100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Security: Principles and Practice Midterm Exam Review Questions With Complete Solutions 100% Verified Newest 2025/2026

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
27-10-2025
Written in
2025/2026

Computer Security: Principles and Practice Midterm Exam Review Questions With Complete Solutions 100% Verified Newest 2025/2026

Institution
Computer Security
Course
Computer Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security
Course
Computer Security

Document information

Uploaded on
October 27, 2025
Number of pages
34
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security:
Principles and Practice
Midterm Review Exam
1. What is computer security?
Answer:
Computer security is the protection of information systems from theft, damage,
disruption, or unauthorized access while maintaining confidentiality, integrity, and
availability (CIA triad).


2. What are the three primary security objectives?


Answer:


Confidentiality – Prevent unauthorized disclosure of data.


Integrity – Ensure data accuracy and completeness.


Availability – Ensure systems and data are accessible when needed.


3. What is the difference between a threat, vulnerability, and attack?


Answer:


Threat: A potential cause of an unwanted event.

,Vulnerability: A weakness that could be exploited by a threat.


Attack: An action that exploits a vulnerability to cause harm.


4. What are the main types of security attacks?


Answer:


Passive attacks: Eavesdropping or monitoring (e.g., traffic analysis, sniffing).


Active attacks: Altering or disrupting data (e.g., modification, denial of service).


5. What is risk management in security?


Answer:
The process of identifying, assessing, and mitigating risks to acceptable levels using
risk analysis, control selection, and continuous monitoring.


🔒 Section 2: Cryptography
6. What is the difference between symmetric and asymmetric encryption?


Answer:


Symmetric: Same key for encryption and decryption (e.g., AES, DES).


Asymmetric: Different keys for encryption and decryption (e.g., RSA, ECC).


7. What are the key components of a symmetric encryption system?


Answer:


Plaintext

,Encryption algorithm


Secret key


Ciphertext


Decryption algorithm


8. What is the purpose of a hash function?


Answer:
To produce a fixed-size digest from variable-length input data, ensuring data
integrity (e.g., SHA-256).


9. What is a digital signature?


Answer:
A cryptographic mechanism that authenticates the sender and ensures message
integrity and non-repudiation using a private key.


10. What is a Public Key Infrastructure (PKI)?


Answer:
A system of hardware, software, and policies used to manage digital certificates and
public-key encryption.


🧱 Section 3: Access Control and Authentication
11. What are the main types of authentication factors?


Answer:

, Something you know (password, PIN)


Something you have (token, smart card)


Something you are (biometrics)


12. What is the difference between DAC, MAC, and RBAC?


Answer:


DAC (Discretionary Access Control): Owner controls access.


MAC (Mandatory Access Control): Access based on system-enforced policies.


RBAC (Role-Based Access Control): Access based on user roles.


13. What is multifactor authentication and why is it important?


Answer:
Combining two or more authentication factors to strengthen security and reduce
unauthorized access.


14. What are the main components of an access control system?


Answer:


Subjects – Active entities (users/processes)


Objects – Resources (files, databases)


Access rights – Permissions

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Alvon Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
58
Member since
4 year
Number of followers
20
Documents
824
Last sold
6 days ago
NURSING IS THE BEST

In This store You Find All Your Exammates In Handy............

4.2

5 reviews

5
2
4
2
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions