Midterm | Computer Science homework help

  

1.Which of the following are the CIA properties? (Select the three correct properties.)

Authentication

Confidentiality

Integrity

Availability

Identity

Implementation

2. Which of the following is an example of a rule-based security decision?

Locking a car’s ignition

Performing a step-by-step security analysis

Applying “security theater”

Trying to outdo a neighbor’s security measures

3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?

An attack with a $100 loss that could happen once a week

An attack with a $400 loss that could happen once a month

An attack with a $2000 loss that could happen twice a year

An attack with a $5000 loss that could happen once a year

4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.

5. What is a worm?

Malware

Sends spam

Blocks flow of computer traffic

Denial of service

6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.

Group of answer choices

True

False

7. An attempt by a threat agent to exploit assets without permission is referred to as

Group of answer choices

An attack

A vulnerability

A safeguard

A trade-off

8. The primary element on a computer motherboard that runs programs and makes the computer work is

Group of answer choices

Random access memory (RAM)

An input/output (I/O) circuit

The central processing unit (CPU)

Firmware

9. ____________ flaws in the software, such as finger service, are often exploited.

Group of answer choices

Buffer overflow

Blue screen of death

Shell shock

Windows

10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?

Group of answer choices

Gates

Jobs

Moore

Morris

11. True or False? Not all data is strictly numerical.

Group of answer choices

True

False

12. The __________ board contains slots or sockets for random access memory (RAM).

Group of answer choices

Mother

Father

Daughter

Son

13. True or False? A computer’s basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).

Group of answer choices

True

False

14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a “destructive payload” that would delete all executable files on the system on Friday the 13th, starting in 1988.

Group of answer choices

True

False

15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.

Group of answer choices

Cluster

Permission

Capability

Objects

16. The “X” permission on the file indicates that the user has _________ right.

17. True or False? Every executable file begins with a “file header” that describes the structure and format of the program.

Group of answer choices

True

False

18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except

Group of answer choices

C++

PHP

Javascript

Lisp

19. True or False? In a default permit, everything is allowed except sites on the prohibited list.

Group of answer choices

True

False

20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

Group of answer choices

Single-factor authentication

Two-factor authentication

Three-factor authentication

None of these is correct

21. True or False? Authentication associates an individual with an identity.

Group of answer choices

True

False

22. True or False? Two-factor authentication is using two passwords.

Group of answer choices

True

False

23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.

Group of answer choices

True

False

24. The following are fundamental strategies for authenticating people on computer systems, except

Group of answer choices

Something you know

Something you have

Something you are

Something you make

25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user’s fingerprint. Which of the following can we add to implement three separate factors?

Group of answer choices

A file of secret information stored on the user’s authorized computers

A PIN entered via a built-in PIN pad

Signature recognition

A process that requires the user’s cell phone

Calculate Your Essay Price
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more