#ho1
Chapter 1 – Computer Systems Overview
TRUE/FALSE QUESTIONS:
T F 1. Threats are attacks carried out.
T F 2. Computer security is protection of the integrity, availability, and
confidentiality of information system resources.
T F 3. Data integrity assures that information and programs are changed only
in a specified and authorized manner.
T F 4. Availability assures that systems works promptly and service is not
denied to authorized users.
T F 5. The “A” in the CIA triad stands for “authenticity”.
T F 6. The more critical a component or service, the higher the level of
availability required.
T F 7. Computer security is essentially a battle of wits between a perpetrator
who tries to find holes and the administrator who tries to close them.
T F 8. Security mechanisms typically do not involve more than one particular
algorithm or protocol.
T F 9. Many security administrators view strong security as an impediment to
efficient and user-friendly operation of an information system.
T F 10. In the context of security our concern is with the vulnerabilities of
system resources.
T F 11. Hardware is the most vulnerable to attack and the least susceptible to
automated controls.
T F 12. Contingency planning is a functional area that primarily requires
computer security technical measures.
T F 13. X.800 architecture was developed as an international standard and
focuses on security in the context of networks and communications.
T F 14. The first step in devising security services and mechanisms is to
develop a security policy.
T F 15. Assurance is the process of examining a computer product or system
with respect to certain criteria.
SCHOLARVAULT
, Chapter
#ho1
MULTIPLE #hoCHOICE #hoQUESTIONS:
1. assures #hothat #hoindividuals #hocontrol #hoor #hoinfluence #howhat #hoinformation
#horelated #hoto #hothem #homay #hobe #hocollected #hoand #hostored #hoand #hoby #howhom #hoand #hoto
#howhom #hothat #hoinformation #homay #hobe #hodisclosed.
A. Availability B. # h o System #hoIntegrity
C. # h o Privacy D. # h o Data #hoIntegrity
2. assures #hothat #hoa #hosystem #hoperforms #hoits #hointended #hofunction #hoin #hoan
#hounimpaired #homanner, #hofree #hofrom #hodeliberate #hoor #hoinadvertent #hounauthorized
#homanipulation #hoof #hothe #hosystem.
A. System #hoIntegrity B. # h o Data #hoIntegrity
C. # h o Availability D. # h o Confidentiality
3. A #holoss #hoof is #hothe #hounauthorized #hodisclosure #hoof #hoinformation.
A. confidentiality B. # h o integrity
C. # h o authenticity D. # h o availability
4. A #ho level #hobreach #hoof #hosecurity #hocould #hobe #hoexpected #hoto #hohave #hoa
#hosevere #hoor #hocatastrophic #hoadverse #hoeffect #hoon #hoorganizational #hooperations,
#hoorganizational #hoassets, #hoor #hoindividuals.
A. low B. # h o normal
C. #homoderate D. # h o high
5. A #hoflaw #hoor #howeakness #hoin #hoa #hosystem’s #hodesign, #hoimplementation, #hoor
#hooperation #hoand #homanagement #hothat #hocould #hobe #hoexploited #hoto #hoviolate #hothe
#hosystem’s #hosecurity #hopolicy #hois #hoa(n) # h o .
A. countermeasure B. #hovulnerability
C. # h o adversary D. # h o risk
6. An #hoassault #hoon #hosystem #hosecurity #hothat #hoderives #hofrom #hoan #hointelligent #hoact
#hothat #hois #hoa #hodeliberate #hoattempt #hoto #hoevade #hosecurity #hoservices #hoand #hoviolate
#hothe #hosecurity #hopolicy #hoof #hoa #hosystem #hois #hoa(n) #ho .
A. risk B. # h o asset
C. # h o attack D. # h o vulnerability
SCHOLARVAULT
, Chapter
#ho1
7. A(n) #ho is #hoan #hoaction, #hodevice, #hoprocedure, #hoor #hotechnique #hothat
#horeduces #hoa #hothreat, #hoa #hovulnerability, #hoor #hoan #hoattack #hoby #hoeliminating #hoor
#hopreventing #hoit, #hoby #hominimizing #hothe #hoharm #hoit #hocan #hocause, #hoor #hoby
#hodiscovering #hoand #horeporting #hoit #hoso #hothat #hocorrect #hoaction #hocan #hobe #hotaken.
A. attack B. # h o countermeasure
C. # h o adversary D. # h o protocol
8. A(n) #ho is #hoan #hoattempt #hoto #holearn #hoor #homake #house #hoof #hoinformation #hofrom
#hothe #hosystem #hothat #hodoes #honot #hoaffect #hosystem #horesources.
A. passive #hoattack B. #hoinside #hoattack
C. # h o outside #hoattack D. # h o active #hoattack
9. Masquerade, #hofalsification, #hoand #horepudiation #hoare #hothreat #hoactions #hothat #hocause
threat #hoconsequences.
A. unauthorized #hodisclosure B. # h o deception
C. # h o disruption D. # h o usurpation
10. A # h o threat #hoaction #hoin #howhich #hosensitive #hodata #hoare #hodirectly #horeleased #hoto #hoan
#hounauthorized #hoentity #hois #ho .
A. corruption B. # h o disruption
C. # h o intrusion D. # h o exposure
11. An # h o example #hoof #ho is #hoan #hoattempt #hoby #hoan #hounauthorized #houser #hoto
#hogain #hoaccess #hoto #hoa #hosystem #hoby #hoposing #hoas #hoan #hoauthorized #houser.
A. masquerade B. # h o interception
C. # h o repudiation D. # h o inference
12. The # h o prevents #hoor #hoinhibits #hothe #honormal #house #hoor
#homanagement #hoof #hocommunications #hofacilities.
A. passive #hoattack B. # h o traffic #hoencryption
C. # h o denial #hoof #hoservice D. # h o masquerade
13. A # h o is #hoany #hoaction #hothat #hocompromises #hothe #hosecurity #hoof
#hoinformation #hoowned #hoby #hoan #hoorganization.
A. security #homechanism B. # h o security #hoattack
C. # h o security #hopolicy D. # h o security #hoservice
SCHOLARVAULT
, Chapter
#ho1
14. The # h o assurance #hothat #hodata #horeceived #hoare #hoexactly #hoas #hosent #hoby
#hoan #hoauthorized #hoentity #hois #ho .
A. authentication B. # h o data #hoconfidentiality
C. # h o access #hocontrol D. # h o data #hointegrity
15. #ho is #hothe #hoinsertion #hoof #hobits #hointo #hogaps #hoin #hoa #hodata #hostream #hoto
frustrate #hotraffic #hoanalysis #hoattempts.
#ho
A. Traffic #hopadding B. # h o Traffic #horouting
C. # h o Traffic #hocontrol D. # h o Traffic #hointegrity
SHORT #hoANSWER #hoQUESTIONS:
1. is #hothe #hoprotection #hoafforded #hoto #hoan #hoautomated #hoinformation #hosystem
#hoin #hoorder #hoto #hoattain #hothe #hoapplicable #hoobjectives #hoof #hopreserving #hothe #hointegrity,
#hoavailability, #hoand #hoconfidentiality #hoof #hoinformation #hosystem #horesources.
2. Confidentiality, #hoIntegrity, #hoand #hoAvailability #hoform #howhat #hois #hooften #horeferred #hoto #hoas #hothe
#ho .
3. A #holoss #hoof #ho is #hothe #hodisruption #hoof #hoaccess #hoto #hoor #house #hoof
#hoinformation #hoor #hoan #hoinformation #hosystem.
4. In #hothe #hoUnited #hoStates, #hostudent #hograde #hoinformation #hois #hoan #hoasset #howhose
#hoconfidentiality #hois #horegulated #hoby #hothe #ho .
5. A(n) #ho is #hoa #hothreat #hothat #hois #hocarried #hoout #hoand, #hoif #hosuccessful, #holeads #hoto
#hoan #houndesirable #hoviolation #hoof #hosecurity, #hoor #hothreat #hoconsequence.
6. A(n) #ho is #hoany #homeans #hotaken #hoto #hodeal #howith #hoa #hosecurity #hoattack.
7. Misappropriation #hoand #homisuse #hoare #hoattacks #hothat #horesult #hoin #ho threat #hoconsequences.
8. The #hoassets #hoof #hoa #hocomputer #hosystem #hocan #hobe #hocategorized #hoas
#hohardware, #hosoftware, #hocommunication #holines #hoand #honetworks, #hoand #ho .
9. Release #hoof #homessage #hocontents #hoand #hotraffic #hoanalysis #hoare #hotwo #hotypes #hoof #ho attacks.
10. Replay, #homasquerade, #homodification #hoof #homessages, #hoand #hodenial #hoof #hoservice #hoare
#hoexample #hoof
attacks.
11. Establishing, #homaintaining, #hoand #hoimplementing #hoplans #hofor #hoemergency #horesponse,
#hobackup #hooperations, #hoand #hopost #hodisaster #horecovery #hofor #hoorganizational #hoinformation
#hosystems #hoto #hoensure #hothe #hoavailability #hoof #hocritical #hoinformation #horesources #hoand
#hocontinuity #hoof #hooperations #hoin #hoemergency #hosituations #hois #hoa #ho plan.
SCHOLARVAULT