Midterm | Computer Science homework help

  

1.Which of the following are the CIA properties? (Select the three correct properties.)

Authentication

Confidentiality

Integrity

Availability

Identity

Implementation

2. Which of the following is an example of a rule-based security decision?

Locking a car’s ignition

Performing a step-by-step security analysis

Applying “security theater”

Trying to outdo a neighbor’s security measures

3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?

An attack with a $100 loss that could happen once a week

An attack with a $400 loss that could happen once a month

An attack with a $2000 loss that could happen twice a year

An attack with a $5000 loss that could happen once a year

4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.

5. What is a worm?

Malware

Sends spam

Blocks flow of computer traffic

Denial of service

6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.

Group of answer choices

True

False

7. An attempt by a threat agent to exploit assets without permission is referred to as

Group of answer choices

An attack

A vulnerability

A safeguard

A trade-off

8. The primary element on a computer motherboard that runs programs and makes the computer work is

Group of answer choices

Random access memory (RAM)

An input/output (I/O) circuit

The central processing unit (CPU)

Firmware

9. ____________ flaws in the software, such as finger service, are often exploited.

Group of answer choices

Buffer overflow

Blue screen of death

Shell shock

Windows

10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?

Group of answer choices

Gates

Jobs

Moore

Morris

11. True or False? Not all data is strictly numerical.

Group of answer choices

True

False

12. The __________ board contains slots or sockets for random access memory (RAM).

Group of answer choices

Mother

Father

Daughter

Son

13. True or False? A computer’s basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).

Group of answer choices

True

False

14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a “destructive payload” that would delete all executable files on the system on Friday the 13th, starting in 1988.

Group of answer choices

True

False

15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.

Group of answer choices

Cluster

Permission

Capability

Objects

16. The “X” permission on the file indicates that the user has _________ right.

17. True or False? Every executable file begins with a “file header” that describes the structure and format of the program.

Group of answer choices

True

False

18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except

Group of answer choices

C++

PHP

Javascript

Lisp

19. True or False? In a default permit, everything is allowed except sites on the prohibited list.

Group of answer choices

True

False

20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

Group of answer choices

Single-factor authentication

Two-factor authentication

Three-factor authentication

None of these is correct

21. True or False? Authentication associates an individual with an identity.

Group of answer choices

True

False

22. True or False? Two-factor authentication is using two passwords.

Group of answer choices

True

False

23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.

Group of answer choices

True

False

24. The following are fundamental strategies for authenticating people on computer systems, except

Group of answer choices

Something you know

Something you have

Something you are

Something you make

25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user’s fingerprint. Which of the following can we add to implement three separate factors?

Group of answer choices

A file of secret information stored on the user’s authorized computers

A PIN entered via a built-in PIN pad

Signature recognition

A process that requires the user’s cell phone

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
    See full FAQ

    Take your studies to the next level with our experienced specialists

    Chat
    Hello, we are online 24/7. Leave a message we will reply instantly