Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CS 3113 - Final Review (Everything) questions with answers

Beoordeling
-
Verkocht
-
Pagina's
96
Cijfer
A+
Geüpload op
28-06-2025
Geschreven in
2024/2025

CS 3113 - Final Review (Everything) questions with answers

Instelling
CS 3113
Vak
CS 3113

Voorbeeld van de inhoud

CS 3113 - Final Review (Everything) questions
|/ |/ |/ |/ |/ |/




with answers
|/ |/




With the attention that computer security is receiving in the
|/ |/ |/ |/ |/ |/ |/ |/ |/


media today, as a result of the numerous security breaches we
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


can read about, preventing, detecting, and prosecuting computer
|/ |/ |/ |/ |/ |/ |/ |/


crime has become easier. - CORRECT ANSWERS ✔✔False
|/ |/ |/ |/ |/ |/ |/ |/




An individual who blocks the traffic from an authorized user to a
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


system they are authorized to access is conducting which of the
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


following threat types? - CORRECT ANSWERS ✔✔Interruption
|/ |/ |/ |/ |/ |/ |/




An individual who simply "listens" to the traffic that is being sent
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


by an authorized user between systems is an example of which
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


of the following threat types? - CORRECT ANSWERS
|/ |/ |/ |/ |/ |/ |/ |/


✔✔Interception
|/




Which of the following is the name for a program that holds a
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


computer "hostage" while demanding a ransom? - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/


ANSWERS ✔✔Ransomware
|/ |/




Which of the following describes the "CIA Triad"? - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/ |/


ANSWERS ✔✔Confidentiality, integrity, Availability
|/ |/ |/ |/




Which level of threat includes disgruntled employees seeking to
|/ |/ |/ |/ |/ |/ |/ |/


harm your systems? - CORRECT ANSWERS ✔✔Unstructured
|/ |/ |/ |/ |/ |/ |/


Threats
|/

,Which of the following best describes the changes (if any) that
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


have occurred to the average intruder knowledge and the attack
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


sophistication over the last few decades? - CORRECT ANSWERS
|/ |/ |/ |/ |/ |/ |/ |/ |/


✔✔The average required intruder knowledge has decreased
|/ |/ |/ |/ |/ |/ |/


while the attack sophistication has increased.
|/ |/ |/ |/ |/ |/




What does the term "threat" refer to in computer security? -
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


CORRECT ANSWERS ✔✔Any potential threat that could cause an
|/ |/ |/ |/ |/ |/ |/ |/ |/


undesirable outcome - including natural disasters
|/ |/ |/ |/ |/ |/




Which of the following is the name for a program that appears to
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


do one thing (and may indeed do it) but that hides something
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


else? - CORRECT ANSWERS ✔✔Trojan Horse
|/ |/ |/ |/ |/ |/




Which of the following is the name for a program that reproduces
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


by attaching copies of itself to other programs and which often
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


carries a malicious "payload"? - CORRECT ANSWERS ✔✔Virus
|/ |/ |/ |/ |/ |/ |/ |/




Issues of proprietary software and trade secrets complicate the
|/ |/ |/ |/ |/ |/ |/ |/


application of the Open Design principle. In some cases
|/ |/ |/ |/ |/ |/ |/ |/ |/


companies may not want their designs made public, lest their
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


competitors use them. The principle then requires that the
|/ |/ |/ |/ |/ |/ |/ |/ |/


design and implementation be available to people barred from
|/ |/ |/ |/ |/ |/ |/ |/ |/


disclosing it outside of the company. - CORRECT ANSWERS
|/ |/ |/ |/ |/ |/ |/ |/ |/


✔✔True
|/




Which disclosure paradigm has as its assumptions that 1) an
|/ |/ |/ |/ |/ |/ |/ |/ |/


attacker will learn little or nothing from disclosure; 2) Disclosure
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


will prompt designers to improve the design of defenses, and 3)
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/

,|/ Disclosure will prompt other defenders to take action? - |/ |/ |/ |/ |/ |/ |/ |/


|/ CORRECT ANSWERS ✔✔Open Source |/ |/ |/




What is the name of the method of communication between two
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


computers (arbitrarily named here client and server) in which
|/ |/ |/ |/ |/ |/ |/ |/ |/


information is encoded, and possibly encrypted, into a sequence
|/ |/ |/ |/ |/ |/ |/ |/ |/


of port numbers? Initially, the server presents no open ports to
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


the public and is monitoring all connection attempts. The client
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


initiates connection attempts to the server by sending SYN
|/ |/ |/ |/ |/ |/ |/ |/ |/


packets to the ports specified in a special sequence. The server
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


offers no response to the client during this phase, as it "silently"
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


processes the port sequence. When the server decodes a valid
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


sequence it triggers a server-side process and response. -
|/ |/ |/ |/ |/ |/ |/ |/ |/


CORRECT ANSWERS ✔✔Port Knocking
|/ |/ |/ |/




What is the name given to a form of host-to-host communication
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


in which information flows across closed ports. Information may
|/ |/ |/ |/ |/ |/ |/ |/ |/


be encoded into a port sequence or a packet-payload. In general,
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


data are transmitted to closed ports and received by a
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


monitoring daemon which intercepts the information without
|/ |/ |/ |/ |/ |/ |/


sending a receipt to the sender. - CORRECT ANSWERS ✔✔Port
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


Knocking
|/




Can all issues with complexity be avoided through the use of one
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


of the secure design principles identified in class? - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


ANSWERS ✔✔No
|/ |/




The number of bugs introduced by a bug fix release may actually
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


exceed the number of bugs fixed by that release. - CORRECT
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


ANSWERS ✔✔True
|/ |/

, In cyber security, one of the best ways to protect a computer or
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


network is with a strategy called defense in depth. This strategy
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


means that there are multiple defenses put in place. If one fails,
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


it is likely another will catch the problem. Which method of
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


reducing complexity is this concept most closely aligned with? -
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


CORRECT ANSWERS ✔✔Layering
|/ |/ |/




When viewing a Drone Pilot app, the screen will show "flight
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


instruments" that indicate how fast the drone is flying and how
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


high it is off the ground. Which method is this an example of? -
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


CORRECT ANSWERS ✔✔Abstraction
|/ |/ |/




While a password should be long and complex so that it will be
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


difficult to break, the password should be easy for you to
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


remember. One way to do this is to take the first letter of each
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


word from a song that you know. Which design principle is this
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/ |/


most closely aligned with? - CORRECT ANSWERS ✔✔Simplicity
|/ |/ |/ |/ |/ |/ |/ |/




Which of the following was described as one of the main
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


drawback to the waterfall software development model? -
|/ |/ |/ |/ |/ |/ |/ |/


CORRECT ANSWERS ✔✔The Waterfall model does not easily
|/ |/ |/ |/ |/ |/ |/ |/


accommodate change after the process is underway. One phase
|/ |/ |/ |/ |/ |/ |/ |/ |/


has to be completed before moving onto the next phase.
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/




Which of the following are advantages of an iterative design
|/ |/ |/ |/ |/ |/ |/ |/ |/


process? - CORRECT ANSWERS ✔✔B,C,D, but not A
|/ |/ |/ |/ |/ |/ |/ |/




A....It results in the fastest development of software; it is the
|/ |/ |/ |/ |/ |/ |/ |/ |/ |/


quickest design process.
|/ |/ |/

Geschreven voor

Instelling
CS 3113
Vak
CS 3113

Documentinformatie

Geüpload op
28 juni 2025
Aantal pagina's
96
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$24.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMSTUDYPLUG Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
355
Lid sinds
3 jaar
Aantal volgers
107
Documenten
20448
Laatst verkocht
4 dagen geleden
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lees meer Lees minder
4.5

238 beoordelingen

5
161
4
51
3
14
2
5
1
7

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen