Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CS 3113 - Final Review (Everything) Exam Study Guide

Rating
-
Sold
-
Pages
53
Grade
A+
Uploaded on
02-04-2026
Written in
2025/2026

CS 3113 - Final Review (Everything) Exam Study Guide...

Institution
CS 3113
Course
CS 3113

Content preview

CS 3113 - Final Review (Everything)
Exam Study Guide
(T/F) With the attention that computer security is receiving in the media today, as
a result of the numerous security breaches we can read about, preventing,
detecting, and prosecuting computer crime has become easier. - ANSWER False

An individual who blocks the traffic from an authorized user to a system they are
authorized to access is conducting which of the following threat types? -
ANSWER Interruption

An individual who simply "listens" to the traffic that is being sent by an
authorized user between systems is an example of which of the following threat
types? - ANSWER Interception

Which of the following is the name for a program that holds a computer
"hostage" while demanding a ransom? - ANSWER Ransomware

Which of the following describes the "CIA Triad"? - ANSWER Confidentiality,
integrity, Availability

Which level of threat includes disgruntled employees seeking to harm your
systems? - ANSWER Unstructured Threats

Which of the following best describes the changes (if any) that have occurred to
the average intruder knowledge and the attack sophistication over the last few
decades? - ANSWER The average required intruder knowledge has decreased
while the attack sophistication has increased.

What does the term "threat" refer to in computer security? - ANSWER Any
potential threat that could cause an undesirable outcome - including natural
disasters

Which of the following is the name for a program that appears to do one thing
(and may indeed do it) but that hides something else? - ANSWER Trojan Horse

Which of the following is the name for a program that reproduces by attaching
copies of itself to other programs and which often carries a malicious
"payload"? - ANSWER Virus

(T/F) Issues of proprietary software and trade secrets complicate the
application of the Open Design principle. In some cases companies may not
want their designs made public, lest their competitors use them. The principle

,then requires that the design and implementation be available to people barred
from disclosing it outside of the company. - ANSWER True

Which disclosure paradigm has as its assumptions that 1) an attacker will learn
little or nothing from disclosure; 2) Disclosure will prompt designers to improve
the design of defenses, and 3) Disclosure will prompt other defenders to take
action? - ANSWER Open Source

What is the name of the method of communication between two computers
(arbitrarily named here client and server) in which information is encoded, and
possibly encrypted, into a sequence of port numbers? Initially, the server
presents no open ports to the public and is monitoring all connection attempts.
The client initiates connection attempts to the server by sending SYN packets to
the ports specified in a special sequence. The server offers no response to the
client during this phase, as it "silently" processes the port sequence. When the
server decodes a valid sequence it triggers a server-side process and response.
- ANSWER Port Knocking

What is the name given to a form of host-to-host communication in which
information flows across closed ports. Information may be encoded into a port
sequence or a packet-payload. In general, data are transmitted to closed ports
and received by a monitoring daemon which intercepts the information without
sending a receipt to the sender. - ANSWER Port Knocking

Can all issues with complexity be avoided through the use of one of the secure
design principles identified in class? - ANSWER No

(T/F) The number of bugs introduced by a bug fix release may actually exceed
the number of bugs fixed by that release. - ANSWER True

In cyber security, one of the best ways to protect a computer or network is with
a strategy called defense in depth. This strategy means that there are multiple
defenses put in place. If one fails, it is likely another will catch the problem.
Which method of reducing complexity is this concept most closely aligned with?
- ANSWER Layering

When viewing a Drone Pilot app, the screen will show "flight instruments" that
indicate how fast the drone is flying and how high it is off the ground. Which
method is this an example of? - ANSWER Abstraction

While a password should be long and complex so that it will be difficult to break,
the password should be easy for you to remember. One way to do this is to take
the first letter of each word from a song that you know. Which design principle is
this most closely aligned with? - ANSWER Simplicity

,Which of the following was described as one of the main drawback to the
waterfall software development model? - ANSWER The Waterfall model does not
easily accommodate change after the process is underway. One phase has to be
completed before moving onto the next phase.

Which of the following was NOT one of the three items described as necessary
for the DoD cyber strategy of Deterrence to be effective? - ANSWER Train cyber
forces to be able to operate in both offensive and defensive activities.

(T/F) A key fraud control is Separation of Duties. For example, someone who
orders a computer cannot also sign that it was received, nor should they directly
receive the computer. This prevents an individual from placing fake orders and
paying themselves. - ANSWER True

Which of the following are advantages of an iterative design process? - ANSWER
B,C,D, but not A
A....It results in the fastest development of software; it is the quickest design
process.
B....Having a working system available at all times helps provide assurance that
something can be built.
C....It provides on-going experience with the current technology ground rules
and an opportunity to discover and fix bugs.
D....It is easier to incorporate technology changes that arrive during the system
development.

Which design principle states that you should start with a simple, working
system that meets only a modest subset of the requirements, and then evolve
the system in small steps to gradually encompass more and more of the full set
of requirements? - ANSWER Design for Iteration

What is the name given to the software testing technique, which basically
consists of finding implementation bugs using malformed/semi-malformed data
injection in an automated fashion? - ANSWER Fuzzing

Rather than deliver the system as a single delivery, the development and
delivery is broken down into increments with each increment delivering part of
the required functionality describes which development model? - ANSWER
Incremental Development

Which NSA security design principle has as a basic tenet that a feature should
do "the least surprising thing"? - ANSWER Least Astonishment

(T/F) Users won't specify protections correctly if the specification doesn't make
sense to them. This is known as Psychological Acceptability which is related to
the design principle of Simplicity as it "keeps things simple" . - ANSWER False

, (T/F) Because cryptography is a highly mathematical subject, companies that
market cryptographic software or use cryptography to protect user data
frequently keep their algorithms secret. Experience has shown that such
secrecy adds little if anything to the security of the system. Worse, it gives an
aura of strength that is all too often lacking in the actual implementation of the
system. - ANSWER True

In the "CIA Triad", which element states that only authorized individuals may
view the data being protected? - ANSWER Confidentiality

In which disclosure paradigm may disclosure provide little advantage for the
defenders but potentially have a tremendous benefit for attackers? - ANSWER
Military

According to Joint Publication 3-12, DoD Information Network (DODIN)
operations include which of the following? - ANSWER Operational actions taken
to secure, configure, operate, extend, maintain, and sustain DOD cyberspace
and to create and preserve the confidentiality, availability, and integrity of the
DODIN.

Many computers are built with parts that can easily be taken out and replaced
with other parts. This makes it easier to troubleshoot and fix. What is the name
for this method of reducing complexity? - ANSWER Modularity

Which disclosure paradigm has as its assumptions that 1) Attackers may learn a
lot from disclosure; 2) Disclosure may teach the defenders how to design better
systems, and 3) Disclosure will prompt more defenders to take protective
actions? - ANSWER Information Sharing

Often a secret may consist of two (or more) parts. Knowing any of the parts
individually may not be secret, but putting them together they become a secret
you need to protect. This concept is known as which of the following? - ANSWER
Aggregation

"You won't get it right the first time, so design it to be easy to change" is the
guiding philosophy for which security design principle? - ANSWER Iteration

(T/F) Rigorous testing allows applications to be made 100% secure. - ANSWER
False

"When you log into a computer, it is a good practice to do so as a regular user
instead of as an administrator or super user. A normal user can perform most of
the common tasks and does not need to be an administrator. It also protects a
computer from increased harm if there is a virus present" is a statement of what
security principle? - ANSWER Least Privilege

Written for

Institution
CS 3113
Course
CS 3113

Document information

Uploaded on
April 2, 2026
Number of pages
53
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$19.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Zayla Liberty University
Follow You need to be logged in order to follow users or courses
Sold
111
Member since
3 year
Number of followers
13
Documents
13900
Last sold
21 hours ago

3.4

17 reviews

5
5
4
3
3
5
2
2
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions