Grading Summary
These are the automatically Date Taken:
computed results of your exam.
Time Spent:
Grades for essay questions, and
comments from your instructor, are Points Received: (100%)
in the "Details" section below.
Question Type: # Of Questions: # Correct:
Multiple Choice 1 1
Essay 4 N/A
Grade Details
1. Question : (TCO A) What are the three goals of security in computing? For each goal, list
two controls that can be implemented to help achieve that goal.
Student Answer: 1-Confidentiality -Identity management: A password control can
be implemented to achieve this goal -Physical security: A building
access control can be implemented to achieve this goal 2-Integrity
-Data security: Cryptography can be implemented to achieve this
goal -Access control: A network authentication service can be
implemented to achieve this goal 3-Availability -Network
management: Auditing of privilege use can be implemented to
achieve this goal -Software: Auditability can be implemented to
achieve this goal
Instructor (Pfleeger Ch 1, pp. 10–12)
Explanation:
Data Integrity - digital signatures, hashing, code review to detect covert channels
Data Confidentiality - encryption, access control lists, physical security
Data Availability - RAID, redundant components (power supply, fan),
server clusters
Points Received: 23 of 23
Comments:
2. Question : (TCO A) May a database contain two identical records without a negative
effect on the integrity of the database? Why or why not?
Student Answer: It depends on the semantics of the database, whether it permits
duplicates or not. 1)If the database has no defined key, the answer
is YES. Because you can have multiple identical records without
any negative impact through database. For instance, if the database
was keeping info about employees, customers, etc, where the
duplicates are not possible, two identical records would affect
negatively the integrity. 2)If the database has defined key, the
answer is NO. Because if the database contained duplicate
identical records when a key existed, there would be a negative
effect on the
This study source was downloaded by 100000861168648 from CourseHero.com on 03-07-2023 05:57:51 GMT -06:00
https://www.coursehero.com/file/10859838/SE-571-Midterm/
These are the automatically Date Taken:
computed results of your exam.
Time Spent:
Grades for essay questions, and
comments from your instructor, are Points Received: (100%)
in the "Details" section below.
Question Type: # Of Questions: # Correct:
Multiple Choice 1 1
Essay 4 N/A
Grade Details
1. Question : (TCO A) What are the three goals of security in computing? For each goal, list
two controls that can be implemented to help achieve that goal.
Student Answer: 1-Confidentiality -Identity management: A password control can
be implemented to achieve this goal -Physical security: A building
access control can be implemented to achieve this goal 2-Integrity
-Data security: Cryptography can be implemented to achieve this
goal -Access control: A network authentication service can be
implemented to achieve this goal 3-Availability -Network
management: Auditing of privilege use can be implemented to
achieve this goal -Software: Auditability can be implemented to
achieve this goal
Instructor (Pfleeger Ch 1, pp. 10–12)
Explanation:
Data Integrity - digital signatures, hashing, code review to detect covert channels
Data Confidentiality - encryption, access control lists, physical security
Data Availability - RAID, redundant components (power supply, fan),
server clusters
Points Received: 23 of 23
Comments:
2. Question : (TCO A) May a database contain two identical records without a negative
effect on the integrity of the database? Why or why not?
Student Answer: It depends on the semantics of the database, whether it permits
duplicates or not. 1)If the database has no defined key, the answer
is YES. Because you can have multiple identical records without
any negative impact through database. For instance, if the database
was keeping info about employees, customers, etc, where the
duplicates are not possible, two identical records would affect
negatively the integrity. 2)If the database has defined key, the
answer is NO. Because if the database contained duplicate
identical records when a key existed, there would be a negative
effect on the
This study source was downloaded by 100000861168648 from CourseHero.com on 03-07-2023 05:57:51 GMT -06:00
https://www.coursehero.com/file/10859838/SE-571-Midterm/