Exam 1: Computer Systems Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the context of security our concern is with the vulnerabilities ofsystem resources.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

Security implementation involves four complementary courses of action: prevention, detection, response, and _________.

Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Verified

recovery

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

A

Misappropriation and misuse are attacks that result in ________ threat consequences.

(Short Answer)
4.9/5
(37)

Assurance is the process of examining a computer product or systemwith respect to certain criteria.

(True/False)
4.9/5
(30)

The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _________.

(Short Answer)
4.7/5
(33)

Release of message contents and traffic analysis are two types of _________ attacks.

(Short Answer)
4.9/5
(34)

Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.

(Multiple Choice)
4.9/5
(39)

Data integrity assures that information and programs are changed onlyin a specified and authorized manner.

(True/False)
4.9/5
(31)

Availability assures that systems works promptly and service is notdenied to authorized users.

(True/False)
4.8/5
(33)

A loss of _________ is the unauthorized disclosure of information.

(Multiple Choice)
4.8/5
(34)

Computer security is protection of the integrity, availability, andconfidentiality of information system resources.

(True/False)
4.9/5
(43)

Hardware is the most vulnerable to attack and the least susceptible toautomated controls.

(True/False)
4.7/5
(31)

________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

(Multiple Choice)
4.8/5
(39)

A __________ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.

(Short Answer)
4.8/5
(34)

A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.

(Multiple Choice)
4.9/5
(42)

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

(Multiple Choice)
4.9/5
(36)

The OSI security architecture focuses on security attacks, __________, and services.

(Short Answer)
4.9/5
(31)

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.

(Multiple Choice)
4.8/5
(39)

Computer security is essentially a battle of wits between a perpetratorwho tries to find holes and the administrator who tries to close them.

(True/False)
4.7/5
(44)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)