AP COMPUTER SCIENCE PRINCIPLES
MIDTERM
Internet fusers fneed fto fbe fable fto ftransfer fprivate fdata fonline, flike fcredit fcard
fnumbers fand fsocial fsecurity fnumbers. fSome fcryptographic falgorithms fhelp fensure
fthis fsafety.
What fmakes fcryptographic falgorithms fsecure?
a. fThe falgorithms fused ffor fcryptography fare fa fsecret.
b. fThe falgorithms fused ffor fcryptography fhave fbeen fused ffor fsuch fa flong ftime
fthat fwe fthey fare fsecure.
c. fThe falgorithms fused ffor fcryptography fare fsolvable, fbut fthe fsolutions fare fkept
funder fa fsecure fgovernment fprotection fservice.
d. fThe falgorithms fused ffor fcryptography fare fbased fon fintractable f(or funsolvable)
fproblems, fmaking fthem fextremely fdifficult fto fbreak. f- fcorrect fanswers-d
Alice fposts fa fkey ffor fencrypting fthat fanyone fcan faccess. fBob fuses fthat fkey fto
fencrypt fa fmessage, fthen fsends fit fto fAlice. fWhen fAlice freceives fthe fmessage,
fshe fdecrypts fit fusing fa fprivate fkey.
What fkind fof fencryption fprocess fis fthis?
a. fVigenere fcipher
b. fSymmetric fencryption
c. fCertificate fauthority fprocess
d. fPublic fkey fencryption f- fcorrect fanswers-d
What fis fa fDistributed fDenial fof fService f(DDoS) fattack?
,a. fA fcoordinated feffort fby fa fgroup fto fsimultaneously fattempt fto fgain fentry fto
fforeign fgovernment's fservers for fsystems
b. fAn fattempt fto fcompromise fa fsingle ftarget fby fflooding fit fwith frequests ffrom
fmultiple fsystems. f
c. fAn fattempt fto fharass for fextort fall fcustomers fof fone for fmore fInternet fService
fProviders f(ISPs).
d. fAn feffort fby fnetwork fengineers fto ffocus fall fsystems fon fcatching fa fuser for
fcomputer fthat fhas fillegally fgained faccess. f- fcorrect fanswers-b
When fstoring fdata fdigitally, fwhether fthrough fcloud fcomputing for flocally, fthere fis
fan fincreased frisk fof ftheft fdue fto fthe frelative fease fof faccessing fthe finformation.
Which fof fthe ffollowing fis fNOT fan fexample fof fsecurity fand fprivacy fconcerns fthat
farise ffrom fstoring fdata fdigitally?
a. fA fmanager flooks fup fan femployee's fbirthday fin fthe fonline fcompany fdirectory fin
forder fto fplan fa fsurprise fbirthday fparty ffor fthem fat fthe foffice.
b. fAn finsurance fcompany fhas fa fbreach fin ftheir fserver fthat fwas faccessed fthrough
fstolen fuser fcredentials fand fmore fthan f80 fmillion frecords fwere fcompromised.
c. fA fcompany fpays ffor fa fDistributed fDenial fof fService f(DDoS) fattack fthat fshuts
fdown fa fcompetitors fwebsite ffor fan fextended fperiod fof ftime.
d. fA fcelebrity's fphone fis fremotely faccessed fand fphotos fare fdownloaded fand fsold
fto fa fmagazine fcompany. f- fcorrect fanswers-a
Not fall fuses fof fdata fare ffor fthe fgreater fgood. fOne fof fthe fways fthat fhackers fare
fable fto fabuse fthe fsystem fis fto finfiltrate fsystems fand fcollect flarge fdata-sets fthat
fthey fare fnot fsupposed fto fhave faccess fto. fThis fbegan fwith fphone fnumbers fand
faccess fto flong fdistance fcalling fand fhas ftransformed finto fa fcriminal fenvironment
fwhere fuser fidentities fare fbought fand fsold fon fthe fblack fmarket.
Why fmight fa fhacker fwant fto fextract fa fuser fprofile ffrom fan finnocent fsite fthat fhas
fnot ffinancial fconnections?
a. fSite fdata fusually fincludes fother fsites fvisited fin ftheir fsearch fhistory.
b. fUsers fmight fuse fsimilar fpasswords fon fother fsites.
c. fAll fsites fare fconnected fon fthe finternet.
d. fA fuser's fname fis fall fthat fis fneeded fto fbreach fa fbank. f- fcorrect fanswers-b
Which fof fthe ffollowing fscenarios fis fmost fcharacteristic fof fa fphishing fattack.
f
a. fYou fget fan funwanted femail ftrying fto fsell fyou fa flow fquality fproduct for fservice
fthat fseems f"fishy."
b. fYou faccidentally finstall fa fpiece fof fsoftware fthat fmonitors fyour factivity fto fsteal
fpersonal finformation flike fyour fpasswords, fdate fof fbirth, fsocial fsecurity fnumber,
fetc.
c. fYou faccidentally frun fa fpiece fof fcode fthat fautomatically fspreads ffrom fone
fcomputer fto fanother, fexploiting fa fcommon fvulnerability
, d. fYou fget fan femail ffrom fthe fIT fsupport fdesk fthat fasks fyou fto fsend fa freply
femail fwith fyour fusername fand fpassword fto fverify fyour faccount f- fcorrect fanswers-
d
Caesar fCipher fis fan folder fand fsince foutdated fencryption ftechnique fused fby fJulius
fCaesar fto f"hide" fmessages fhe fsent fto fhis ftroops. fUsing fCaesar fCipher, feach
fletter fin fthe falphabet fis ftranslated fto fa fletter fwith fthe fsame fgiven foffset ffrom fthe
foriginal fletter. fCharacters fthat fare fnot fA-Z fremain fas fis.
For fexample, fif fthe fmessage fis fHI fZOE fand fthe fshift fis f2, fthe fthe fencrypted
fmessage fis: fJK fBQG fsince fthe fletter f"J" fis ftwo fletters fafter f"H" fin fthe falphabet,
fand f"K" fis ftwo fletters fafter fthe f"I" fin fthe falphabet, fetc. fNotice fthat fsince fthe f"Z"
fis fat fthe fend fof fthe falphabet fand fthe fshift fis f2, fthe falgorithm fhas fto fwrap fback
faround fto fthe fbeginning fof fthe falphabet fso fthat f"Z" ftranslates fto f"B". fSuppose
fthat fyou fwant fto fencrypt fthe ffollowing fmessage: fREMAIN fHOME. fOf fthe
ffollowing, fwhich fwould fbe fa fpotential fencrypted fmessage fusing fCaesar fCipher?
a. fTGPBKP fJPQG
b. fSFNCKO fIPNF
c. fUHPDLQ fKRPH
d. fPFLBHO fINND f- fcorrect fanswers-c
Fill fin fthe fblank fof fthe ffollowing fstatement: f"______ fencryption fis fa fmethod fof
fencryption finvolving fone fkey ffor fboth fencryption fand fdecryption."
a. fSymmetric
b. fSSL
c. fAsymetric
d. fPublic fKey f- fcorrect fanswers-a
Ransomware fis fa frelatively fnew fform fof fattack fon fa fcomputer fsystem. fA
fransomware fattack fis fwhen fan findividual for fgroup fof findividuals ftargets fan
forganization's fserver fand fis fable fto fuse fa fsophisticated fform fof fenryption fto flock
fdown fthe forganization's ffiles. fEffectively, fthe forganization fcannot fgain faccess fto
ftheir fown fdata, fcausing fmajor fdisruptions. fThe fterm f"Ransomware" fcomes ffrom
fthe ffact fthat fthe forganization fis fasked ffor fmoney fin fexchange ffor fbeing fgranted
faccess fto ftheir ffiles.
Of fthe ffollowing, fwhich fis fthe fLEAST feffective fway ffor fan forganization fto fprotect
fagainst fRansomware?
a. fInstall fanti-virus fsoftware fon fits fservers.
b. fMake fsure fthat fits foperating fsystem fsoftware fupdates fare fimplemented fon fa
ffrequent fbasis.
c. fEducate fits femployees fabout fcybersecurity fconcerns fand fhow fto fproactively
faddress fthem.
d. fMake ffrequent fbackups fof fits fdata fand fstore fthe fbackups fonline fon fthe fsame
fserver fas fthe foriginal fdata. f- fcorrect fanswers-d
MIDTERM
Internet fusers fneed fto fbe fable fto ftransfer fprivate fdata fonline, flike fcredit fcard
fnumbers fand fsocial fsecurity fnumbers. fSome fcryptographic falgorithms fhelp fensure
fthis fsafety.
What fmakes fcryptographic falgorithms fsecure?
a. fThe falgorithms fused ffor fcryptography fare fa fsecret.
b. fThe falgorithms fused ffor fcryptography fhave fbeen fused ffor fsuch fa flong ftime
fthat fwe fthey fare fsecure.
c. fThe falgorithms fused ffor fcryptography fare fsolvable, fbut fthe fsolutions fare fkept
funder fa fsecure fgovernment fprotection fservice.
d. fThe falgorithms fused ffor fcryptography fare fbased fon fintractable f(or funsolvable)
fproblems, fmaking fthem fextremely fdifficult fto fbreak. f- fcorrect fanswers-d
Alice fposts fa fkey ffor fencrypting fthat fanyone fcan faccess. fBob fuses fthat fkey fto
fencrypt fa fmessage, fthen fsends fit fto fAlice. fWhen fAlice freceives fthe fmessage,
fshe fdecrypts fit fusing fa fprivate fkey.
What fkind fof fencryption fprocess fis fthis?
a. fVigenere fcipher
b. fSymmetric fencryption
c. fCertificate fauthority fprocess
d. fPublic fkey fencryption f- fcorrect fanswers-d
What fis fa fDistributed fDenial fof fService f(DDoS) fattack?
,a. fA fcoordinated feffort fby fa fgroup fto fsimultaneously fattempt fto fgain fentry fto
fforeign fgovernment's fservers for fsystems
b. fAn fattempt fto fcompromise fa fsingle ftarget fby fflooding fit fwith frequests ffrom
fmultiple fsystems. f
c. fAn fattempt fto fharass for fextort fall fcustomers fof fone for fmore fInternet fService
fProviders f(ISPs).
d. fAn feffort fby fnetwork fengineers fto ffocus fall fsystems fon fcatching fa fuser for
fcomputer fthat fhas fillegally fgained faccess. f- fcorrect fanswers-b
When fstoring fdata fdigitally, fwhether fthrough fcloud fcomputing for flocally, fthere fis
fan fincreased frisk fof ftheft fdue fto fthe frelative fease fof faccessing fthe finformation.
Which fof fthe ffollowing fis fNOT fan fexample fof fsecurity fand fprivacy fconcerns fthat
farise ffrom fstoring fdata fdigitally?
a. fA fmanager flooks fup fan femployee's fbirthday fin fthe fonline fcompany fdirectory fin
forder fto fplan fa fsurprise fbirthday fparty ffor fthem fat fthe foffice.
b. fAn finsurance fcompany fhas fa fbreach fin ftheir fserver fthat fwas faccessed fthrough
fstolen fuser fcredentials fand fmore fthan f80 fmillion frecords fwere fcompromised.
c. fA fcompany fpays ffor fa fDistributed fDenial fof fService f(DDoS) fattack fthat fshuts
fdown fa fcompetitors fwebsite ffor fan fextended fperiod fof ftime.
d. fA fcelebrity's fphone fis fremotely faccessed fand fphotos fare fdownloaded fand fsold
fto fa fmagazine fcompany. f- fcorrect fanswers-a
Not fall fuses fof fdata fare ffor fthe fgreater fgood. fOne fof fthe fways fthat fhackers fare
fable fto fabuse fthe fsystem fis fto finfiltrate fsystems fand fcollect flarge fdata-sets fthat
fthey fare fnot fsupposed fto fhave faccess fto. fThis fbegan fwith fphone fnumbers fand
faccess fto flong fdistance fcalling fand fhas ftransformed finto fa fcriminal fenvironment
fwhere fuser fidentities fare fbought fand fsold fon fthe fblack fmarket.
Why fmight fa fhacker fwant fto fextract fa fuser fprofile ffrom fan finnocent fsite fthat fhas
fnot ffinancial fconnections?
a. fSite fdata fusually fincludes fother fsites fvisited fin ftheir fsearch fhistory.
b. fUsers fmight fuse fsimilar fpasswords fon fother fsites.
c. fAll fsites fare fconnected fon fthe finternet.
d. fA fuser's fname fis fall fthat fis fneeded fto fbreach fa fbank. f- fcorrect fanswers-b
Which fof fthe ffollowing fscenarios fis fmost fcharacteristic fof fa fphishing fattack.
f
a. fYou fget fan funwanted femail ftrying fto fsell fyou fa flow fquality fproduct for fservice
fthat fseems f"fishy."
b. fYou faccidentally finstall fa fpiece fof fsoftware fthat fmonitors fyour factivity fto fsteal
fpersonal finformation flike fyour fpasswords, fdate fof fbirth, fsocial fsecurity fnumber,
fetc.
c. fYou faccidentally frun fa fpiece fof fcode fthat fautomatically fspreads ffrom fone
fcomputer fto fanother, fexploiting fa fcommon fvulnerability
, d. fYou fget fan femail ffrom fthe fIT fsupport fdesk fthat fasks fyou fto fsend fa freply
femail fwith fyour fusername fand fpassword fto fverify fyour faccount f- fcorrect fanswers-
d
Caesar fCipher fis fan folder fand fsince foutdated fencryption ftechnique fused fby fJulius
fCaesar fto f"hide" fmessages fhe fsent fto fhis ftroops. fUsing fCaesar fCipher, feach
fletter fin fthe falphabet fis ftranslated fto fa fletter fwith fthe fsame fgiven foffset ffrom fthe
foriginal fletter. fCharacters fthat fare fnot fA-Z fremain fas fis.
For fexample, fif fthe fmessage fis fHI fZOE fand fthe fshift fis f2, fthe fthe fencrypted
fmessage fis: fJK fBQG fsince fthe fletter f"J" fis ftwo fletters fafter f"H" fin fthe falphabet,
fand f"K" fis ftwo fletters fafter fthe f"I" fin fthe falphabet, fetc. fNotice fthat fsince fthe f"Z"
fis fat fthe fend fof fthe falphabet fand fthe fshift fis f2, fthe falgorithm fhas fto fwrap fback
faround fto fthe fbeginning fof fthe falphabet fso fthat f"Z" ftranslates fto f"B". fSuppose
fthat fyou fwant fto fencrypt fthe ffollowing fmessage: fREMAIN fHOME. fOf fthe
ffollowing, fwhich fwould fbe fa fpotential fencrypted fmessage fusing fCaesar fCipher?
a. fTGPBKP fJPQG
b. fSFNCKO fIPNF
c. fUHPDLQ fKRPH
d. fPFLBHO fINND f- fcorrect fanswers-c
Fill fin fthe fblank fof fthe ffollowing fstatement: f"______ fencryption fis fa fmethod fof
fencryption finvolving fone fkey ffor fboth fencryption fand fdecryption."
a. fSymmetric
b. fSSL
c. fAsymetric
d. fPublic fKey f- fcorrect fanswers-a
Ransomware fis fa frelatively fnew fform fof fattack fon fa fcomputer fsystem. fA
fransomware fattack fis fwhen fan findividual for fgroup fof findividuals ftargets fan
forganization's fserver fand fis fable fto fuse fa fsophisticated fform fof fenryption fto flock
fdown fthe forganization's ffiles. fEffectively, fthe forganization fcannot fgain faccess fto
ftheir fown fdata, fcausing fmajor fdisruptions. fThe fterm f"Ransomware" fcomes ffrom
fthe ffact fthat fthe forganization fis fasked ffor fmoney fin fexchange ffor fbeing fgranted
faccess fto ftheir ffiles.
Of fthe ffollowing, fwhich fis fthe fLEAST feffective fway ffor fan forganization fto fprotect
fagainst fRansomware?
a. fInstall fanti-virus fsoftware fon fits fservers.
b. fMake fsure fthat fits foperating fsystem fsoftware fupdates fare fimplemented fon fa
ffrequent fbasis.
c. fEducate fits femployees fabout fcybersecurity fconcerns fand fhow fto fproactively
faddress fthem.
d. fMake ffrequent fbackups fof fits fdata fand fstore fthe fbackups fonline fon fthe fsame
fserver fas fthe foriginal fdata. f- fcorrect fanswers-d