CIS 377 Midterm Questions FA23

docx

School

Community College of Baltimore County *

*We aren’t endorsed by this school

Course

377

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

1

Uploaded by ElderRiverKomodoDragon20

Report
CIS 377 – Introduction to Cybersecurity Midterm Answer all questions 1. The first phase of risk management is _________. 2. A device (or a software program on a computer) that can monitor data traveling on a network is known as a _________ sniffer. 3. True/False: Confidentiality ensures that only those with the rights and privileges to access information are able to do so. 4. A technique used to compromise a system is known as a(n) ___________. 5. True/False: A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. 6. True/False: Risk control is the application of controls that reduce the risks to an organization’s information assets to an acceptable level. 7. True/False: To determine if the risk to an information asset is acceptable or not, you estimate the expected loss the organization will incur if the risk is exploited. 8. True/False Most computer criminals are not really "criminals". 9. True/False: To determine if the risk to an information asset is acceptable or not, you estimate the expected loss the organization will incur if the risk is exploited. 10. True/False: One form of e-mail attack that is also a DoS attack is called a mail bomb, in which an attacker overwhelms the receiver with excessive quantities of e-mail. 11. True/False: During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage. 12. True/False Malware is a generic term for software that has a malicious purpose. 13. True/False The Health Insurance Portability and Accountability Act of 1996 requires government agencies to identify sensitive systems, conduct computer security training, and develop computer security plans. 14. True/False: To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security level must allow reasonable access, yet protect against threats. 15. True/False: Confidentiality ensures that only those with the rights and privileges to access information are able to do so. ESSAY 16. What is the difference between vulnerability and exposure? 17. What are the three components of the C.I.A. triad? What are they used for? 18. What is DRP? What is BCP? 19. List at least three methods to defend against cyberattacks. 20. Caesar cipher with a shift key of 5 Plaintext: INNER HARBOR IN BALTIMORE CITY Ciphertext: Classification: Internal Classified as Confidential
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help