100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Computer Security: Principles and Practice Midterm Exam Review Questions With Complete Solutions 100% Verified Newest 2025/2026

Puntuación
-
Vendido
-
Páginas
34
Grado
A+
Subido en
27-10-2025
Escrito en
2025/2026

Computer Security: Principles and Practice Midterm Exam Review Questions With Complete Solutions 100% Verified Newest 2025/2026

Institución
Computer Security
Grado
Computer Security











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Computer Security
Grado
Computer Security

Información del documento

Subido en
27 de octubre de 2025
Número de páginas
34
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Computer Security:
Principles and Practice
Midterm Review Exam
1. What is computer security?
Answer:
Computer security is the protection of information systems from theft, damage,
disruption, or unauthorized access while maintaining confidentiality, integrity, and
availability (CIA triad).


2. What are the three primary security objectives?


Answer:


Confidentiality – Prevent unauthorized disclosure of data.


Integrity – Ensure data accuracy and completeness.


Availability – Ensure systems and data are accessible when needed.


3. What is the difference between a threat, vulnerability, and attack?


Answer:


Threat: A potential cause of an unwanted event.

,Vulnerability: A weakness that could be exploited by a threat.


Attack: An action that exploits a vulnerability to cause harm.


4. What are the main types of security attacks?


Answer:


Passive attacks: Eavesdropping or monitoring (e.g., traffic analysis, sniffing).


Active attacks: Altering or disrupting data (e.g., modification, denial of service).


5. What is risk management in security?


Answer:
The process of identifying, assessing, and mitigating risks to acceptable levels using
risk analysis, control selection, and continuous monitoring.


🔒 Section 2: Cryptography
6. What is the difference between symmetric and asymmetric encryption?


Answer:


Symmetric: Same key for encryption and decryption (e.g., AES, DES).


Asymmetric: Different keys for encryption and decryption (e.g., RSA, ECC).


7. What are the key components of a symmetric encryption system?


Answer:


Plaintext

,Encryption algorithm


Secret key


Ciphertext


Decryption algorithm


8. What is the purpose of a hash function?


Answer:
To produce a fixed-size digest from variable-length input data, ensuring data
integrity (e.g., SHA-256).


9. What is a digital signature?


Answer:
A cryptographic mechanism that authenticates the sender and ensures message
integrity and non-repudiation using a private key.


10. What is a Public Key Infrastructure (PKI)?


Answer:
A system of hardware, software, and policies used to manage digital certificates and
public-key encryption.


🧱 Section 3: Access Control and Authentication
11. What are the main types of authentication factors?


Answer:

, Something you know (password, PIN)


Something you have (token, smart card)


Something you are (biometrics)


12. What is the difference between DAC, MAC, and RBAC?


Answer:


DAC (Discretionary Access Control): Owner controls access.


MAC (Mandatory Access Control): Access based on system-enforced policies.


RBAC (Role-Based Access Control): Access based on user roles.


13. What is multifactor authentication and why is it important?


Answer:
Combining two or more authentication factors to strengthen security and reduce
unauthorized access.


14. What are the main components of an access control system?


Answer:


Subjects – Active entities (users/processes)


Objects – Resources (files, databases)


Access rights – Permissions
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Alvon Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
58
Miembro desde
4 año
Número de seguidores
20
Documentos
824
Última venta
6 días hace
NURSING IS THE BEST

In This store You Find All Your Exammates In Handy............

4.2

5 reseñas

5
2
4
2
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes