AP COMPUTER SCIENCE PRINCIPLES
MIDTERM EXAM WITH VERIFIED
ANSWERS
Internet uusers uneed uto ube uable uto utransfer uprivate udata uonline, ulike ucredit ucard
unumbers uand usocial usecurity unumbers. uSome ucryptographic ualgorithms uhelp uensure
uthis usafety.
What umakes ucryptographic ualgorithms usecure?
a. uThe ualgorithms uused ufor ucryptography uare ua usecret.
b. uThe ualgorithms uused ufor ucryptography uhave ubeen uused ufor usuch ua ulong utime uthat
uwe uthey uare usecure.
c. uThe ualgorithms uused ufor ucryptography uare usolvable, ubut uthe usolutions uare ukept
uunder ua usecure ugovernment uprotection uservice.
d. uThe ualgorithms uused ufor ucryptography uare ubased uon uintractable u(or uunsolvable)
uproblems, umaking uthem uextremely udifficult uto ubreak. u- ucorrect uanswers-d
Alice uposts ua ukey ufor uencrypting uthat uanyone ucan uaccess. uBob uuses uthat ukey uto
uencrypt ua umessage, uthen usends uit uto uAlice. uWhen uAlice ureceives uthe umessage, ushe
udecrypts uit uusing ua uprivate ukey.
What ukind uof uencryption uprocess uis uthis?
a. uVigenere ucipher
b. uSymmetric uencryption
,c. uCertificate uauthority uprocess
d. uPublic ukey uencryption u- ucorrect uanswers-d
What uis ua uDistributed uDenial uof uService u(DDoS) uattack?
a. uA ucoordinated ueffort uby ua ugroup uto usimultaneously uattempt uto ugain uentry uto uforeign
ugovernment's uservers uor usystems
b. uAn uattempt uto ucompromise ua usingle utarget uby uflooding uit uwith urequests ufrom
umultiple usystems. u
c. uAn uattempt uto uharass uor uextort uall ucustomers uof uone uor umore uInternet uService
uProviders u(ISPs).
d. uAn ueffort uby unetwork uengineers uto ufocus uall usystems uon ucatching ua uuser uor
ucomputer uthat uhas uillegally ugained uaccess. u- ucorrect uanswers-b
When ustoring udata udigitally, uwhether uthrough ucloud ucomputing uor ulocally, uthere uis uan
uincreased urisk uof utheft udue uto uthe urelative uease uof uaccessing uthe uinformation.
Which uof uthe ufollowing uis uNOT uan uexample uof usecurity uand uprivacy uconcerns uthat
uarise ufrom ustoring udata udigitally?
a. uA umanager ulooks uup uan uemployee's ubirthday uin uthe uonline ucompany udirectory uin
uorder uto uplan ua usurprise ubirthday uparty ufor uthem uat uthe uoffice.
b. uAn uinsurance ucompany uhas ua ubreach uin utheir userver uthat uwas uaccessed uthrough
ustolen uuser ucredentials uand umore uthan u80 umillion urecords uwere ucompromised.
c. uA ucompany upays ufor ua uDistributed uDenial uof uService u(DDoS) uattack uthat ushuts
udown ua ucompetitors uwebsite ufor uan uextended uperiod uof utime.
d. uA ucelebrity's uphone uis uremotely uaccessed uand uphotos uare udownloaded uand usold uto
ua umagazine ucompany. u- ucorrect uanswers-a
Not uall uuses uof udata uare ufor uthe ugreater ugood. uOne uof uthe uways uthat uhackers uare
uable uto uabuse uthe usystem uis uto uinfiltrate usystems uand ucollect ularge udata-sets uthat
uthey uare unot usupposed uto uhave uaccess uto. uThis ubegan uwith uphone unumbers uand
uaccess uto ulong udistance ucalling uand uhas utransformed uinto ua ucriminal uenvironment
uwhere uuser uidentities uare ubought uand usold uon uthe ublack umarket.
Why umight ua uhacker uwant uto uextract ua uuser uprofile ufrom uan uinnocent usite uthat uhas unot
ufinancial uconnections?
a. uSite udata uusually uincludes uother usites uvisited uin utheir usearch uhistory.
b. uUsers umight uuse usimilar upasswords uon uother usites.
c. uAll usites uare uconnected uon uthe uinternet.
d. uA uuser's uname uis uall uthat uis uneeded uto ubreach ua ubank. u- ucorrect uanswers-b
Which uof uthe ufollowing uscenarios uis umost ucharacteristic uof ua uphishing uattack.
u
a. uYou uget uan uunwanted uemail utrying uto usell uyou ua ulow uquality uproduct uor uservice uthat
useems u"fishy."
, b. uYou uaccidentally uinstall ua upiece uof usoftware uthat umonitors uyour uactivity uto usteal
upersonal uinformation ulike uyour upasswords, udate uof ubirth, usocial usecurity unumber, uetc.
c. uYou uaccidentally urun ua upiece uof ucode uthat uautomatically uspreads ufrom uone
ucomputer uto uanother, uexploiting ua ucommon uvulnerability
d. uYou uget uan uemail ufrom uthe uIT usupport udesk uthat uasks uyou uto usend ua ureply uemail
uwith uyour uusername uand upassword uto uverify uyour uaccount u- ucorrect uanswers-d
Caesar uCipher uis uan uolder uand usince uoutdated uencryption utechnique uused uby uJulius
uCaesar uto u"hide" umessages uhe usent uto uhis utroops. uUsing uCaesar uCipher, ueach uletter
uin uthe ualphabet uis utranslated uto ua uletter uwith uthe usame ugiven uoffset ufrom uthe uoriginal
uletter. uCharacters uthat uare unot uA-Z uremain uas uis.
For uexample, uif uthe umessage uis uHI uZOE uand uthe ushift uis u2, uthe uthe uencrypted
umessage uis: uJK uBQG usince uthe uletter u"J" uis utwo uletters uafter u"H" uin uthe ualphabet, uand
u"K" uis utwo uletters uafter uthe u"I" uin uthe ualphabet, uetc. uNotice uthat usince uthe u"Z" uis uat uthe
uend uof uthe ualphabet uand uthe ushift uis u2, uthe ualgorithm uhas uto uwrap uback uaround uto
uthe ubeginning uof uthe ualphabet uso uthat u"Z" utranslates uto u"B". uSuppose uthat uyou uwant
uto uencrypt uthe ufollowing umessage: uREMAIN uHOME. uOf uthe ufollowing, uwhich uwould
ube ua upotential uencrypted umessage uusing uCaesar uCipher?
a. uTGPBKP uJPQG
b. uSFNCKO uIPNF
c. uUHPDLQ uKRPH
d. uPFLBHO uINND u- ucorrect uanswers-c
Fill uin uthe ublank uof uthe ufollowing ustatement: u"______ uencryption uis ua umethod uof
uencryption uinvolving uone ukey ufor uboth uencryption uand udecryption."
a. uSymmetric
b. uSSL
c. uAsymetric
d. uPublic uKey u- ucorrect uanswers-a
Ransomware uis ua urelatively unew uform uof uattack uon ua ucomputer usystem. uA
uransomware uattack uis uwhen uan uindividual uor ugroup uof uindividuals utargets uan
uorganization's userver uand uis uable uto uuse ua usophisticated uform uof uenryption uto ulock
udown uthe uorganization's ufiles. uEffectively, uthe uorganization ucannot ugain uaccess uto
utheir uown udata, ucausing umajor udisruptions. uThe uterm u"Ransomware" ucomes ufrom uthe
ufact uthat uthe uorganization uis uasked ufor umoney uin uexchange ufor ubeing ugranted uaccess
uto utheir ufiles.
Of uthe ufollowing, uwhich uis uthe uLEAST ueffective uway ufor uan uorganization uto uprotect
uagainst uRansomware?
a. uInstall uanti-virus usoftware uon uits uservers.
b. uMake usure uthat uits uoperating usystem usoftware uupdates uare uimplemented uon ua
ufrequent ubasis.
MIDTERM EXAM WITH VERIFIED
ANSWERS
Internet uusers uneed uto ube uable uto utransfer uprivate udata uonline, ulike ucredit ucard
unumbers uand usocial usecurity unumbers. uSome ucryptographic ualgorithms uhelp uensure
uthis usafety.
What umakes ucryptographic ualgorithms usecure?
a. uThe ualgorithms uused ufor ucryptography uare ua usecret.
b. uThe ualgorithms uused ufor ucryptography uhave ubeen uused ufor usuch ua ulong utime uthat
uwe uthey uare usecure.
c. uThe ualgorithms uused ufor ucryptography uare usolvable, ubut uthe usolutions uare ukept
uunder ua usecure ugovernment uprotection uservice.
d. uThe ualgorithms uused ufor ucryptography uare ubased uon uintractable u(or uunsolvable)
uproblems, umaking uthem uextremely udifficult uto ubreak. u- ucorrect uanswers-d
Alice uposts ua ukey ufor uencrypting uthat uanyone ucan uaccess. uBob uuses uthat ukey uto
uencrypt ua umessage, uthen usends uit uto uAlice. uWhen uAlice ureceives uthe umessage, ushe
udecrypts uit uusing ua uprivate ukey.
What ukind uof uencryption uprocess uis uthis?
a. uVigenere ucipher
b. uSymmetric uencryption
,c. uCertificate uauthority uprocess
d. uPublic ukey uencryption u- ucorrect uanswers-d
What uis ua uDistributed uDenial uof uService u(DDoS) uattack?
a. uA ucoordinated ueffort uby ua ugroup uto usimultaneously uattempt uto ugain uentry uto uforeign
ugovernment's uservers uor usystems
b. uAn uattempt uto ucompromise ua usingle utarget uby uflooding uit uwith urequests ufrom
umultiple usystems. u
c. uAn uattempt uto uharass uor uextort uall ucustomers uof uone uor umore uInternet uService
uProviders u(ISPs).
d. uAn ueffort uby unetwork uengineers uto ufocus uall usystems uon ucatching ua uuser uor
ucomputer uthat uhas uillegally ugained uaccess. u- ucorrect uanswers-b
When ustoring udata udigitally, uwhether uthrough ucloud ucomputing uor ulocally, uthere uis uan
uincreased urisk uof utheft udue uto uthe urelative uease uof uaccessing uthe uinformation.
Which uof uthe ufollowing uis uNOT uan uexample uof usecurity uand uprivacy uconcerns uthat
uarise ufrom ustoring udata udigitally?
a. uA umanager ulooks uup uan uemployee's ubirthday uin uthe uonline ucompany udirectory uin
uorder uto uplan ua usurprise ubirthday uparty ufor uthem uat uthe uoffice.
b. uAn uinsurance ucompany uhas ua ubreach uin utheir userver uthat uwas uaccessed uthrough
ustolen uuser ucredentials uand umore uthan u80 umillion urecords uwere ucompromised.
c. uA ucompany upays ufor ua uDistributed uDenial uof uService u(DDoS) uattack uthat ushuts
udown ua ucompetitors uwebsite ufor uan uextended uperiod uof utime.
d. uA ucelebrity's uphone uis uremotely uaccessed uand uphotos uare udownloaded uand usold uto
ua umagazine ucompany. u- ucorrect uanswers-a
Not uall uuses uof udata uare ufor uthe ugreater ugood. uOne uof uthe uways uthat uhackers uare
uable uto uabuse uthe usystem uis uto uinfiltrate usystems uand ucollect ularge udata-sets uthat
uthey uare unot usupposed uto uhave uaccess uto. uThis ubegan uwith uphone unumbers uand
uaccess uto ulong udistance ucalling uand uhas utransformed uinto ua ucriminal uenvironment
uwhere uuser uidentities uare ubought uand usold uon uthe ublack umarket.
Why umight ua uhacker uwant uto uextract ua uuser uprofile ufrom uan uinnocent usite uthat uhas unot
ufinancial uconnections?
a. uSite udata uusually uincludes uother usites uvisited uin utheir usearch uhistory.
b. uUsers umight uuse usimilar upasswords uon uother usites.
c. uAll usites uare uconnected uon uthe uinternet.
d. uA uuser's uname uis uall uthat uis uneeded uto ubreach ua ubank. u- ucorrect uanswers-b
Which uof uthe ufollowing uscenarios uis umost ucharacteristic uof ua uphishing uattack.
u
a. uYou uget uan uunwanted uemail utrying uto usell uyou ua ulow uquality uproduct uor uservice uthat
useems u"fishy."
, b. uYou uaccidentally uinstall ua upiece uof usoftware uthat umonitors uyour uactivity uto usteal
upersonal uinformation ulike uyour upasswords, udate uof ubirth, usocial usecurity unumber, uetc.
c. uYou uaccidentally urun ua upiece uof ucode uthat uautomatically uspreads ufrom uone
ucomputer uto uanother, uexploiting ua ucommon uvulnerability
d. uYou uget uan uemail ufrom uthe uIT usupport udesk uthat uasks uyou uto usend ua ureply uemail
uwith uyour uusername uand upassword uto uverify uyour uaccount u- ucorrect uanswers-d
Caesar uCipher uis uan uolder uand usince uoutdated uencryption utechnique uused uby uJulius
uCaesar uto u"hide" umessages uhe usent uto uhis utroops. uUsing uCaesar uCipher, ueach uletter
uin uthe ualphabet uis utranslated uto ua uletter uwith uthe usame ugiven uoffset ufrom uthe uoriginal
uletter. uCharacters uthat uare unot uA-Z uremain uas uis.
For uexample, uif uthe umessage uis uHI uZOE uand uthe ushift uis u2, uthe uthe uencrypted
umessage uis: uJK uBQG usince uthe uletter u"J" uis utwo uletters uafter u"H" uin uthe ualphabet, uand
u"K" uis utwo uletters uafter uthe u"I" uin uthe ualphabet, uetc. uNotice uthat usince uthe u"Z" uis uat uthe
uend uof uthe ualphabet uand uthe ushift uis u2, uthe ualgorithm uhas uto uwrap uback uaround uto
uthe ubeginning uof uthe ualphabet uso uthat u"Z" utranslates uto u"B". uSuppose uthat uyou uwant
uto uencrypt uthe ufollowing umessage: uREMAIN uHOME. uOf uthe ufollowing, uwhich uwould
ube ua upotential uencrypted umessage uusing uCaesar uCipher?
a. uTGPBKP uJPQG
b. uSFNCKO uIPNF
c. uUHPDLQ uKRPH
d. uPFLBHO uINND u- ucorrect uanswers-c
Fill uin uthe ublank uof uthe ufollowing ustatement: u"______ uencryption uis ua umethod uof
uencryption uinvolving uone ukey ufor uboth uencryption uand udecryption."
a. uSymmetric
b. uSSL
c. uAsymetric
d. uPublic uKey u- ucorrect uanswers-a
Ransomware uis ua urelatively unew uform uof uattack uon ua ucomputer usystem. uA
uransomware uattack uis uwhen uan uindividual uor ugroup uof uindividuals utargets uan
uorganization's userver uand uis uable uto uuse ua usophisticated uform uof uenryption uto ulock
udown uthe uorganization's ufiles. uEffectively, uthe uorganization ucannot ugain uaccess uto
utheir uown udata, ucausing umajor udisruptions. uThe uterm u"Ransomware" ucomes ufrom uthe
ufact uthat uthe uorganization uis uasked ufor umoney uin uexchange ufor ubeing ugranted uaccess
uto utheir ufiles.
Of uthe ufollowing, uwhich uis uthe uLEAST ueffective uway ufor uan uorganization uto uprotect
uagainst uRansomware?
a. uInstall uanti-virus usoftware uon uits uservers.
b. uMake usure uthat uits uoperating usystem usoftware uupdates uare uimplemented uon ua
ufrequent ubasis.