Security in Computing, 6th Edition
by Charles Pfleeger
Complete Chapter Test Bank
are included (Ch 1 to 13)
** Immediate Download
** Swift Response
** All Chapters included
,Table of Contents are given below
Chapter 1: Introduction
Chapter 2: Toolbox: Authentication,
Access Control, and Cryptography
Chapter 3: Programs and Programming
Chapter 4: The Internet--User Side
Chapter 5: Operating Systems
Chapter 6: Networks
Chapter 7: Data and Databases
Chapter 8: New Territory
Chapter 9: Privacy
Chapter 10: Management and Incidents
Chapter 11: Legal Issues and Ethics
Chapter 12: Details of Cryptography
Chapter 13: Emerging Topics
,The test bank is organized in reverse order, with the last chapter displayed first, to
ensure that all chapters are included in this document. (Complete Chapters
included Ch13-1)
Chapter 13 (Emerging Topics)
93. Which encryption algorithm underpins Bitcoin cryptography?
A) AES
B) RSA
C) SHA-256
D) MD5
Answer: C) SHA-256
Explanation: Bitcoin cryptography is underpinned by the SHA-256 algorithm. This
algorithm is used to secure transactions and ensure the integrity of the blockchain.
94. What is the main controversy surrounding the concept of cyberwarfare?
A) Its definition and differentiation from cybercrime and cyberterrorism.
B) The lack of effective encryption algorithms.
C) The involvement of government agencies.
D) Its impact on traditional financial systems.
Answer: A) Its definition and differentiation from cybercrime and cyberterrorism.
Explanation: The main controversy surrounding cyberwarfare is its definition and
differentiation from other cyber activities such as cybercrime and cyberterrorism. There is
an ongoing debate about what constitutes an act of cyberwar and how it differs from other
forms of cyber threats. Different experts have varying views on this matter.
95. Which of the following statements is true about natural language processing
(NLP) in AI-driven security management?
A) NLP helps computers understand and interpret human language, making it useful for
analyzing unstructured data sets.
B) NLP enables AI to detect denial-of-service attempts and predict future cybersecurity
events.
C) NLP is primarily used for clustering and identifying patterns in smart meter usage.
, D) NLP plays a crucial role in regulating AI tools and ensuring their intended use.
Answer: A) NLP helps computers understand and interpret human language, making it
useful for analyzing unstructured data sets.
Explanation: NLP is an important technique in AI-driven security management, allowing
computers to understand and interpret human language, particularly when analyzing
unstructured data sets.
96. What is a potential concern regarding AI-driven cybersecurity management?
A) The lack of available security resources
B) The high cost of implementing AI technologies
C) The quality of decisions made from pattern recognition
D) The limited diversity in the student body
Answer: C) The quality of decisions made from pattern recognition
Explanation: There are concerns about the quality of decisions made from pattern
recognition in AI-driven cybersecurity management. The biases inherent in AI systems and
the perpetuation of those biases through learning algorithms raise questions about the
reliability and fairness of the decisions made by such systems.
97. Which type of attack involves supplying malicious or incorrectly labeled data
during the training phase to manipulate the model's predictions?
A) Poisoning attack
B) Evasion attack
C) Model stealing attack
D) Adversarial AI attack
Answer: A) Poisoning attack
Explanation: A poisoning attack involves supplying malicious or incorrectly labeled data
during the training phase of an AI model. This attack aims to manipulate the model's
predictions by training it on misleading data. The attacker aims to make the model learn
incorrect patterns, leading to inaccurate and potentially harmful decisions or outcomes.
98. What is a blockchain?
A) A digital ledger currency implemented using cryptography.
B) A string of records linked cryptographically.
C) A decentralized peer-to-peer payment system.
D) Shared, immutable ledgers for recording transactions and building trust.
Answer: D) Shared, immutable ledgers for recording transactions and building trust.