Computer Security Introduction

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does computer security refer to?

  • Preventing unauthorized access to computers and their data (correct)
  • Enhancing the speed of computers
  • Developing new computer software
  • Protecting computers from viruses only

Why is computer security important?

  • To increase vulnerability to viruses
  • To slow down technological advancements
  • To protect systems from risks like hacking and information theft (correct)
  • To enhance cyber attacks

What type of attacks happen when a system is connected to the Internet?

  • Biological attacks
  • Cyber attacks (correct)
  • Physical attacks
  • Chemical attacks

Which type of security involves protecting a system's information from theft and piracy?

<p>Information Security (C)</p> Signup and view all the answers

What risk does the text NOT associate with the Internet?

<p>Physical damage to computers (C)</p> Signup and view all the answers

Who are trying to harm computer security for various purposes according to the text?

<p>Invaders, hackers, and thieves (A)</p> Signup and view all the answers

What is the main objective of information security?

<p>Confidentiality (A)</p> Signup and view all the answers

What does application security aim to protect?

<p>Applications and data from hacking (A)</p> Signup and view all the answers

Why is network security important?

<p>To prevent data breaches and cyber attacks (B)</p> Signup and view all the answers

Which security approach aims at creating software without bugs?

<p>Security by Correctness (A)</p> Signup and view all the answers

What is a common method used in network security to protect against malware and cyber attacks?

<p>Distributed Denial of Service (DDoS) (C)</p> Signup and view all the answers

Which aspect of security aims to deter criminal activities by providing a sense of safety?

<p>Physical Security Measures (C)</p> Signup and view all the answers

Why is it challenging to achieve 'Security by Correctness' in software development?

<p>Inability to write bug-free code (A)</p> Signup and view all the answers

Which type of attack involves intercepting and altering data packets traveling over a network?

<p>Man-in-the-Middle Attack (C)</p> Signup and view all the answers

What is the primary purpose of network security?

<p>Protecting sensitive data from cyber attacks (C)</p> Signup and view all the answers

In what way do physical security measures contribute to overall security?

<p>Deterring criminal activities (C)</p> Signup and view all the answers

What is one of the main challenges of implementing Security by Isolation according to the text?

<p>Partitioning the system into meaningful pieces (B)</p> Signup and view all the answers

Which characteristic describes monolithic kernels mentioned in the text?

<p>Prone to allowing bypass of isolation mechanisms due to bugs (A)</p> Signup and view all the answers

What technology is suggested in the text as a potential solution to the challenges of using monolithic kernels?

<p>Micro-kernels (D)</p> Signup and view all the answers

Which approach aims to make system exploitation very hard for attackers rather than removing all bugs?

<p>Security by Obscurity (A)</p> Signup and view all the answers

Why do some industry experts prefer monolithic kernels over micro-kernels according to the text?

<p>Micro-kernels are harder to implement (C)</p> Signup and view all the answers

Which mechanism aims to make exploitation of bugs difficult by randomizing memory addresses?

<p>Address Space Layout Randomization (ASLR) (B)</p> Signup and view all the answers

Why does Security by Obscurity not prevent all types of attacks effectively according to the text?

<p>&quot;Obfuscated&quot; code is still prone to exploitation (B)</p> Signup and view all the answers

"Thin bare-metal hypervisors, like Xen, can act as micro-kernels by ____________.

<p><em>increasing</em> driver domains (C)</p> Signup and view all the answers

What is the main focus of Security by Isolation according to the text?

<p>Segregating components and preventing their interference (D)</p> Signup and view all the answers

What does confidentiality refer to in the context of information security?

<p>Restricting information to specific individuals or locations (A)</p> Signup and view all the answers

Which term refers to ensuring data remains accurate and consistent throughout its life cycle?

<p>Data integrity (A)</p> Signup and view all the answers

What is the main purpose of authentication in information security?

<p>Verifying a user's identity (D)</p> Signup and view all the answers

In cryptography, what does ciphertext refer to?

<p>Encrypted text derived from plaintext (A)</p> Signup and view all the answers

Why is plaintext protection important in cryptography?

<p>To avoid disclosing sensitive information if stolen or disclosed (C)</p> Signup and view all the answers

What type of attack involves an attacker having both the plaintext and its encrypted form?

<p>Known-plaintext attack (B)</p> Signup and view all the answers

Which action can help avoid revealing plaintext passwords in application configuration files?

<p>Protecting passwords with a secure hash function (D)</p> Signup and view all the answers

What is the main objective of non-repudiation in information security?

<p>Verifying the authenticity of signatures and messages (D)</p> Signup and view all the answers

Why is it important to protect plaintext stored in computer files?

<p>To prevent unauthorized disclosure if stolen or disclosed (A)</p> Signup and view all the answers

What happens during a known-plaintext attack in cryptanalysis?

<p>The attacker knows both the plaintext and its encrypted form (B)</p> Signup and view all the answers

What is the main goal of a passive attack?

<p>To obtain unauthorized access to information (C)</p> Signup and view all the answers

Which ethical issue in the security system deals with the individual's right to access personal information?

<p>Privacy (A)</p> Signup and view all the answers

What is the hierarchy of regulatory bodies that govern the legality of information security?

<p>International, Federal, State, Organization (A)</p> Signup and view all the answers

What does Cryptography mainly focus on?

<p>Developing and analyzing protocols for secure communication (C)</p> Signup and view all the answers

Which type of attack involves changing information by conducting processes on it?

<p>Active Attack (A)</p> Signup and view all the answers

What is the purpose of Cryptography in information security?

<p>To ensure data integrity and authentication (C)</p> Signup and view all the answers

What does the confidentiality principle of security state?

<p>Both the intended sender and receiver should access the message (A)</p> Signup and view all the answers

Which attack can occur if proper authentication mechanisms are absent?

<p>Fabrication attack (B)</p> Signup and view all the answers

What is compromised if a message's content changes during transmission without the knowledge of the sender or receiver?

<p>Integrity (A)</p> Signup and view all the answers

Which principle of security ensures that a sender cannot deny sending a message?

<p>Non-repudiation (C)</p> Signup and view all the answers

What does the access control principle of security focus on?

<p>Specifying who can access what functions (C)</p> Signup and view all the answers

In the context of security principles, what does availability refer to?

<p>Ensuring resources are available to authorized persons at all times (B)</p> Signup and view all the answers

Which security principle establishes proof of identity in electronic messages?

<p>Authentication (D)</p> Signup and view all the answers

If an unauthorized user accesses a confidential message, what security principle fails?

<p><strong>Authentication</strong> (C)</p> Signup and view all the answers

What does a substitution cipher do?

<p>Replaces characters with different characters or symbols (B)</p> Signup and view all the answers

What is the main purpose of encryption in data transmission?

<p>To prevent data theft and loss (B)</p> Signup and view all the answers

In a transposition cipher, what happens to the position of characters?

<p>They are shifted in a predictable way (D)</p> Signup and view all the answers

In symmetric key cryptography, what role does the individual key play?

<p>It is used for both encryption and decryption (A)</p> Signup and view all the answers

What is the primary function of decryption?

<p>To convert cipher text to plain text (B)</p> Signup and view all the answers

What is the encryption method in a Rail Fence cipher?

<p>Writing characters on imaginary rails (B)</p> Signup and view all the answers

What differentiates stream ciphers from block ciphers?

<p>Stream ciphers encrypt data in real-time (D)</p> Signup and view all the answers

How does a substitution cipher differ from a transposition cipher?

<p>Character identity remains the same in a substitution cipher (C)</p> Signup and view all the answers

In which type of cipher is the character position changed but the character identity remains the same?

<p>Key-less transposition cipher (D)</p> Signup and view all the answers

Why does encryption not prevent interference in itself?

<p>Because it does not hide the information being transmitted (D)</p> Signup and view all the answers

Which major difference between encryption and decryption is highlighted in the text?

<p>Decryption happens at the sender's end (D)</p> Signup and view all the answers

What is the primary challenge associated with basic substitution ciphers?

<p>Complexity in decrypting using personal computers (B)</p> Signup and view all the answers

'Sensitive data is transmitted in an encrypted form' primarily aims to achieve what goal?

<p>Protect the data during transmission (D)</p> Signup and view all the answers

How do transposition ciphers differ from substitution ciphers in terms of detection?

<p>'Changing character identity' makes substitution ciphers easier to detect (C)</p> Signup and view all the answers

'An authorized recipient can easily decrypt the message with the key provided by the originator' indicates what crucial aspect of decryption?

<p>The need for a secret key or password for decryption (C)</p> Signup and view all the answers

What type of encryption may utilize an extensive text set and clever substitution, as mentioned?

<p>'Current encryption' (C)</p> Signup and view all the answers

What is an example of a simple substitution cipher?

<p>Good Dog -&gt; Pllx Xlp (A)</p> Signup and view all the answers

What characteristic differentiates symmetric key cryptography from other encryption methods?

<p>It uses different keys for encryption and decryption. (D)</p> Signup and view all the answers

What is the primary reason why block ciphers divide data into larger chunks before encryption?

<p>To provide efficient protection during data storage and transmission (B)</p> Signup and view all the answers

What is the main purpose of a Rail Fence cipher?

<p>To shift characters in a predictable way (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Computer Security Best Practices
18 questions
Computer Security Chapter 10 Flashcards
16 questions
Computer Security Overview
8 questions
Use Quizgecko on...
Browser
Browser