Cpsc 329 Exam Graded A+ 2025
Diffie-Hellman key exchange was the first example of what? - ANSWER-Public key
cryptography
What 3 things must security exhibit? - ANSWER-Confidentiality, Integrity, Availability
what does PIPEDA stand for? - ANSWER-Personal Information Protection and
Electronic Documents Act
What is Authorization? - ANSWER-Giving someone a level of access after they have
been verified.
What is Availability? - ANSWER-The system or data should always be there when you
need (or want) it
What is Confidentiality? - ANSWER-Access to systems or data should be limited to
authorized parties
what is Integrity? - ANSWER-Data should neither be intentionally tampered with nor
accidentally corrupted
What is privacy? - ANSWER-Privacy == "informational self-determination"
What is the Principle of adequate protection? - ANSWER-You should protect something
up too the value that it is worth.
What part of a system will a smart attack try to attack? - ANSWER-the weakest link
Diffie-Hellman key exchange was the first example of what? - ANSWER-Public key
cryptography
What 3 things must security exhibit? - ANSWER-Confidentiality, Integrity, Availability
what does PIPEDA stand for? - ANSWER-Personal Information Protection and
Electronic Documents Act
What is Authorization? - ANSWER-Giving someone a level of access after they have
been verified.
What is Availability? - ANSWER-The system or data should always be there when you
need (or want) it
What is Confidentiality? - ANSWER-Access to systems or data should be limited to
authorized parties
what is Integrity? - ANSWER-Data should neither be intentionally tampered with nor
accidentally corrupted
What is privacy? - ANSWER-Privacy == "informational self-determination"
What is the Principle of adequate protection? - ANSWER-You should protect something
up too the value that it is worth.
What part of a system will a smart attack try to attack? - ANSWER-the weakest link