100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Security Fundamentals (5th Edition) – Pre & Post Assessment Questions | William Easttom.

Rating
-
Sold
-
Pages
61
Grade
A+
Uploaded on
11-06-2025
Written in
2024/2025

Computer Security Fundamentals (5th Edition) – Pre & Post Assessment Questions | William Easttom.

Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals

Document information

Uploaded on
June 11, 2025
Number of pages
61
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

lkjhgfdsa All Chapters Included



Post-Assessment / Computer Security Fundamentals (Easttom)
All Answers Included
Question #1
Question: A hides the internal network’s IP address and presents a single IP
address to the outside world.
A. Firewall
B. Proxy server
C. Intrusion detection system
D. Network Monitor
Answer: B
Explanation of answer: A proxy server is often used with a firewall to hide the internal network’s
IP address and present a single IP address (its own) to the outside world. In fact, today’s modern
firewalls offer proxy functionality so an external proxy server is often not required.
Chapter this maps to: Chapter 1 Introduction to Computer Security


Question #2
Question: A black hat hacker is also called a
A. Thief
B. Cracker
C. Sneaker
D. None of the above
Answer: B
Explanation of answer: A black hat hacker upon gaining access to a system, causes intentional
harm and has a malicious intent. The black hat might steal data, erase files, or deface websites.
Black hat hackers are sometimes referred to as crackers.
Chapter this maps to: Chapter 1 Introduction to Computer Security


Question #3
@



Question: Someone who calls himself a hacker but lacks the expertise is a .
A. Script kiddy
B. Sneaker
C. White hat hacker
Ap



D. Black hat hacker
Answer: A
Explanation of answer: There are many Internet tools that can be used to perform hacking tasks,
and users of these tools who don’t understand the target system are script kiddies.
lu



Chapter this map to: Chapter 1 Introduction to Computer Security
s st



Question #4
Question: A(n) is a basic security device that filters traffic and is a barrier between a
network and the outside world or between a system and other systems.
uv



A. Firewall
B. Proxy server
ia




kiujytrfew
@Testbanksmafia

, lkjhgfdsa


C. Intrusion detection system
D. Network Monitor
Answer: A
Explanation of answer: A firewall is a barrier between a network and the outside world.
Sometimes a firewall takes the form of a standalone server, sometimes a router, and sometimes
software running on a machine. Whatever its physical form, a firewall filters traffic entering and
exiting the network.
Chapter this maps to: Chapter 1 Introduction to Computer Security

Question #5
Question: Which of these is a repository of security-related documentation and also sponsors a
number of security research projects?
A. Computer Emergency Response Team
B. F-Secure
C. SANS Institute
D. Microsoft Security Advisor
Answer: C
Explanation of answer: The SANS Institute website (www.sans.org) is a vast repository of
security-related documentation. On this site, you will find detailed documentation on virtually
every aspect of computer security you can imagine.
Chapter this maps to: Chapter 1 Introduction to Computer Security

Question #6
Question: CIA explains the three pillars of security. What does ‘I’ stand for in CIA?
A. Information
B. Intermission
C. Intermittent
D. Integrity
Answer: D
Explanation of answer: CIA references the three pillars of security: Confidentiality, Integrity,
@



and Availability. The Integrity pillar takes into account the factors that may affect the integrity of
information in motion or at rest.
Chapter this maps to: Chapter 1 Introduction to Computer Security
Ap



Question #7
Question: Someone who was previously a criminal but has turned ethical is known as a
?
A. White hat hacker
lu



B. Black hat hacker
C. Gray hat hacker
D. Red hat hacker
s



Answer: C
Explanation of answer: There are a few other terms you should be familiar with. A gray hat
st



hacker is one who was previously a black hat hacker and turned into a white hat hacker.
(Basically, a former criminal now turned ethical.)
Chapter this maps to: Chapter 1 Introduction to Computer Security
uv




Question #8
ia




kiujytrfew
@Testbanksmafia

, lkjhgfdsa


Question: Which TCP/IP protocol operates on port 80 and displays web pages?
A. FTP
B. SMTP
C. HTTP
D. DNS
Answer: C
Explanation of answer: HTTP (Hyper Text Transfer Protocol) is responsible for displaying the web
pages on the Internet and any Intranet websites. HTTP leverages TCP port 80 by default. Tomcat
and IIS are common examples of HTTP servers.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #9
Question: Internet addresses of the form www.google.com is known as what?
A. User-friendly web addresses
B. Uniform resource locators
C. User-accessible web addresses
D. Uniform address identifiers
Answer: B
Explanation of answer: When you type www.google.com into your web browser, your
computer, or your ISP, must translate the name you typed in known as a uniform resource
locator (URL) into an IP address. This is done with help of DNS protocol.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #10
Question: Which U.S. government agency created the distributed network that formed the basis
for the Internet?
A. Advanced Research Projects Agency
B. Central Intelligence Agency
C. NASA
D. Department of Energy
@



Answer: A
Explanation of answer: ARPA or Advanced Research Projects Agency commissioned the
construction of ARPANET, a simple Internet web of four points (called nodes): UCLA, Stanford,
UC Berkley, and the University of Utah. Although no one knew it at the time, this small web was
Ap



the birth of what would become the Internet.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #11
lu



Question: The TCP protocol operates at what layer of the OSI model?
A. Transport
B. Application
s



C. Network
D. Data link
st



Answer: A
Explanation of answer: OSI Stack is depicted as follows:
uv
ia




kiujytrfew
@Testbanksmafia

, lkjhgfdsa




TCP operates at transport layer and is responsible for providing connection oriented services.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #12
Question: Which TCP/IP protocol operates on port 53 and translates URLs into web addresses?
A. FTP
B. SMTP
C. HTTP
D. DNS
Answer: D
Explanation of answer: DNS (Domain Name Service) translates URLs into web addresses. DNS
works on UDP port 53.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #13
Question: Which layer of the OSI model is divided into two sublayers: Media Access Control and
@



Logical Link Control?
A. Data link
B. Network
C. Presentation
Ap




D. Session
Answer: A
Explanation of answer: The Data Link layer describes the logical organization of data bits
transmitted on a particular medium. Data link is divided into two sublayers: the Media Access
lu



Control layer (MAC) and the Logical Link Control layer (LLC).
Chapter this maps to: Chapter 2 Networks and the Internet
s



Question #14
Question: Which of the following is the process to try to induce someone to provide you with
st



personal information?
A. Cyberstalking
B. Looping
uv



C. Phishing
D. Licensing
ia




kiujytrfew
@Testbanksmafia

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Testbanksmafia Michigan State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
160
Member since
1 year
Number of followers
12
Documents
445
Last sold
14 hours ago
Test Banks, Solution Manuals, Case studies, Summaries, Essays, and Exclusive Package Deals, All Graded A+.

Welcome to my store! In need to elevate your academic grades? search no more. Here you'll find thousands of comprehensive 5-star rated resources designed to empower you on your academic journey. I'm dedicated to provide you with top-quality, accurate , reliable , verified and latest updated documents with 100% pass guarantee. Your success is our priority, Let's achieve those top grades together !!!

4.6

14 reviews

5
11
4
2
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions