Answers | 2025 Update | 100% Correct.
Due Apr 16 at 8am
Points 250
Questions 50
Available until Apr 16 at 8am
Time Limit 120 Minutes
Instructions
This exam covers all readings, videos, referenced documents, websites, and course materials
covered during Weeks 3, 4, and 5 (Chapters 7-11 of text book). The focus of the (50) questions
come from the text book and the Lecture notes. Please complete your review of these materials
before attempting the Mid-Term Exam.
Instructions
This exam may contain; multiple choice, true/false, and fill-in-the-blank questions.
There is a time limit of 120 minutes for the quiz.
Please plan to finish the quiz in one session, you cannot save and come back to the quiz once you
have started it.
This is an individual assignment. Let me remind you of Webster's Academic Integrity statement:
Webster University is committed to academic excellence. As part of our Statement of Ethics, we
strive to preserve academic honor and integrity by repudiating all forms of academic and intellectual
dishonesty, including cheating, plagiarism and all other forms of academic dishonesty. Academic
dishonesty is unacceptable and is subject to a disciplinary response.
Quiz Type
Graded Quiz
This quiz is no longer available as the course has been concluded.
Attempt History
, Attempt Time Score
LATEST Attempt 1 114 minutes 210 out of 250
Score for this quiz: 210 out of 250
Submitted Apr 15 at 5:51pm
This attempt took 114 minutes.
Question 1
pts
A TCB is defined as:
A malicious program that travels via the Internet
Correct!
A mechanism for enforcing minimal security
Correct!
A protocol for ensuring authentic users
An example of an Internet threat
The Country’s Best yogurt
Question 2
pts
The strength of an encryption algorithm is measured by:
The algorithm
The secrecy of its algorithm
FIPS compliance
Correct!
The number of bits in its keys
Correct!
The AES standard
Question 3
pts
, What sets Web 2.0 apart from Web 1.0?
1.0 was not secure
1.0 was too slow
2.0 started with social networks
Correct!
2.0 is two-way
Correct!
2.0 uses IPv6
Question 4
pts
Which one of the following is an old method of breaking into a computer:
War driving
SOS
Correct!
War dialing
Correct!
SIS
SOB
Question 5
pts
The heart of user authentication is a server called:
Correct!
LDAP server
Correct!
Certificate authority
HTTPS/SSL
Email server
RSA encryption