

Computer Security
Exam Answer Key
Course Introduction
Computer Security explores the principles and practices essential to protecting information systems from unauthorized access, vulnerabilities, and cyberattacks. The course covers foundational topics such as cryptography, authentication, access control, network security, malware, and software vulnerabilities. Students will learn about risk assessment, security policies, and defenses against real-world threats. Through theoretical and hands-on approaches, this course equips students with the skills to implement security measures, analyze system security, and respond to emerging security challenges in modern computing environments.
Recommended Textbook
Corporate Computer Security 4th Edition by
Randy J. Boyle
Available Study Resources on Quizplus
11 Chapters
1198 Verified Questions
1198 Flashcards
Source URL: https://quizplus.com/study-set/1400

Page 2
Chapter 1: The Threat Environment
Available Study Resources on Quizplus for this Chatper
103 Verified Questions
103 Flashcards
Source URL: https://quizplus.com/quiz/27878
Sample Questions
Q1) Downloading pornography can lead to sexual harassment lawsuits.
A)True
B)False Answer: True
Q2) ________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer.)
A) Social engineering
B) Spam
C) E-mail attachment
D) Mobile code Answer: A
Q3) Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.

Page 3
Chapter 2: Planning and Policy
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/27880
Sample Questions
Q1) The ISO/IEC 2700 family focuses on ________.
A) corporate governance
B) IT governance
C) IT security governance
D) All of the above about equally
Answer: C
Q2) To outsource some security functions, a firm can use an MISP.
A)True
B)False
Answer: False
Q3) The owner can delegate ________ to the trustee.
A) the work of implementation of a resource or control
B) accountability for a resource or control
C) Both A and B
D) Neither A nor B
Answer: A
Q4) The goal of IT security is reasonable risk reduction.
A)True
B)False
Answer: True

Page 4
To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Cryptography
Available Study Resources on Quizplus for this Chatper
122 Verified Questions
122 Flashcards
Source URL: https://quizplus.com/quiz/27881
Sample Questions
Q1) In public key encryption for authentication, the receiver decrypts with the public key of the sender.
A)True
B)False
Answer: False
Q2) In order to be considered strong today, a symmetric encryption key must be at least ________ bits long.
A) 6
B) 8
C) 100
D) 1,000
Answer: C
Q3) ________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer.
A) Cryptography
B) Encryption
C) Authentication
D) Confidentiality
Answer: A
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Secure Networks
Available Study Resources on Quizplus for this Chatper
119 Verified Questions
119 Flashcards
Source URL: https://quizplus.com/quiz/27882
Sample Questions
Q1) Some writers prefer to turn off SSID broadcasting.
A)True
B)False
Q2) In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim.
A)True
B)False
Q3) The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack.
A)True
B)False
Q4) A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Q5) The 802.11 standards were developed by the IEEE 802.11 Working Group.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Access Control
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/27883
Sample Questions
Q1) When assigning initial permissions, it is good to add more permissions than strictly necessary and then remove permissions if appropriate.
A)True
B)False
Q2) The verifier itself determines the identity of the supplicant in ________.
A) verification
B) identification
C) Both A and B
D) Neither A nor B
Q3) ________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
A) Authorizations
B) Authentication
C) Accuracy
D) Auditing
Q4) For watch lists of criminals, a false acceptance is worse than a false rejection from a security viewpoint.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Firewalls
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/27884
Sample Questions
Q1) Bandwidth limitation for certain types of traffic is less risky than dropping packets.
A)True
B)False
Q2) Firewalls will drop ________.
A) suspicious packets
B) provable attack packets
C) Both A and B
D) Neither A nor B
Q3) Stateful packet inspection firewalls ________.
A) always do application content filtering
B) have the slow speed of relay operation
C) Both A and B
D) Neither A nor B
Q4) A state is a distinct phase in a connection between two applications.
A)True
B)False
Q5) Firewall appliances need little or no hardening before they are installed.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Host Hardening
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/27885
Sample Questions
Q1) The Local Users and Groups snap-in is available on the ________ MMC.
A) Computer Management
B) Security
C) Permissions
D) Local Permissions
Q2) To get to the super user account in UNIX, the administrator should use the ________ command.
A) RunAs
B) su
C) rlogin
D) None of the above
Q3) The book recommends that passwords be at least ________ characters long.
A) 6
B) 8
C) 20
D) 100
Q4) The super user account in Windows is called root.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Application Security
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/27886
Sample Questions
Q1) Cookies can used to track users at a website.
A)True
B)False
Q2) A down side of spam filtering is the deletion of some legitimate messages.
A)True
B)False
Q3) Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so.
A)True
B)False
Q4) What e-mail standard provides end-to-end security?
A) SSL/TLS
B) S/MIME
C) Both A and B
D) Neither A nor B
Q5) Firewall port openings are required for SIP/H.323 messages.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10
Chapter 9: Data Protection
Available Study Resources on Quizplus for this Chatper
108 Verified Questions
108 Flashcards
Source URL: https://quizplus.com/quiz/27887
Sample Questions
Q1) Most companies are quick to enforce strict data management policies.
A)True
B)False
Q2) Magnetic tape is ________.
A) expensive to use
B) very fast
C) Both A and B
D) Neither A nor B
Q3) Which of the following database events should be regularly audited?
A) Warnings and exceptions
B) Special access and logins
C) Changes
D) All of the above
Q4) Backup media should be encrypted.
A)True
B)False
Q5) File/directory backup is slower and takes up more storage space than image backup.
A)True
B)False

11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Incident and Disaster Response
Available Study Resources on Quizplus for this Chatper
107 Verified Questions
107 Flashcards
Source URL: https://quizplus.com/quiz/27879
Sample Questions
Q1) The ________ collects event data and stores them in log files on the monitoring devices.
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Q2) A router can be a NIDS.
A)True
B)False
Q3) Disconnection ________.
A) is the most decisive way to do termination
B) harms legitimate users
C) Both A and B
D) Neither A nor B
Q4) Restoration of data files from tape ________.
A) is the fastest recovery method
B) always results in data loss
C) Both A and B
D) Neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 12
Chapter 11: Module A: Networking Concepts
Available Study Resources on Quizplus for this Chatper
91 Verified Questions
91 Flashcards
Source URL: https://quizplus.com/quiz/27888
Sample Questions
Q1) To get configuration information from managed devices on the network and to change the configuration of managed devices, companies use ________.
A) DNS
B) DHCP
C) SNMP
D) ICMP
Q2) IPsec a general protection strategy for all internet, transport, and application protocols.
A)True
B)False
Q3) A computer connects to the nearest switch via a ________.
A) physical link
B) data link
C) Both A and B
D) Neither A nor B
Q4) If a router receives a packet with a TTL value of 1, what will it do?
A) Increase the TTL value to 2.
B) Keep the TTL value at 1.
C) Drop the packet.
D) None of the above.

Page 13
To view all questions and flashcards with answers, click on the resource link above.