Principles of Computer Security 5Th Ed by Wm. Arthur Conklin - Test Bank
Chapter 02
General Security Concepts
Multiple Choice Questions
1. (p. 21) ___________ places the focus on the security processes and the actual data.
A. Computer security
B. Network security
C. Information assurance
D. Communications security
Difficulty: Easy
2. (p. 21) The term which refers to the attempt to gain unauthorized access to systems and computers used by a telephone company to operate its telephone network is a _______.
A. phone hacker
B. hacktivist
C. commh@ck3r
D. phreaker
Difficulty: Easy
3. (p. 22) Jane is in the finance department. Although she should not be able to open files or folders from the marketing department, she can and does. This a problem of ___________.
A. confidentiality
B. integrity
C. availability
D. authentication
E. nonrepudiation
Difficulty: Easy
4. (p. 22) Jane is in the finance department. Although she should not be able to modify files or folders from the marketing department, she can, and does. This a problem of ___________.
A. confidentiality
B. integrity
C. availability
D. authentication
E. nonrepudiation
Difficulty: Easy
5. (p. 22) Bob inadvertently disconnects the cable from the company file server. This creates a problem of ________.
A. confidentiality
B. integrity
C. availability
D. authentication
E. nonrepudiation
Difficulty: Easy
6. (p. 22) Joe sends a scathing e-mail to his boss regarding increased work hours. Joe tries to deny sending the e-mail, but is unable to due to the use of digital signatures. This is an example of ________.
A. confidentiality
B. integrity
C. availability
D. authentication
E. nonrepudiation
Difficulty: Easy