These are the automatically
computed results of your exam. Date Taken: 5/21/2017
Grades for essay questions, and Time Spent: 1 h , 44 min , 41 secs
comments from your instructor, are Points Received: (100%)
in the "Details" section below.
Question Type: # Of Questions: # Correct:
Multiple Choice 1 1
Essay 4 N/A
Question 1. Question :
(TCO A) What are the three goals of security in computing? For
each goal, list two controls that can be implemented to help
achieve that goal.
Student Answer: 1-Confidentiality -Identity management: A password control can be
implemented to achieve this goal -Physical security: A building access
control can be implemented to achieve this goal 2-Integrity -Data
security: Cryptography can be implemented to achieve this goal
-Access control: A network authentication service can be
implemented to achieve this goal 3-Availability -Network
management: Auditing of privilege use can be implemented to
achieve this goal -Software: Auditability can be implemented to
achieve this goal (Pfleeger Ch 1, pp. 10–12)
Instructor (Pfleeger Ch 1, pp. 10–12)
Explanation:
Data Integrity - digital signatures, hashing, code review to
detect covert channels
Data Confidentiality - encryption, access control lists, physical
security
Data Availability - RAID, redundant components (power supply,
fan), server clusters
Points Received: 23 of 23
Comments:
Question 2. Question :
(TCO A) May a database contain two identical records without
a negative effect on the integrity of the database? Why or
why not?
This study source was downloaded by 100000861168648 from CourseHero.com on 02-25-2023 12:17:46 GMT -06:00
https://www.coursehero.com/file/23261749/SEC-571-Week-4-Midterm-Grading-Summary/
computed results of your exam. Date Taken: 5/21/2017
Grades for essay questions, and Time Spent: 1 h , 44 min , 41 secs
comments from your instructor, are Points Received: (100%)
in the "Details" section below.
Question Type: # Of Questions: # Correct:
Multiple Choice 1 1
Essay 4 N/A
Question 1. Question :
(TCO A) What are the three goals of security in computing? For
each goal, list two controls that can be implemented to help
achieve that goal.
Student Answer: 1-Confidentiality -Identity management: A password control can be
implemented to achieve this goal -Physical security: A building access
control can be implemented to achieve this goal 2-Integrity -Data
security: Cryptography can be implemented to achieve this goal
-Access control: A network authentication service can be
implemented to achieve this goal 3-Availability -Network
management: Auditing of privilege use can be implemented to
achieve this goal -Software: Auditability can be implemented to
achieve this goal (Pfleeger Ch 1, pp. 10–12)
Instructor (Pfleeger Ch 1, pp. 10–12)
Explanation:
Data Integrity - digital signatures, hashing, code review to
detect covert channels
Data Confidentiality - encryption, access control lists, physical
security
Data Availability - RAID, redundant components (power supply,
fan), server clusters
Points Received: 23 of 23
Comments:
Question 2. Question :
(TCO A) May a database contain two identical records without
a negative effect on the integrity of the database? Why or
why not?
This study source was downloaded by 100000861168648 from CourseHero.com on 02-25-2023 12:17:46 GMT -06:00
https://www.coursehero.com/file/23261749/SEC-571-Week-4-Midterm-Grading-Summary/