Test I, CSCI 277, Fall 2022
- The weight for each question is given.
- Use as much paper as you wish, but make your answers are legible.
- Please label your answers with the question number.
- Please answer each question thoughtfully and carefully. Your answers should reflect participation in this class.
- Vulnerability, Threat, Control
- [6 points] Define each.
- [6 points] Consider the computer hardware in a public lab.
- Describe an associated vulnerability.
- Describe a threat associated with this vulnerability.
- Describe a control to counter this threat.
- [3 points] Are all threats due to a human actor? Why or why not?
- C-I-A security triad.
- [6 points] Name and describe the three components of this triad.
- [6 points] Consider the computer hardware in a public lab. Discuss how that hardware could be vulnerable to each component of the CIA triad.
- [4 points] Name and describe one of the common types of attackers. Describe the risks and a risk level associated with this type of attacker.
- [4 points] What is an advanced persistent threat?
- The chapter described three distinct classes of controls.
- [6 points] Name and describe each
- [3 points] Give an example of each.
- Rootly Powers
- [6 points] Name and or describe the three powers associated with root on a linux system.