100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden 4.2 TrustPilot
logo-home
Prüfung

Test Bank - Computer Security Fundamentals, 4th Edition by William (Chuck) Easttom II, All Chapters Fully Covered | Latest Edition.

Bewertung
-
Verkauft
-
seiten
58
Klasse
A+
Hochgeladen auf
21-08-2025
geschrieben in
2025/2026

Test Bank - Computer Security Fundamentals, 4th Edition by William (Chuck) Easttom II, All Chapters Fully Covered | Latest Edition.

Hochschule
Computer Security Fundamentals, 4th Edition
Kurs
Computer Security Fundamentals, 4th Edition











Ups! Dein Dokument kann gerade nicht geladen werden. Versuch es erneut oder kontaktiere den Support.

Verknüpftes buch

Schule, Studium & Fach

Hochschule
Computer Security Fundamentals, 4th Edition
Kurs
Computer Security Fundamentals, 4th Edition

Dokument Information

Hochgeladen auf
21. august 2025
Anzahl der Seiten
58
geschrieben in
2025/2026
Typ
Prüfung
Enthält
Fragen & Antworten

Themen

Inhaltsvorschau

True / False

1. The Domain Name Service is what translates human-readable domain names into IP
addresses that computers and routers understand.
True

2. The type of hacking that involves breaking into telephone systems is called sneaking.
False—This type of hacking is called phreaking.

3. The technique for breaching a system’s security by exploiting human nature rather than
technology is war-driving.
False—This describes social engineering.

4. Malware is a generic term for software that has a malicious purpose.
True

5. Software that lays dormant until some specific condition is met is a Trojan horse.
False—This describes a logic bomb. Usually the condition that is met is a date
and time.

6. Someone who breaks into a system legally to assess security deficiencies is a sneaker.
True—Companies may solicit the services of a sneaker to assess the company’s
vulnerabilities.

7. Auditing is the process to determine if a user’s credentials are authorized to access a
network resource.
False—This describes authentication. Auditing is the process to review logs,
records, and procedures.

8. Confidentiality, integrity, and availability are three pillars of the CIA triangle.
True

9. The Health Insurance Portability and Accountability Act of 1996 requires government
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False—This describes the Computer Security Act of 1987.

10The SANS Institute website is a vast repository of security-related documentation.
True


Multiple Choice

1. In which type of hacking does the user block access from legitimate users without
actually accessing the attacked system?
a. Denial of service




SCHOLARVAULT

, b. Web #nhattack
c. Session #nhhijacking
d. None #nhof #nhthe #nhabove

Answer #nhA. #nhA #nhdenial-of-service #nhattack #nhis #nhprobably #nhthe #nhmost #nhcommon #nhattack #nhon
#nhthe #nhweb.




2. Your #nhcompany #nhis #nhinstituting #nha #nhnew #nhsecurity #nhawareness #nhprogram. #nhYou #nhare
#nhresponsible #nhfor #nheducating #nhend #nhusers #nhon #nha #nhvariety #nhof #nhthreats, #nhincluding #nhsocial

#nhengineering. #nhWhich #nhof #nhthe #nhfollowing #nhbest #nhdefines #nhsocial #nhengineering?

a. Illegal #nhcopying #nhof #nhsoftware
b. Gathering #nhinformation #nhfrom #nhdiscarded #nhmanuals #nhand #nhprintouts
c. Using #nhpeople #nhskills #nhto #nhobtain #nhproprietary #nhinformation
d. Destruction #nhor #nhalteration #nhof #nhdata

Answer #nhD. #nhSocial #nhEngineering #nhis #nhbasically #nhusing #nhpeople #nhskills #nhto #nhgather
#nhinformation




3. Which #nhtype #nhof #nhhacking #nhoccurs #nhwhen #nhthe #nhattacker #nhmonitors #nhan
#nhauthenticated #nhsession #nhbetween #nhthe #nhclient #nhand #nhthe #nhserver #nhand #nhtakes #nhover

#nhthat #nhsession?

a. Denial #nhof #nhservice
b. Web #nhattack
c. Session #nhhijacking
d. None #nhof #nhthe #nhabove

Answer #nhC.

4. Someone #nhwho #nhfinds #nha #nhflaw #nhin #nha #nhsystem #nhand #nhreports #nhthat #nhflaw #nhto
#nhthe #nhvendor #nhof #nhthe #nhsystem #nhis #nha #nh .
a. White #nhhat #nhhacker
b. Black #nhhat #nhhacker
c. Gray #nhhat #nhhacker
d. Red #nhhat #nhhacker

Answer #nhA. #nhWhite #nhhat #nhhackers #nhare #nhoften #nhhired #nhby #nhcompanies #nhto #nhdo #nhpenetration
#nhtests.




5. Someone #nhwho #nhgains #nhaccess #nhto #nha #nhsystem #nhand #nhcauses #nhharm #nhis #nha #nh ?
a. White #nhhat #nhhacker
b. Black #nhhat #nhhacker
c. Grey #nhhat #nhhacker
d. Red #nhhat #nhhacker
Answer #nhB. # n h A #nhblack #nhhat #nhhacker #nhmight #nhsteal #nhdata, #nherase #nhfiles, #nhor #nhdeface
#nhwebsites.




6. A #nhblack #nhhat #nhhacker #nhis #nhalso #nhcalled #nha #nh
a. Thief
b. Cracker
c. Sneaker
SCHOLARVAULT

,d. None #nhof #nhthe #nhabove




SCHOLARVAULT

, Answer #nhB.

7. Someone #nhwho #nhcalls #nhhimself #nha #nhhacker #nhbut #nhlacks #nhthe #nhexpertise #nhis #nha #nh .
a. Script #nhkiddy
b. Sneaker
c. White #nhhat #nhhacker
d. Black #nhhat #nhhacker

Answer #nhA. # n h There #nhare #nhmany #nhInternet #nhtools #nhthat #nhcan #nhbe #nhused #nhto #nhperform
#nhhacking #nhtasks, #nhand #nhusers #nhof #nhthese #nhtools #nhwho #nhdon’t #nhunderstand #nhthe #nhtarget

#nhsystem #nhare #nhscript #nhkiddies.




8. Someone #nhwho #nhlegally #nhbreaks #nhinto #nha #nhsystem #nhto #nhassess #nhsecurity #nhdeficiencies #nhis #nha
.
a. Script #nhkiddy
b. Penetration #nhtester
c. White #nhhat #nhhacker
d. Black #nhhat #nhhacker

Answer #nhB. #nhAnyone #nhhired #nhto #nhassess #nhthe #nhvulnerabilities #nhof #nha #nhsystem #nhshould #nhbe
#nhboth #nhtechnically #nhproficient #nhand #nhethical.




9. A(n) #nh is #nha #nhbasic #nhsecurity #nhdevice #nhthat #nhfilters #nhtraffic #nhand #nhis #nha
#nhbarrier #nhbetween #nha #nhnetwork #nhand #nhthe #nhoutside #nhworld #nhor #nhbetween #nha #nhsystem

#nhand #nhother #nhsystems.

a. Firewall
b. Proxy #nhserver
c. Intrusion #nhdetection #nhsystem
d. Network #nhMonitor

Answer #nhA. #nhA #nhfirewall #nhcan #nhbe #nha #nhserver, #nha #nhrouter, #nhor #nhsoftware #nhrunning #nhon #nha
#nhmachine.




10. A(n) #nhhides #nhthe #nhinternal #nhnetwork’s #nhIP #nhaddress #nhand #nhpresents #nha #nhsingle #nhIP
#nhaddress #nhto #nhthe #nhoutside #nhworld.

a. Firewall
b. Proxy #nhserver
c. Intrusion #nhdetection #nhsystem
d. Network #nhMonitor

Answer #nhB.

11. Which #nhone #nhof #nhthese #nhis #nhNOT #nhone #nhthe #nhthree #nhpillars #nhof #nhsecurity #nhin #nhthe #nhCIA
#nhtriangle?

a. Confidentiality
b. Integrity
c. Availability
d. Authentication

SCHOLARVAULT

Lerne den Verkäufer kennen

Seller avatar
Bewertungen des Ansehens basieren auf der Anzahl der Dokumente, die ein Verkäufer gegen eine Gebühr verkauft hat, und den Bewertungen, die er für diese Dokumente erhalten hat. Es gibt drei Stufen: Bronze, Silber und Gold. Je besser das Ansehen eines Verkäufers ist, desto mehr kannst du dich auf die Qualität der Arbeiten verlassen.
ScholarVault West Virgina University
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
16
Mitglied seit
5 Jahren
Anzahl der Follower
1
Dokumente
559
Zuletzt verkauft
1 Jahren vor
StudyHub: I provide A+ solutions in Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology, and many other subjects.

Greetings, Are you tired of scouring for reliable study materials? Look no further! I'm here to provide you with accurate, comprehensive, and current study documents to ace your quizzes, assignments, midterms, and final exams. Whatever your study needs may be, I've got you covered. Feel free to reach out for assistance with any study materials, and don't hesitate to refer me to your friends. Thank you for choosing my services, and welcome to your solution! Best regards,

Mehr lesen Weniger lesen
3,0

1 rezensionen

5
0
4
0
3
1
2
0
1
0

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen