Computer Security Exam Answer Key - 1198 Verified Questions

Page 1


Computer Security

Exam Answer Key

Course Introduction

Computer Security explores the principles and practices essential to protecting information systems from unauthorized access, vulnerabilities, and cyberattacks. The course covers foundational topics such as cryptography, authentication, access control, network security, malware, and software vulnerabilities. Students will learn about risk assessment, security policies, and defenses against real-world threats. Through theoretical and hands-on approaches, this course equips students with the skills to implement security measures, analyze system security, and respond to emerging security challenges in modern computing environments.

Recommended Textbook

Corporate Computer Security 4th Edition by

Available Study Resources on Quizplus

11 Chapters

1198 Verified Questions

1198 Flashcards

Source URL: https://quizplus.com/study-set/1400

Page 2

Chapter 1: The Threat Environment

Available Study Resources on Quizplus for this Chatper

103 Verified Questions

103 Flashcards

Source URL: https://quizplus.com/quiz/27878

Sample Questions

Q1) Downloading pornography can lead to sexual harassment lawsuits.

A)True

B)False Answer: True

Q2) ________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer.)

A) Social engineering

B) Spam

C) E-mail attachment

D) Mobile code Answer: A

Q3) Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Planning and Policy

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27880

Sample Questions

Q1) The ISO/IEC 2700 family focuses on ________.

A) corporate governance

B) IT governance

C) IT security governance

D) All of the above about equally

Answer: C

Q2) To outsource some security functions, a firm can use an MISP.

A)True

B)False

Answer: False

Q3) The owner can delegate ________ to the trustee.

A) the work of implementation of a resource or control

B) accountability for a resource or control

C) Both A and B

D) Neither A nor B

Answer: A

Q4) The goal of IT security is reasonable risk reduction.

A)True

B)False

Answer: True

Page 4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Cryptography

Available Study Resources on Quizplus for this Chatper

122 Verified Questions

122 Flashcards

Source URL: https://quizplus.com/quiz/27881

Sample Questions

Q1) In public key encryption for authentication, the receiver decrypts with the public key of the sender.

A)True

B)False

Answer: False

Q2) In order to be considered strong today, a symmetric encryption key must be at least ________ bits long.

A) 6

B) 8

C) 100

D) 1,000

Answer: C

Q3) ________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer.

A) Cryptography

B) Encryption

C) Authentication

D) Confidentiality

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Secure Networks

Available Study Resources on Quizplus for this Chatper

119 Verified Questions

119 Flashcards

Source URL: https://quizplus.com/quiz/27882

Sample Questions

Q1) Some writers prefer to turn off SSID broadcasting.

A)True

B)False

Q2) In a man-in-the-middle attack, an evil twin sends own attacks, impersonating the victim.

A)True

B)False

Q3) The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack.

A)True

B)False

Q4) A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.

A) SYN flood

B) Ping flood

C) HTTP flood

D) None of the above

Q5) The 802.11 standards were developed by the IEEE 802.11 Working Group.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Access Control

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27883

Sample Questions

Q1) When assigning initial permissions, it is good to add more permissions than strictly necessary and then remove permissions if appropriate.

A)True

B)False

Q2) The verifier itself determines the identity of the supplicant in ________.

A) verification

B) identification

C) Both A and B

D) Neither A nor B

Q3) ________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

A) Authorizations

B) Authentication

C) Accuracy

D) Auditing

Q4) For watch lists of criminals, a false acceptance is worse than a false rejection from a security viewpoint.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Firewalls

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27884

Sample Questions

Q1) Bandwidth limitation for certain types of traffic is less risky than dropping packets.

A)True

B)False

Q2) Firewalls will drop ________.

A) suspicious packets

B) provable attack packets

C) Both A and B

D) Neither A nor B

Q3) Stateful packet inspection firewalls ________.

A) always do application content filtering

B) have the slow speed of relay operation

C) Both A and B

D) Neither A nor B

Q4) A state is a distinct phase in a connection between two applications.

A)True

B)False

Q5) Firewall appliances need little or no hardening before they are installed.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Host Hardening

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27885

Sample Questions

Q1) The Local Users and Groups snap-in is available on the ________ MMC.

A) Computer Management

B) Security

C) Permissions

D) Local Permissions

Q2) To get to the super user account in UNIX, the administrator should use the ________ command.

A) RunAs

B) su

C) rlogin

D) None of the above

Q3) The book recommends that passwords be at least ________ characters long.

A) 6

B) 8

C) 20

D) 100

Q4) The super user account in Windows is called root.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Application Security

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27886

Sample Questions

Q1) Cookies can used to track users at a website.

A)True

B)False

Q2) A down side of spam filtering is the deletion of some legitimate messages.

A)True

B)False

Q3) Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so.

A)True

B)False

Q4) What e-mail standard provides end-to-end security?

A) SSL/TLS

B) S/MIME

C) Both A and B

D) Neither A nor B

Q5) Firewall port openings are required for SIP/H.323 messages.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Data Protection

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/27887

Sample Questions

Q1) Most companies are quick to enforce strict data management policies.

A)True

B)False

Q2) Magnetic tape is ________.

A) expensive to use

B) very fast

C) Both A and B

D) Neither A nor B

Q3) Which of the following database events should be regularly audited?

A) Warnings and exceptions

B) Special access and logins

C) Changes

D) All of the above

Q4) Backup media should be encrypted.

A)True

B)False

Q5) File/directory backup is slower and takes up more storage space than image backup.

A)True

B)False

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Incident and Disaster Response

Available Study Resources on Quizplus for this Chatper

107 Verified Questions

107 Flashcards

Source URL: https://quizplus.com/quiz/27879

Sample Questions

Q1) The ________ collects event data and stores them in log files on the monitoring devices.

A) manager

B) agent

C) Both A and B

D) Neither A nor B

Q2) A router can be a NIDS.

A)True

B)False

Q3) Disconnection ________.

A) is the most decisive way to do termination

B) harms legitimate users

C) Both A and B

D) Neither A nor B

Q4) Restoration of data files from tape ________.

A) is the fastest recovery method

B) always results in data loss

C) Both A and B

D) Neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Module A: Networking Concepts

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/27888

Sample Questions

Q1) To get configuration information from managed devices on the network and to change the configuration of managed devices, companies use ________.

A) DNS

B) DHCP

C) SNMP

D) ICMP

Q2) IPsec a general protection strategy for all internet, transport, and application protocols.

A)True

B)False

Q3) A computer connects to the nearest switch via a ________.

A) physical link

B) data link

C) Both A and B

D) Neither A nor B

Q4) If a router receives a packet with a TTL value of 1, what will it do?

A) Increase the TTL value to 2.

B) Keep the TTL value at 1.

C) Drop the packet.

D) None of the above.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.