100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank for Network Security Essentials Applications and Standards, 5th Edition William Stallings

Rating
-
Sold
-
Pages
249
Grade
A+
Uploaded on
16-08-2025
Written in
2025/2026

Test Bank for Network Security Essentials Applications and Standards, 5th Edition William Stallings












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 16, 2025
Number of pages
249
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

TEST BANK




TEST BANK

,Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings


CHAPTER 1: INTRODUCTION


TRUE OR FALSE

T F 1. With the introduction of the computer the need for automated
tools for protecting files and other information stored on the
computer became evident.

T F 2. There is a natural tendency on the part of users and system
managers to perceive little benefit from security investment until a
security failure occurs.

T F 3. There are clear boundaries between network security and internet
security.

T F 4. The CIA triad embodies the fundamental security objectives for
both data and for information and computing services.

T F 5. In developing a particular security mechanism or algorithm one
must always consider potential attacks on those security features.


T F 6. A loss of confidentiality is the unauthorized modification or
destruction of information.

T F 7. Patient allergy information is an example of an asset with a
moderate requirement for integrity.

T F 8. The more critical a component or service, the higher the level of
availability required.

T F 9. Data origin authentication provides protection against the
duplication or modification of data units.

T F 10. The emphasis in dealing with passive attacks is on prevention
rather than detection.

T F 11. Data integrity is the protection of data from unauthorized
disclosure.

T F 12. Information access threats exploit service flaws in computers to
inhibit use by legitimate users.

,Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings



T F 13. Viruses and worms are two examples of software attacks.

T F 14. A connection-oriented integrity service deals with individual
messages without regard to any larger context and generally
provides protection against message modification only.

T F 15. Pervasive security mechanisms are not specific to any particular
OSI security service or protocol layer.


MULTIPLE CHOICE


1. _________ security consists of measures to deter, prevent, detect, and correct
security violations that involve the transmission of information.

A. Computer B. Internet

C. Intranet D. Network


2. Verifying that users are who they say they are and that each input arriving at
the system came from a trusted source.

A. authenticity B. accountability

C. integrity D. confidentiality


3. __________ assures that systems work promptly and service is not denied to
authorized users.

A. Integrity B. Availability

C. System integrity D. Data confidentiality


4. __________ assures that a system performs its intended function in an
unimpaired manner, free from deliberate or inadvertent unauthorized
manipulation of the system.

A. Data confidentiality B. Availability

C. System integrity D. Privacy

, Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings


5. The security goal that generates the requirement for actions of an entity to be
traced uniquely to that entity is _________ .

A. accountability B. authenticity

C. privacy D. integrity


6. __________ attacks attempt to alter system resources or affect their operation.


A. Active B. Release of message content

C. Passive D. Traffic analysis


7. A __________ takes place when one entity pretends to be a different entity.

A. passive attack B. masquerade

C. modification of message D. replay


8. X.800 defines _________ as a service that is provided by a protocol layer of
communicating open systems and that ensures adequate security of the
systems or of data transfers.

A. replay B. integrity

C. authenticity D. security service


9. _________ is a professional membership society with worldwide organizational
and individual membership that provides leadership in addressing issues
that confront the future of the Internet and is the organization home for the
groups responsible for Internet infrastructure standards, including the IETF
and the IAB.

A. ITU-T B. ISO

C. FIPS D. ISOC

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
tutorclara Johns Hopkins University
View profile
Follow You need to be logged in order to follow users or courses
Sold
94
Member since
4 year
Number of followers
89
Documents
440
Last sold
2 weeks ago

4.4

20 reviews

5
13
4
5
3
0
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions