100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSCI 4612 Midterm Exam Questions With 100- Verified Answers.docx

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
19-12-2025
Written in
2025/2026

CSCI 4612 Midterm Exam Questions With 100- Verified A

Institution
CS,.
Course
CS,.










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CS,.
Course
CS,.

Document information

Uploaded on
December 19, 2025
Number of pages
21
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Which of the following descriptions refers to administrative
controls? -
correct answer ✅Management actions, written policies,
procedures, guidelines, regulations, laws, or rules of any kind


What name is given to the assurance that requested information is
available to authorized users upon request? -
correct answer ✅Availability


Which of the following refers to the assurance that information can
be accessed and viewed only by authorized users? -
correct answer ✅Confidentiality


What name is given to a security strategy that relies on multiple
layers of security that require attackers to defeat multiple controls
to access any protected resource? -
correct answer ✅Defense in depth


Technical controls are also referred to as: -
correct answer ✅logical controls.

,CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Controls (such as locked doors, firewall rules, and user passwords)
that stop an action before it occurs are referred to as: -
correct answer ✅preventive controls.


A device or process (such as user authentication, antivirus software,
and firewalls) that limits access to a resource is referred to as a: -
correct answer ✅technical control.


An attacker is any person or program that attempts to interact with
a computer information system in an unauthorized manner. -
correct answer ✅True


A computer environment is also referred to as IT Infrastructure. -
correct answer ✅True


The term defense in depth refers to a security strategy that relies
on multiple layers of security that require attackers to defeat
multiple controls to access any protected resource. -
correct answer ✅True

, CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Windows stores access rules, or permissions, for resources (objects)
in: -
correct answer ✅access control lists.


The collection of all possible vulnerabilities that could provide
unauthorized access to computer resources is called the: -
correct answer ✅attack surface.


Which of the following refers to a level of sensitivity (such as top
secret, secret, confidential, restricted, or unclassified) assigned to
an object by its owner? -
correct answer ✅Classification


An access control method based on an object's owner and
permissions granted by the owner is referred to as: -
correct answer ✅discretionary access control (DAC).


Which of the following terms is used to describe providing
credentials that claim a specific identity, such as a user name? -
correct answer ✅Authentication

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Cindellera stuvia
View profile
Follow You need to be logged in order to follow users or courses
Sold
111
Member since
1 year
Number of followers
2
Documents
10567
Last sold
1 day ago

4.0

24 reviews

5
10
4
6
3
6
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions