CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Which of the following descriptions refers to administrative
controls? -
correct answer ✅Management actions, written policies,
procedures, guidelines, regulations, laws, or rules of any kind
What name is given to the assurance that requested information is
available to authorized users upon request? -
correct answer ✅Availability
Which of the following refers to the assurance that information can
be accessed and viewed only by authorized users? -
correct answer ✅Confidentiality
What name is given to a security strategy that relies on multiple
layers of security that require attackers to defeat multiple controls
to access any protected resource? -
correct answer ✅Defense in depth
Technical controls are also referred to as: -
correct answer ✅logical controls.
,CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Controls (such as locked doors, firewall rules, and user passwords)
that stop an action before it occurs are referred to as: -
correct answer ✅preventive controls.
A device or process (such as user authentication, antivirus software,
and firewalls) that limits access to a resource is referred to as a: -
correct answer ✅technical control.
An attacker is any person or program that attempts to interact with
a computer information system in an unauthorized manner. -
correct answer ✅True
A computer environment is also referred to as IT Infrastructure. -
correct answer ✅True
The term defense in depth refers to a security strategy that relies
on multiple layers of security that require attackers to defeat
multiple controls to access any protected resource. -
correct answer ✅True
, CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Windows stores access rules, or permissions, for resources (objects)
in: -
correct answer ✅access control lists.
The collection of all possible vulnerabilities that could provide
unauthorized access to computer resources is called the: -
correct answer ✅attack surface.
Which of the following refers to a level of sensitivity (such as top
secret, secret, confidential, restricted, or unclassified) assigned to
an object by its owner? -
correct answer ✅Classification
An access control method based on an object's owner and
permissions granted by the owner is referred to as: -
correct answer ✅discretionary access control (DAC).
Which of the following terms is used to describe providing
credentials that claim a specific identity, such as a user name? -
correct answer ✅Authentication
With 100% Verified Answers
Which of the following descriptions refers to administrative
controls? -
correct answer ✅Management actions, written policies,
procedures, guidelines, regulations, laws, or rules of any kind
What name is given to the assurance that requested information is
available to authorized users upon request? -
correct answer ✅Availability
Which of the following refers to the assurance that information can
be accessed and viewed only by authorized users? -
correct answer ✅Confidentiality
What name is given to a security strategy that relies on multiple
layers of security that require attackers to defeat multiple controls
to access any protected resource? -
correct answer ✅Defense in depth
Technical controls are also referred to as: -
correct answer ✅logical controls.
,CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Controls (such as locked doors, firewall rules, and user passwords)
that stop an action before it occurs are referred to as: -
correct answer ✅preventive controls.
A device or process (such as user authentication, antivirus software,
and firewalls) that limits access to a resource is referred to as a: -
correct answer ✅technical control.
An attacker is any person or program that attempts to interact with
a computer information system in an unauthorized manner. -
correct answer ✅True
A computer environment is also referred to as IT Infrastructure. -
correct answer ✅True
The term defense in depth refers to a security strategy that relies
on multiple layers of security that require attackers to defeat
multiple controls to access any protected resource. -
correct answer ✅True
, CSCI 4612 Midterm Exam Questions
With 100% Verified Answers
Windows stores access rules, or permissions, for resources (objects)
in: -
correct answer ✅access control lists.
The collection of all possible vulnerabilities that could provide
unauthorized access to computer resources is called the: -
correct answer ✅attack surface.
Which of the following refers to a level of sensitivity (such as top
secret, secret, confidential, restricted, or unclassified) assigned to
an object by its owner? -
correct answer ✅Classification
An access control method based on an object's owner and
permissions granted by the owner is referred to as: -
correct answer ✅discretionary access control (DAC).
Which of the following terms is used to describe providing
credentials that claim a specific identity, such as a user name? -
correct answer ✅Authentication