CHAPTER NO. 01: OVERVIEW
ANSWER TO THE QUESTIONS
TRUE/FALSE
1. F
2. T
3. T
4. T
5. F
6. T
7. T
8. F
9. T
10. T
11. T
12. F
13. T
14. T
15. F
,MULTIPLE CHOICE
1. C
2. A
3. A
4. D
5. B
6. C
7. B
8. A
9. B
10. D
11. A
12. C
13. B
14. D
15. A
SHORT ANSWER
1. COMPUTER SECURITY
2. CIA TRIAD
3. AVAILABILITY
4. INTEGRITY
, 5. ATTACK
6. COUNTERMEASURE
7. USURPATION
8. DATA
9. PASSIVE
10. ACTIVE
11. CONTINGENCY
12. RISK
13. MECHANISMS
14. LEAST COMMON MECHANISM
15. RECOVERY
CHAPTER NO. 02: CRYPTOGRAPHIC TOOLS
ANSWER TO THE QUESTIONS
TRUE/FALSE QUESTIONS:
16. T
17. T
18. F
19. T
20. F
, 21. T
22. F
23. T
24. F
25. T
26. T
27. F
28. F
29. T
30. T
MULTIPLE CHOICE QUESTIONS:
16. D
17. A
18. B
19. B
20. C
21. A
22. C
23. D
24. B
25. A