Exam 17: Computer Security
Exam 1: The Big Picture52 Questions
Exam 2: Binary Values and Number Systems49 Questions
Exam 3: Data Representation51 Questions
Exam 4: Gates and Circuits49 Questions
Exam 5: Computing Components49 Questions
Exam 6: Low-Level Programming Languages and Pseudocode49 Questions
Exam 7: Problem Solving and Algorithms48 Questions
Exam 8: Abstract Data Types and Subprograms49 Questions
Exam 9: Object-Oriented Design and High-Level Programming Languages47 Questions
Exam 10: Operating Systems49 Questions
Exam 11: File Systems and Directories49 Questions
Exam 12: Information Systems45 Questions
Exam 13: Artificial Intelligence47 Questions
Exam 14: Simulation, Graphics, Gaming, and Other Applications50 Questions
Exam 15: Networks48 Questions
Exam 16: The World Wide Web44 Questions
Exam 17: Computer Security49 Questions
Exam 18: Limitations of Computing50 Questions
Exam 19: broad concept of computer security and its importance in modern society.102 Questions
Select questions type
The requirement that the sender and receiver must share the cipher key is a major drawback of public-key cryptography.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
Encryption is the process of converting plaintext into ciphertext.
Free
(True/False)
4.8/5
(42)
Correct Answer:
True
What are the two ways antivirus software detects malicious code?
Free
(Essay)
4.9/5
(37)
Correct Answer:
Antivirus software works by detecting malicious code that has been previously identified in general. It may work using signature detection, which looks for recognizable patterns in executable code that match known malware. A more advanced version uses more general heuristics that look for even more general patterns in order to catch malware that has deliberately mutated in an attempt to avoid detection.
A Caesar cipher that shifts characters 4 positions to the right would encode the word LADDER as which of the following?
(Multiple Choice)
4.8/5
(40)
A digital signature is a way to "sign" a document such that the recipient can verify that it came from the originator and has not been altered during transmission.
(True/False)
4.8/5
(37)
Which of the following malware programs is disguised as a benevolent program?
(Multiple Choice)
4.8/5
(34)
A Caesar cipher that shifts characters 3 positions to the right would encode the word BUBBLE as which of the following?
(Multiple Choice)
4.8/5
(33)
Which of the following is the least significant challenge in the use of fingerprint analysis for user authentication?
(Multiple Choice)
4.8/5
(41)
Which feature of a cell phone has been in the news because it is being exploited by some organizations to collect data about the user?
(Multiple Choice)
4.8/5
(41)
Which of the following cryptography techniques requires two separate keys to encrypt and decrypt messages?
(Multiple Choice)
4.8/5
(32)
A route cipher is an example of what category of encryption?
(Multiple Choice)
4.7/5
(43)
Which of the following is not a reasonable password management guideline?
(Multiple Choice)
4.8/5
(42)
Which of the following are not user authentication credentials?
(Multiple Choice)
4.9/5
(36)
What are some of the reasons a person makes mistakes when it comes to keeping their online information secure?
(Essay)
4.9/5
(43)
Public-key cryptography and transposition ciphers are examples of modern computer encryption.
(True/False)
4.8/5
(37)
A computer virus and a computer worm are both self-replicating programs.
(True/False)
4.8/5
(39)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)