18 Questions
What does encryption do to data?
Make it unintelligible to the outside observer
Which of the following is NOT a program control measure mentioned in the text?
Hardware controls
What is the purpose of software controls in computer security?
To exclude outside attacks and ensure program dependability
What type of controls enforce security restrictions like access limitations in a database management system?
Internal program controls
Which of these is NOT a hardware control measure mentioned in the text?
Increasing data integrity
What aspect of computer security does encryption primarily address?
Confidentiality
What does computer security aim to protect?
The confidentiality, integrity, and availability of information system resources
Which of the following is NOT one of the basic security goals?
Authenticity
What is the main purpose of confidentiality in computer security?
To keep information secret and concealed
Which of the following is NOT an example of sensitive information that requires confidentiality?
Publicly available information
What does integrity refer to in computer security?
The trustworthiness of data or resources
Which aspect of computer security ensures the ability to use the information or resource?
Availability
What is the main purpose of cryptography in computer networks?
Making data unreadable to attackers
Which hardware control is used to protect the system as a whole?
Firewalls
What type of control enforces quality measures on the original source code?
Development controls
Which control is responsible for authenticating users with digital signatures?
Fingerprint readers
What is the purpose of personal firewalls that run on your desktop?
Protecting against unauthorized network access
Which physical control is used to protect hardware itself and physical access to devices?
Locks
This quiz covers different methods of defense, countermeasures, and best security practices to prevent exploitation of vulnerabilities in computing systems. Topics include encryption, policies and procedures, non-technical means of protection, and rules about changing passwords.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free