Methods of Defense in Computer Security
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does encryption do to data?

  • Make it unintelligible to the outside observer (correct)
  • Increase its availability
  • Enhance its dependability
  • Speed up data transmission

Which of the following is NOT a program control measure mentioned in the text?

  • Development controls
  • Internal program controls
  • Hardware controls (correct)
  • OS Controls

What is the purpose of software controls in computer security?

  • To enhance data transmission speed
  • To decrypt data for easy access
  • To increase vulnerability to attacks
  • To exclude outside attacks and ensure program dependability (correct)

What type of controls enforce security restrictions like access limitations in a database management system?

<p>Internal program controls (C)</p> Signup and view all the answers

Which of these is NOT a hardware control measure mentioned in the text?

<p>Increasing data integrity (D)</p> Signup and view all the answers

What aspect of computer security does encryption primarily address?

<p>Confidentiality (C)</p> Signup and view all the answers

What does computer security aim to protect?

<p>The confidentiality, integrity, and availability of information system resources (C)</p> Signup and view all the answers

Which of the following is NOT one of the basic security goals?

<p>Authenticity (C)</p> Signup and view all the answers

What is the main purpose of confidentiality in computer security?

<p>To keep information secret and concealed (B)</p> Signup and view all the answers

Which of the following is NOT an example of sensitive information that requires confidentiality?

<p>Publicly available information (C)</p> Signup and view all the answers

What does integrity refer to in computer security?

<p>The trustworthiness of data or resources (B)</p> Signup and view all the answers

Which aspect of computer security ensures the ability to use the information or resource?

<p>Availability (A)</p> Signup and view all the answers

What is the main purpose of cryptography in computer networks?

<p>Making data unreadable to attackers (C)</p> Signup and view all the answers

Which hardware control is used to protect the system as a whole?

<p>Firewalls (D)</p> Signup and view all the answers

What type of control enforces quality measures on the original source code?

<p>Development controls (A)</p> Signup and view all the answers

Which control is responsible for authenticating users with digital signatures?

<p>Fingerprint readers (B)</p> Signup and view all the answers

What is the purpose of personal firewalls that run on your desktop?

<p>Protecting against unauthorized network access (C)</p> Signup and view all the answers

Which physical control is used to protect hardware itself and physical access to devices?

<p>Locks (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser