Rochester Institute of Technology (RIT)
Department of the Computing Security
FALL 2020
CSEC 102
MIDTERM EXAM
Instructions
Total mark 100points
Close book, closed notes
No mobile devices are allowed
You have 1h30min to complete the exam
Be sure to include your name and RIT ID in the paper
Upload the exam into My Course -Assignments tab as file:
First_LastName_MIDTERM.doc
MCQ T/F Matching Short Definition Total
(30pts) (20pts (20pts) Answers s (10pts) Score
) (20pts)
Score
Student Name:
RIT ID:
GOOD LUCK
Page 1
, A. MULTIPLE CHOICE (30 points)
Highlight the correct answer for each question.
Q1[2pts] Which type of access control focuses on assigning privileges based on security
clearance and data sensitivity?
a. MAC
b. RBAC
c. TBAC
d. DAC
Q2[2pts]: Which of the following is used for identification?
a. Username
b. Password
c. PIN
d. Cognitive question
Q3[2pts]: HIPPA is a set of federal regulations that define security guideline’s that enforce the
protection of what?
a. Privacy
b. Non-repudiation
c. Integrity
d. Availability
Q4[2pts]: Which of the following is an example of a decentralized privilege management
solution? [Select two]
a. TACACS+
b. PAP
c. RADIUS
d. CHAP
Q5[2pts] Chris is writing a document that provides step-by-step instructions for end users
seeking to update the security software on their computers. Performing these updates is
mandatory. Which type of document is Chris writing?
a Policy
b. Standard
c. Guideline
d. Procedure
Page 2
Department of the Computing Security
FALL 2020
CSEC 102
MIDTERM EXAM
Instructions
Total mark 100points
Close book, closed notes
No mobile devices are allowed
You have 1h30min to complete the exam
Be sure to include your name and RIT ID in the paper
Upload the exam into My Course -Assignments tab as file:
First_LastName_MIDTERM.doc
MCQ T/F Matching Short Definition Total
(30pts) (20pts (20pts) Answers s (10pts) Score
) (20pts)
Score
Student Name:
RIT ID:
GOOD LUCK
Page 1
, A. MULTIPLE CHOICE (30 points)
Highlight the correct answer for each question.
Q1[2pts] Which type of access control focuses on assigning privileges based on security
clearance and data sensitivity?
a. MAC
b. RBAC
c. TBAC
d. DAC
Q2[2pts]: Which of the following is used for identification?
a. Username
b. Password
c. PIN
d. Cognitive question
Q3[2pts]: HIPPA is a set of federal regulations that define security guideline’s that enforce the
protection of what?
a. Privacy
b. Non-repudiation
c. Integrity
d. Availability
Q4[2pts]: Which of the following is an example of a decentralized privilege management
solution? [Select two]
a. TACACS+
b. PAP
c. RADIUS
d. CHAP
Q5[2pts] Chris is writing a document that provides step-by-step instructions for end users
seeking to update the security software on their computers. Performing these updates is
mandatory. Which type of document is Chris writing?
a Policy
b. Standard
c. Guideline
d. Procedure
Page 2