- Study guides, Revision notes & Summaries
Looking for the best study guides, study notes and summaries about ? On this page you'll find 6 study documents about .
All 6 results
Sort by:
-
Exam (elaborations)
CECS 378 EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026
-
---3March 20262025/2026A+
- CECS 378 EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026 
 
What is access control as defined by NIST IR 7298? - Answers The process of granting or denying specific requests to obtain and use information and related information processing services, and to enter specific physical facilities. 
How does RFC 4949 define access control? - Answers A process by which use of system resources is regulated according to a security policy and permitted only by authorized entities according to that poli...
-
£9.34 More Info
TutorJosh
-
Exam (elaborations)
CECS 378 MIDTERM 1 EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026
-
--4March 20262025/2026A+Available in bundle
- CECS 378 MIDTERM 1 EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026 
 
Computer security - Answers The protection of an information system to preserve confidentiality, integrity, and availability. 
The CIA triad - Answers Confidentiality, integrity, and availability. 
Confidentiality - Answers Prevent unauthorized disclosure of information. 
Integrity - Answers Prevent unauthorized modification or destruction of information. 
Availability - Answers Ensure timely, reliable access to informati...
-
£9.34 More Info
TutorJosh
-
Exam (elaborations)
CECS 378 MIDTERM 1 EXAM QUESTIONS WITH VERIFIED SOLUTIONS LATEST UPDATE 2026
-
--6March 20262025/2026A+Available in bundle
- CECS 378 MIDTERM 1 EXAM QUESTIONS WITH VERIFIED SOLUTIONS LATEST UPDATE 2026 
 
What does CIA stand for in the context of information security? 
a) Central Intelligence Agency 
b) Confidentiality, Integrity, Availability 
c) Cyber Intelligence Assessment 
d) Critical Information Analysis - Answers b: Confidentiality, Integrity, Availability 
Which component of the CIA Triad focuses on keeping data accessible to authorized users? 
a) Confidentiality 
b) Integrity 
c) Availability 
d) Authenticati...
-
£8.95 More Info
TutorJosh
-
Exam (elaborations)
CECS 378 EXAM 1 QUESTIONS WITH VERIFIED SOLUTIONS LATEST UPDATE 2026
-
--4March 20262025/2026A+Available in bundle
- CECS 378 EXAM 1 QUESTIONS WITH VERIFIED SOLUTIONS LATEST UPDATE 2026 
 
Threats are attacks carried out. - Answers False 
Computer security is protection of the integrity, availability, and confidentiality of information system resources. - Answers True 
Data integrity assures that information and programs are changed only in a specified and authorized manner. - Answers True 
Availability assures that systems works promptly and service is not denied to authorized users. - Answers True 
The "A...
-
£8.95 More Info
TutorJosh
-
Exam (elaborations)
CECS 378-FINAL EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026
-
--13March 20262025/2026A+Available in bundle
- CECS 378-FINAL EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026 
 
Diffie-Hellman is not an encryption algorithm. 
1) True 
2) False - Answers True 
One of Diffie-Hellman's limitations is no authorization 
1) True 
2) False - Answers False 
Two of the most important symmetric encryption algorithms are: 
1) Triple-DES 
2) Diffie-Hellman 
3) DES 
4) None of the above 
5) RSA - Answers Triple-DES, DES 
In your PKI lab, the root certificate included the private and public key 
1) True 
2) Fa...
-
£9.34 More Info
TutorJosh