Security and Performance
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Hard
Tom Doan
Used 7+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Is this statement true or false?
"The security goal is to make sure that the agents (people or external systems) who interact with a computer system, its data, and its resources, are those that the owner of the system would NOT wish to have such interactions."
True
False
2.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
What is NOT a security need?
Secrecy: control of who gets to read information
Integrity: control of how information changes or resources are used
Availability: providing prompt access to information and resources
Accountability: knowing who has had access to resources
Hackability: providing prompt access for individuals with expertise
3.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are security dangers? There are more than one answer
Damage to information
Disruption of service
Theft of money
Theft of information
Loss of privacy
4.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Is this statement true or false?
"Building secure systems adds cost and time to software development"
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Is this statement true or false?
"Security always assume the best of people: people are intrinsically secured, and in rare cases they make security mistakes, it is always unintentional"
True
False
Answer explanation
- Many security problems come from people inside the organization
- People are intrinsically insecure
6.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are the key points in system design to address security risks from people inside of the organization? There are more than one answer
Make it easy for responsible people to use the system (e.g., make security procedures simple)
Make it hard for dishonest or careless people (e.g., password management)
Train people in responsible behavior
Test the security of the system thoroughly and repeatedly, particularly after changes
Do not hide violations
7.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
Which is NOT an aspect to minimize risk from external intruders?
System design — secure protocols, authentication, barriers to access
Programming — defensive programming and rigorous testing
Operating procedures — backup, auditing, vulnerability testing
Training and monitoring personnel
Turning off servers during a cyber attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
A Level CS - 06 Boolean Algebra & Logic Gates
Quiz
•
11th - 12th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
20 questions
Designing Network Infrastructure and Network Security
Quiz
•
KG - University
16 questions
Digital Icons
Quiz
•
12th Grade - University
20 questions
Google SketchUp Tool
Quiz
•
KG - University
22 questions
Steve Jobs
Quiz
•
6th - 12th Grade
15 questions
Unbound Report Quiz
Quiz
•
9th - 12th Grade
15 questions
Code.org Lesson 1-14
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
