Computer Security Principles | Questions With
Complete Solutions 100% Verified Newest 2025
Which threats are characterized by possibly long periods of preparation (years is not
uncommon), tremendous financial backing, a large and organized group of attackers,
and attempts to subvert insiders or to plant individuals inside a potential target in
advance of a planned attack? - ANSWER Structured threats
In which of the following is an attacker looking for any organization vulnerable to a
specific exploit rather than attempting to gain access to a specific organization? -
ANSWER Target of opportunity attack
The rise of which of the following has greatly increased the number of individuals who
probe organizations looking for vulnerabilities to exploit? - ANSWER Script kiddies
For what reason(s) do some security professionals consider insiders more dangerous
than outside intruders? - ANSWER Both B and C
B. Insiders have the access and knowledge necessary to cause immediate damage to the
organization.
C. Insiders have knowledge of the security systems in place and are better able to avoid
detection.
The act of deliberately accessing computer systems and networks without authorization
is generally known as - ANSWER Hacking
What is the most common problem/threat an organization faces? - ANSWER
Viruses/worms
, Warfare conducted against the information and information processing equipment used
by an adversary is known as: - ANSWER Information warfare
An attacker who feels that using animals to make fur coats is unethical and thus defaces
the web site of a company that sells fur coats is an example of: - ANSWER Hacktivisim
Criminal organizations would normally be classified as what type of threat? - ANSWER
Structured
Which of the following individuals have the ability to not only write scripts that exploit
vulnerabilities but also discover new vulnerabilities? - ANSWER Elite hackers
Which of the following is not a principle of security? - ANSWER Principle of efficient
access
The CIA of security includes: - ANSWER Confidentiality, integrity, availability
The security principle used in the Bell-LaPadula security model that states that no
subject can read from an object with a higher security classification is the: - ANSWER
Simple Security Rule
Which of the following concepts requires users and system processes to use the minimal
amount of permission necessary to function? - ANSWER Least privilege
Which security model separates users based on conflict-of-interest issues? - ANSWER
Brewer-Nash
Complete Solutions 100% Verified Newest 2025
Which threats are characterized by possibly long periods of preparation (years is not
uncommon), tremendous financial backing, a large and organized group of attackers,
and attempts to subvert insiders or to plant individuals inside a potential target in
advance of a planned attack? - ANSWER Structured threats
In which of the following is an attacker looking for any organization vulnerable to a
specific exploit rather than attempting to gain access to a specific organization? -
ANSWER Target of opportunity attack
The rise of which of the following has greatly increased the number of individuals who
probe organizations looking for vulnerabilities to exploit? - ANSWER Script kiddies
For what reason(s) do some security professionals consider insiders more dangerous
than outside intruders? - ANSWER Both B and C
B. Insiders have the access and knowledge necessary to cause immediate damage to the
organization.
C. Insiders have knowledge of the security systems in place and are better able to avoid
detection.
The act of deliberately accessing computer systems and networks without authorization
is generally known as - ANSWER Hacking
What is the most common problem/threat an organization faces? - ANSWER
Viruses/worms
, Warfare conducted against the information and information processing equipment used
by an adversary is known as: - ANSWER Information warfare
An attacker who feels that using animals to make fur coats is unethical and thus defaces
the web site of a company that sells fur coats is an example of: - ANSWER Hacktivisim
Criminal organizations would normally be classified as what type of threat? - ANSWER
Structured
Which of the following individuals have the ability to not only write scripts that exploit
vulnerabilities but also discover new vulnerabilities? - ANSWER Elite hackers
Which of the following is not a principle of security? - ANSWER Principle of efficient
access
The CIA of security includes: - ANSWER Confidentiality, integrity, availability
The security principle used in the Bell-LaPadula security model that states that no
subject can read from an object with a higher security classification is the: - ANSWER
Simple Security Rule
Which of the following concepts requires users and system processes to use the minimal
amount of permission necessary to function? - ANSWER Least privilege
Which security model separates users based on conflict-of-interest issues? - ANSWER
Brewer-Nash