100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank for Security in Computing, 6th Edition by Charles Pfleeger

Rating
-
Sold
2
Pages
37
Grade
A+
Uploaded on
28-08-2024
Written in
2024/2025

Test Bank for Security in Computing 6e 6th Edition by Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp. Full Chapters test bank are included with answers and explanation. Chapter 1: Introduction Chapter 2: Toolbox: Authentication, Access Control, and Cryptography Chapter 3: Programs and Programming Chapter 4: The Internet--User Side Chapter 5: Operating Systems Chapter 6: Networks Chapter 7: Data and Databases Chapter 8: New Territory Chapter 9: Privacy Chapter 10: Management and Incidents Chapter 11: Legal Issues and Ethics Chapter 12: Details of Cryptography Chapter 13: Emerging Topics

Show more Read less
Institution
Computer Science
Course
Computer Science











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Science
Course
Computer Science

Document information

Uploaded on
August 28, 2024
Number of pages
37
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Pfleeger, Pfleeger and Coles-Kemp: Security in Computing 6th Ed.
Multiple-Choice Quiz

Chapter 1 (Introduction)

1. Which of the following is considered an asset in computer security?

A) Computer hardware
B) Operating system
C) Email messages
D) All of the above

Answer: D) All of the above

Explanation: In computer security, assets refer to items of value needing protection.
Computer hardware, such as the device and associated components, is considered an asset.
Software assets include the operating system, utilities, device handlers, and applications
like word processors, media players, and email handlers. Furthermore, data items stored on
the computer, such as email messages, photos, papers, projects, and contact information,
are also considered assets. Therefore, all options listed in the question (computer hardware,
operating system, and email messages) are assets in computer security.

2. Which of the following factors affect the value of an asset?

A) Replacement cost and timing
B) User's perspective and storage capacity
C) Paper and ink cost and owner's identity
D) Protection level and availability

Answer: A) Replacement cost and timing

Explanation: The value of an asset depends on factors such as replacement cost and
timing. The replacement cost refers to the effort or expense required to replace the asset if
lost or damaged. Assets like computer data can be difficult or impossible to replace, while
items like DVDs can be easily replaced. Furthermore, the timing also affects asset value. For
example, plans for a company's new product line are highly valuable before the release, but
their value decreases significantly once the product is released.

3. Which of the following is a security property that falls under the C-I-A triad?

A) Auditability
B) Accountability
C) Availability
D) Authentication

,Answer: C) Availability

Explanation: The C-I-A triad refers to confidentiality, integrity, and availability, which are
the three fundamental security properties. Availability is one of the aspects that make a
computer valuable. It represents the ability of a system to be accessible and operational
when needed. Therefore, option C correctly identifies availability as a security property
falling under the C-I-A triad.

4. What is the nature of threats in the computer world and in life in general?

A) They are limited and predictable
B) They are limitless and largely unpredictable
C) They are only caused by natural disasters
D) They can be completely protected against

Answer: B) They are limitless and largely unpredictable

Explanation: The number and kinds of threats in the computer world and life, in general,
are practically unlimited and largely unpredictable. The causes of harm are limitless and
reflect the unpredictable nature of events like natural disasters, accidents, health issues,
and random acts of violence. Due to the many possible causes of harm, it is impossible to
protect ourselves or our computers entirely against all of them.

5. Which of the following factors is necessary for an attack to succeed?

A) Method, opportunity, and motive
B) Method, vulnerability, and motive
C) Opportunity, vulnerability, and motive
D) Method, opportunity, and vulnerability

Answer: A) Method, opportunity, and motive

Explanation: For an attack to succeed, the attacker must have three things: method,
opportunity, and motive. Method refers to the skills, knowledge, tools, and resources
needed to perpetrate the attack. Opportunity is the time and access required to execute the
attack. Motive refers to the reason or incentive for wanting to carry out the attack. Without
any of these factors, the attack will fail.

6. Which of the following is NOT a way to deal with harm in the context of security
controls?

A) Prevent it
B) Deter it
C) Recover from its effects
D) Enhance physical security

,Answer: D) Enhance physical security

Explanation: There are various ways to deal with harm, including preventing it, deterring
it, mitigating its impact, detecting it, and recovering from its effects. Enhancing physical
security, such as building castles or fortresses, is provided as an example to understand
traditional ways of enhancing security but is not mentioned as one of the ways to deal with
harm in the context of security controls.

7. Which class of controls uses tangible elements to stop or block an attack?

A) Physical controls
B) Procedural controls
C) Technical controls
D) Logical controls

Answer: A) Physical controls

Explanation: Physical controls use something tangible, such as walls, fences, locks,
guards, and fire extinguishers, to stop or block an attack. These controls rely on physical
elements to provide security measures.

8. What is the advantage of using overlapping controls or defense in depth?

A) They are more cost-effective
B) They work in different ways with different results
C) They require fewer resources to implement
D) They eliminate the need for other classes of controls

Answer: B) They work in different ways with different results

Explanation: It can be effective to use overlapping controls or defense in depth, employing
more than one control or more than one class of control to achieve protection. The
advantage of this approach is that different controls work in different ways, providing
complementary layers of security and increasing the overall effectiveness of the security
measures.



Chapter 2 (Toolbox: Authentication, Access Control, and
Cryptography)

9. What is the difference between identification and authentication?

A) Identification proves an asserted identity, while authentication asserts who a person is.
B) Identification confirms an asserted identity, while authentication proves who a person is.
C) Identification asserts who a person is, while authentication is proves an asserted identity.
D) Identification and authentication refer to the same process.

, Answer: C) Identification asserts who a person is, while authentication proves an asserted
identity.

Explanation: Identification is the act of asserting who a person is, while authentication is
the act of proving that the asserted identity is correct. Identification is about stating or
claiming an identity, while authentication involves providing evidence or proof to verify that
the claimed identity is valid.

10. Why is authentication necessary even if someone's identity is public?

A) Authentication prevents anyone from claiming a public identity.
B) Authentication protects the privacy of a person's identity.
C) Authentication ensures that the claimed public identity is valid.
D) Authentication is a legal requirement for public identities.

Answer: C) Authentication ensures that the claimed public identity is valid.

Explanation: If someone's identity is public, anyone can claim to be that person.
Therefore, authentication becomes necessary to distinguish between genuine individuals
and impostors. Authentication provides the means to prove that the claimed public identity
is valid, establishing trust and confidence in the identity's authenticity.

11. What is the main limitation of passwords as protection devices?

A) They contain a small number of bits of information.
B) Attackers easily guess them.
C) They can be cracked using specialized software.
D) They are vulnerable to brute force attacks.

Answer: A) They contain a small number of bits of information.

Explanation: Passwords are limited as protection devices because they only contain a
relatively small number of bits of information. This limitation means that passwords have a
limited complexity and can be easily guessed or cracked by attackers, especially if users
choose weak and easily guessable passwords. Increasing the complexity and length of
passwords can improve their security, but the fundamental limitation of limited bits of
information still exists.

12. How does using numerals and special characters in passwords affect brute
force search time?

A) It significantly increases the search time for brute force attacks.
B) It does not impact the search time for brute force attacks.
C) It slightly lengthens the search time for brute force attacks.
D) It makes brute force attacks impossible.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Tutor247 Boston University
View profile
Follow You need to be logged in order to follow users or courses
Sold
6028
Member since
3 year
Number of followers
3557
Documents
1107
Last sold
9 hours ago
Tutor 24/7

Providing best and accurate study guidance to students since 2011. Swift response to our students 24/7 and Seven days a week. At your service :)

4.1

739 reviews

5
445
4
121
3
72
2
30
1
71

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions