Preview

Database Exam Paper

Powerful Essays
Open Document
Open Document
4799 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Exam Paper
Exam Name___________________________________

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) With the introduction of the computer the need for automated tools for protecting files and other information stored on the computer became evident. 2) There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a security failure occurs. 3) There are clear boundaries between network security and internet security. 4) The CIA triad embodies the fundamental security objectives for both data and for information and computing services. 5) In developing a particular security mechanism or algorithm one must always consider potential attacks on those
…show more content…
7) Patient allergy information is an example of an asset with a moderate requirement for integrity. 8) The more critical a component or service, the higher the level of availability required. 9) Data origin authentication provides protection against the duplication or modification of data units. 10) The emphasis in dealing with passive attacks is on prevention rather than detection. 11) Data integrity is the protection of data from unauthorized disclosure. 12) Information access threats exploit service flaws in computers to inhibit use by legitimate users. 13) Viruses and worms are two examples of software attacks. 14) A connection-oriented integrity service deals with individual messages without regard to any larger context and generally provides protection against message modification only. 15) Pervasive security mechanisms are not specific to any particular OSI security service or protocol layer. MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 16) _________ security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. A) …show more content…
102) The private key is known only to its owner. 103) The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms. 104) The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants. 105) Even in the case of complete encryption there is no protection of confidentiality because any observer can decrypt the message by using the sender's public key. MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 106) ________ protects against passive attack (eavesdropping). A) SCR B) Message authentication C) Encryption D) Obfuscation 107) The most important hash function is ________ . A) MAC B)

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    7) Which of the tenets of information security most directly serves the needs of authorized users? A) Availability…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    DBM 380 (Data Base Management) Complete Course Material Click on The Link Below to Purchase A+ Work http://hwminute.com/downloads/dbm-380-data-base-management-complete-course-material/ DBM 380 Week 1 DQ 2.docx DBM 380 Week 1 DQ 1.docx DBM 380 Week 1 Individual Assignment Database Design Paper.docx DBM 380 Week 2 DQ 2.docx DBM 380 Week 2 Individual Assignment; Database Management Systems Paper.docx DBM 380 Week 2 DQ 1.docx DBM 380 Week 3 DQ 1.docx DBM 380 Week 3 DQ 2.docx DBM 380 Week 3 Individual Assignment Driving Log.accdb DBM 380 Week 3 Individual Assignment Driving Log.zip DBM 380 Week 3 Individual Assignment ERD.pdf DBM 380 Week 3 Individual Assignment ERD.zip DBM 380 Week 3 Individual Assignment.zip DBM 380 Week 3 Individual Assignment ERD.pdf DBM 380 Week 3 Individual Assignment ERD.zip DBM 380 Week 4 DQ 1.docx DBM 380 Week 4 DQ 2.docx DBM 380 Week 4 Explaination Of Normalization.docx DBM 380 Week 4 Individual Assignment ERD.zip DBM 380 Week 4 Indiviual Assignment Driving Log Relationships.accdb DBM 380 Week 4 Indiviual Assignment Driving Log Relationships.zip DBM 380 Week 4 Individual Assignment ERD.pdf DBM 380 Week 5 DQ 1.docx DBM 380 Week 5 DQ 2.docx DBM 380 Week 5 LT Database FINAL.accdb DBM 380 Week 5 LT Database FINAL.zip DBM 380 Week 5 LT Huffman PowerPoint REVISED.pptx DBM 380 Week 5 LT Huffman Trucking SR-ht-003.docx DBM 380 Week 5 LT Huffman Trucking SR-ht-003.docx $30.00 – Purchase DBM 380 (Data Base Management) Complete Course Material Click on The Link Below to Purchase A+ Work http://hwminute.com/downloads/dbm-380-data-base-management-complete-course-material/ DBM 380 Week 1 DQ 2.docx DBM 380 Week 1 DQ 1.docx DBM 380 Week 1 Individual Assignment Database Design Paper.docx DBM 380 Week 2 DQ 2.docx DBM 380 Week 2 Individual Assignment; Database Management Systems Paper.docx DBM 380 Week 2 DQ 1.docx DBM 380 Week 3 DQ 1.docx DBM 380 Week 3 DQ 2.docx DBM 380 Week 3 Individual Assignment Driving…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Referential Integrity empowers you to support a predictable and accepted database. For instance, in a patient database you may need to guarantee that no patients might be entered into the framework without an extraordinary patient ID. Else, you could wind up with a failure to rapidly record, sort and discover patients who have relating scenes of forethought, arrangements, authentic cases, and so forth.…

    • 1097 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 7 Integrity Maintain valid, uncorrupted, and accurate information.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    MDM4U – Grade 12 Data Management – Exam Unit 1: One Variable Analysis Types of Data Numerical Data Discrete: consists of whole numbers Ie. Number of trucks. Continuous: measured using real numbers Ie, Measuring temperature.…

    • 2372 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Identify legislation and codes of practice that relate to handling information in social care settings…

    • 355 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Error checking, recovery Protection against system failures Reliability, availability Proscribe unsafe or insecure behaviors Can sometimes be expressed as functional requirements…

    • 728 Words
    • 3 Pages
    Good Essays