100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Security Principles | Questions With Complete Solutions 100% Verified Newest 2025

Rating
-
Sold
-
Pages
8
Grade
A
Uploaded on
24-01-2025
Written in
2024/2025

Exam of 8 pages for the course Computer Security at Computer Security (With Comp)

Institution
Computer Security
Course
Computer Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security
Course
Computer Security

Document information

Uploaded on
January 24, 2025
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security Principles | Questions With
Complete Solutions 100% Verified Newest 2025
Which threats are characterized by possibly long periods of preparation (years is not
uncommon), tremendous financial backing, a large and organized group of attackers,
and attempts to subvert insiders or to plant individuals inside a potential target in
advance of a planned attack? - ANSWER Structured threats


In which of the following is an attacker looking for any organization vulnerable to a
specific exploit rather than attempting to gain access to a specific organization? -
ANSWER Target of opportunity attack


The rise of which of the following has greatly increased the number of individuals who
probe organizations looking for vulnerabilities to exploit? - ANSWER Script kiddies


For what reason(s) do some security professionals consider insiders more dangerous
than outside intruders? - ANSWER Both B and C


B. Insiders have the access and knowledge necessary to cause immediate damage to the
organization.


C. Insiders have knowledge of the security systems in place and are better able to avoid
detection.


The act of deliberately accessing computer systems and networks without authorization
is generally known as - ANSWER Hacking


What is the most common problem/threat an organization faces? - ANSWER
Viruses/worms

, Warfare conducted against the information and information processing equipment used
by an adversary is known as: - ANSWER Information warfare


An attacker who feels that using animals to make fur coats is unethical and thus defaces
the web site of a company that sells fur coats is an example of: - ANSWER Hacktivisim


Criminal organizations would normally be classified as what type of threat? - ANSWER
Structured


Which of the following individuals have the ability to not only write scripts that exploit
vulnerabilities but also discover new vulnerabilities? - ANSWER Elite hackers


Which of the following is not a principle of security? - ANSWER Principle of efficient
access


The CIA of security includes: - ANSWER Confidentiality, integrity, availability


The security principle used in the Bell-LaPadula security model that states that no
subject can read from an object with a higher security classification is the: - ANSWER
Simple Security Rule


Which of the following concepts requires users and system processes to use the minimal
amount of permission necessary to function? - ANSWER Least privilege


Which security model separates users based on conflict-of-interest issues? - ANSWER
Brewer-Nash

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUINTER New York College Of Dentistry
View profile
Follow You need to be logged in order to follow users or courses
Sold
339
Member since
2 year
Number of followers
104
Documents
38211
Last sold
1 day ago

3.4

57 reviews

5
25
4
8
3
7
2
1
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions