hoexploited #hoto #hoviolate #hothe

#hosystem’s #hosecurity #hopolicy #hois #hoa(n) # h o .



A. countermeasure B. #hovulnerability
C. # h o adversary D. # h o risk
6. An #hoassault #hoon #hosystem #hosecurity #hothat #hoderives #hofrom #hoan #hointelligent #hoact
#hothat #hois #hoa #hodeliberate #hoattempt #hoto #hoevade #hosecurity #hoservices #hoand #hoviolate

#hothe #hosecurity #hopolicy #hoof #hoa #hosystem #hois #hoa(n) #ho .



A. risk B. # h o asset
C. # h o attack D. # h o vulnerability




SCHOLARVAULT

, Chapter
#ho1



7. A(n) #ho is #hoan #hoaction, #hodevice, #hoprocedure, #hoor #hotechnique #hothat
#horeduces #hoa #hothreat, #hoa #hovulnerability, #hoor #hoan #hoattack #hoby #hoeliminating #hoor

#hopreventing #hoit, #hoby #hominimizing #hothe #hoharm #hoit #hocan #hocause, #hoor #hoby

#hodiscovering #hoand #horeporting #hoit #hoso #hothat #hocorrect #hoaction #hocan #hobe #hotaken.



A. attack B. # h o countermeasure
C. # h o adversary D. # h o protocol
8. A(n) #ho is #hoan #hoattempt #hoto #holearn #hoor #homake #house #hoof #hoinformation #hofrom
#hothe #hosystem #hothat #hodoes #honot #hoaffect #hosystem #horesources.



A. passive #hoattack B. #hoinside #hoattack
C. # h o outside #hoattack D. # h o active #hoattack
9. Masquerade, #hofalsification, #hoand #horepudiation #hoare #hothreat #hoactions #hothat #hocause
threat #hoconsequences.
A. unauthorized #hodisclosure B. # h o deception
C. # h o disruption D. # h o usurpation
10. A # h o threat #hoaction #hoin #howhich #hosensitive #hodata #hoare #hodirectly #horeleased #hoto #hoan
#hounauthorized #hoentity #hois #ho .
A. corruption B. # h o disruption
C. # h o intrusion D. # h o exposure
11. An # h o example #hoof #ho is #hoan #hoattempt #hoby #hoan #hounauthorized #houser #hoto
#hogain #hoaccess #hoto #hoa #hosystem #hoby #hoposing #hoas #hoan #hoauthorized #houser.



A. masquerade B. # h o interception
C. # h o repudiation D. # h o inference
12. The # h o prevents #hoor #hoinhibits #hothe #honormal #house #hoor
#homanagement #hoof #hocommunications #hofacilities.



A. passive #hoattack B. # h o traffic #hoencryption
C. # h o denial #hoof #hoservice D. # h o masquerade
13. A # h o is #hoany #hoaction #hothat #hocompromises #hothe #hosecurity #hoof
#hoinformation #hoowned #hoby #hoan #hoorganization.



A. security #homechanism B. # h o security #hoattack
C. # h o security #hopolicy D. # h o security #hoservice




SCHOLARVAULT

, Chapter
#ho1



14. The # h o assurance #hothat #hodata #horeceived #hoare #hoexactly #hoas #hosent #hoby
#hoan #hoauthorized #hoentity #hois #ho .
A. authentication B. # h o data #hoconfidentiality
C. # h o access #hocontrol D. # h o data #hointegrity
15. #ho is #hothe #hoinsertion #hoof #hobits #hointo #hogaps #hoin #hoa #hodata #hostream #hoto
frustrate #hotraffic #hoanalysis #hoattempts.
#ho



A. Traffic #hopadding B. # h o Traffic #horouting
C. # h o Traffic #hocontrol D. # h o Traffic #hointegrity




SHORT #hoANSWER #hoQUESTIONS:
1. is #hothe #hoprotection #hoafforded #hoto #hoan #hoautomated #hoinformation #hosystem
#hoin #hoorder #hoto #hoattain #hothe #hoapplicable #hoobjectives #hoof #hopreserving #hothe #hointegrity,

#hoavailability, #hoand #hoconfidentiality #hoof #hoinformation #hosystem #horesources.



2. Confidentiality, #hoIntegrity, #hoand #hoAvailability #hoform #howhat #hois #hooften #horeferred #hoto #hoas #hothe
#ho .
3. A #holoss #hoof #ho is #hothe #hodisruption #hoof #hoaccess #hoto #hoor #house #hoof
#hoinformation #hoor #hoan #hoinformation #hosystem.



4. In #hothe #hoUnited #hoStates, #hostudent #hograde #hoinformation #hois #hoan #hoasset #howhose
#hoconfidentiality #hois #horegulated #hoby #hothe #ho .
5. A(n) #ho is #hoa #hothreat #hothat #hois #hocarried #hoout #hoand, #hoif #hosuccessful, #holeads #hoto
#hoan #houndesirable #hoviolation #hoof #hosecurity, #hoor #hothreat #hoconsequence.



6. A(n) #ho is #hoany #homeans #hotaken #hoto #hodeal #howith #hoa #hosecurity #hoattack.
7. Misappropriation #hoand #homisuse #hoare #hoattacks #hothat #horesult #hoin #ho threat #hoconsequences.
8. The #hoassets #hoof #hoa #hocomputer #hosystem #hocan #hobe #hocategorized #hoas
#hohardware, #hosoftware, #hocommunication #holines #hoand #honetworks, #hoand #ho .



9. Release #hoof #homessage #hocontents #hoand #hotraffic #hoanalysis #hoare #hotwo #hotypes #hoof #ho attacks.
10. Replay, #homasquerade, #homodification #hoof #homessages, #hoand #hodenial #hoof #hoservice #hoare
#hoexample #hoof

attacks.
11. Establishing, #homaintaining, #hoand #hoimplementing #hoplans #hofor #hoemergency #horesponse,
#hobackup #hooperations, #hoand #hopost #hodisaster #horecovery #hofor #hoorganizational #hoinformation

#hosystems #hoto #hoensure #hothe #hoavailability #hoof #hocritical #hoinformation #horesources #hoand

#hocontinuity #hoof #hooperations #hoin #hoemergency #hosituations #hois #hoa #ho plan.


SCHOLARVAULT
$15.99
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
ScholarVault West Virgina University
Voir profil
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
16
Membre depuis
5 mois
Nombre de followers
1
Documents
559
Dernière vente
1 semaine de cela
StudyHub: I provide A+ solutions in Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology, and many other subjects.

Greetings, Are you tired of scouring for reliable study materials? Look no further! I'm here to provide you with accurate, comprehensive, and current study documents to ace your quizzes, assignments, midterms, and final exams. Whatever your study needs may be, I've got you covered. Feel free to reach out for assistance with any study materials, and don't hesitate to refer me to your friends. Thank you for choosing my services, and welcome to your solution! Best regards,

Lire la suite Lire moins
3.0

1 revues

5
0
4
0
3
1
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions