Abstraction and Information Hiding
Minimization and Simplicity
Layering and Modularization
Resource Encapsulation and Process Isolation
Least Privilege and Domain Separation
100
Caesar Cipher is a very simple way to encrypt messages. It is known as a substitution cipher. Which principle applies to the Caesar Cipher?
What is Information Hiding
100
You perform a scan on a network server and find there are many ports open. What principle is the server NOT implementing?
What is minimization
100
In cyber security, one of the best ways to protect a computer or network is with a strategy called "defense in depth." This strategy means that there are multiple defenses put in place. If one fails, it is likely another will catch the problem. Which principle does this strategy belong to?
What is Layering
100
You are running two or more programs on a computer. One program crashes, but the other program continues to run. The ability for the other program to continue to run is a result of which principle?
What is Process Isolation
100
Jake opened an email that looked suspicious because he thought he may have won $5,000. He downloaded a program that turned out to be a virus. Since he was logged in as the administrator, all other users on the computer got infected. Which principle did Jake violate by being logged in as administrator?
What is Least Privilege
200
Wifi signals are invisible to the human eye. There are devices we can use to measure the signal and to determine their strength as well as other characteristics. Using a device to see information about wifi signals is a function of which domain?
What is Abstraction
200
Breaking activities down into smaller pieces that are understandable and can easily be tested is known as the principle of _________
What is Simplicity
200
Many computers are built with parts that can easily be taken out and replaced with other parts. This makes it easier to troubleshoot and fix. Which principle does this description belong to?
What is Modularity
200
When you pilot the AR Drone from the iPad, you use the AR Drone app. If the app crashes, you are still able to use other apps or restart the AR Drone app. This is an example of which principle?
What is Process Isolation
200
One way to separate all the activities on one network from another network is by using a device called a router. Using a router this way is an example of which principle?
What is Domain Separation
300
WPA2 (Wi-fi Protected Access 2) is one of the best ways to protect a wifi network. Which principle does this cybersecurity countermeasure belong to?
What is Information Hiding
300
The statement "complexity is the enemy of security" supports which principle?
What is Simplicity
300
The AR.Drone 2 has different hulls (outer shells) that can be attached for indoor or outdoor use. You can also change batteries when one runs out, so you can continue to fly. Which principle does this description belong to?
What is Modularity
300
Ensuring that a resource is only used in the manner it was intended to be used is an example of which principle?
What is Resource Encapsulation
300
Dividing the users of a network into two groups so that they each have their own area to work with is an example of which principle?
What is Domain Separation
400
In Linux there are programs that will display information such as how hard the CPU is working, or how much memory is being used. These kinds of programs help us to ______ (abstraction)
What is to understand how the computer is working and to troubleshoot problems.
400
"Sally has written a vary large program that does many different things. Her program does not work and she is having difficulty troubleshooting it. What principle can she incorporate to help make her program more manageable."
What is minimization
400
Making sure you have strong passwords, antivirus installed, and a personal firewall on your computer is an example of which principle?
What is Layering
400
A hard drive can be used for storage. The storage device can then be used by users connected to a network. What principle can be used to make sure that this drive is shared properly?
What is Resource Encapsulation
400
Using blank passwords is generally a bad idea. It is especially bad if other people on the network can access your computer. It would mean they would not need a password to access your files. Which principle is violated with this practice?
What is Least Privilege
500
When you take "selfies" with your smart phone, it may contain something called a geotag. A geotag reveals your exact location on a map. How would you practice information hiding.
What is removing the geotag
500
An example of a mainstream webpage that is an example of Simplicity of Design.
What is google.com
500
Object oreiented programming is a method of programming that breaks a program down in to lines of code called objects. These objects can be easily replaced with other objects. This type of programming uses what principle?
What is Modularization
500
An example of Process Isolation
What is writing a program so that it does NOT interfere with other programs or access another programs memory is a function of which principle?
500
Giving computer users different user id's and passwords to log in allows each user to have their own set of files and applications. This prevents different users of the computer from accessing, using or modifying each others files or programs. Which principle does this description belong to?
What is both Domain Separation and Least Privilege
M
e
n
u