100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank - Computer Security Fundamentals, 5th edition by William Chuck Easttom, All Chapters Fully Covered | Latest Edition.

Rating
-
Sold
-
Pages
66
Grade
A+
Uploaded on
21-08-2025
Written in
2025/2026

Test Bank - Computer Security Fundamentals, 5th edition by William Chuck Easttom, All Chapters Fully Covered | Latest Edition.

Institution
Computer Security Fundamentals, 5th Edition
Course
Computer Security Fundamentals, 5th edition











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security Fundamentals, 5th edition
Course
Computer Security Fundamentals, 5th edition

Document information

Uploaded on
August 21, 2025
Number of pages
66
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security Fundamentals 5e
Chapter 1 Introduction to Computer Security

True / False

1. The Domain Name System is what translates human-readable domain names into IP
addresses that computers and routers understand.
True

2. The type of hacking that involves breaking into telephone systems is called sneaking.
False—This type of hacking is called phreaking.

3. The technique for breaching a system’s security by exploiting human nature rather than
technology is war-driving.
False—This describes social engineering.

4. Malware is a generic term for software that has a malicious purpose.
True

5. Software that lays dormant until some specific condition is met is a Trojan horse.
False—This describes a logic bomb. Usually, the condition that is met is a date
and time.

6. Someone who breaks into a system legally to assess security deficiencies is a
penetration tester.
True

7. Auditing is the process to determine if a user’s credentials are authorized to access a
network resource.
False—This describes authentication. Auditing is the process of reviewing logs,
records, and procedures.

8. Confidentiality, integrity, and availability are three pillars of security, called the CIA
triangle.
True

9. The Health Insurance Portability and Accountability Act of 1996 requires government
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False—This describes the Computer Security Act of 1987.

10. The SANS Institute website is a vast repository of security-related documentation.
True


Multiple Choice




SCHOLARVAULT

,1. Which #jhtype #jhof #jhhacking #jhis #jhdesigned #jhto #jhprevent #jhlegitimate #jhaccess #jhto #jha #jhcomputer
#jhsystem?

a. Denial #jhof #jhservice
b. Web #jhattack
c. Session #jhhijacking
d. DNS #jhpoisoning

Answer #jhA.

2. Your #jhcompany #jhis #jhinstituting #jha #jhnew #jhsecurity #jhawareness #jhprogram. #jhYou #jhare
#jhresponsible #jhfor #jheducating #jhend #jhusers #jhon #jha #jhvariety #jhof #jhthreats, #jhincluding #jhsocial

#jhengineering. #jhWhich #jhof #jhthe #jhfollowing #jhbest #jhdefines #jhsocial #jhengineering?

a. Illegal #jhcopying #jhof #jhsoftware
b. Gathering #jhinformation #jhfrom #jhdiscarded #jhmanuals #jhand #jhprintouts
c. Using #jhpeople #jhskills #jhto #jhobtain #jhproprietary #jhinformation
d. Destruction #jhor #jhalteration #jhof #jhdata

Answer #jhC.

3. Which #jhtype #jhof #jhhacking #jhoccurs #jhwhen #jhthe #jhattacker #jhmonitors #jhan
#jhauthenticated #jhsession #jhbetween #jhthe #jhclient #jhand #jhthe #jhserver #jhand #jhtakes #jhover

#jhthat #jhsession?

a. Denial #jhof #jhservice
b. Web #jhattack
c. Session #jhhijacking
d. DNS #jhpoisoning

Answer #jhC.

4. Someone #jhwho #jhfinds #jha #jhflaw #jhin #jha #jhsystem #jhand #jhreports #jhthat #jhflaw #jhto #jhthe
#jhvendor #jhof #jhthe #jhsystem #jhis #jha #jh .
a. White #jhhat #jhhacker
b. Black #jhhat #jhhacker
c. Gray #jhhat #jhhacker
d. Red #jhhat #jhhacker

Answer #jhA.

5. Someone #jhwho #jhgains #jhaccess #jhto #jha #jhsystem #jhand #jhcauses #jhharm #jhis #jha #jh ?
a. White #jhhat #jhhacker
b. Black #jhhat #jhhacker
c. Gray #jhhat #jhhacker
d. Red #jhhat #jhhacker

Answer #jhB.

6. A #jhblack #jhhat #jhhacker #jhis #jhalso #jhcalled #jha #jh .


SCHOLARVAULT

, a. Thief
b. Cracker
c. Sneaker
d. Script #jhkiddy

Answer #jhB.

7. Someone #jhwho #jhcalls #jhhimself #jha #jhhacker #jhbut #jhlacks #jhthe #jhexpertise #jhis #jha #jh .
a. Script #jhkiddy
b. Sneaker
c. White #jhhat #jhhacker
d. Black #jhhat #jhhacker

Answer #jhA.

8. Someone #jhwho #jhlegally #jhbreaks #jhinto #jha #jhsystem #jhto #jhassess #jhsecurity #jhdeficiencies #jhis #jha
.
a. Script #jhkiddy
b. Penetration #jhtester
c. Gray #jhhat #jhhacker
d. Black #jhhat #jhhacker

Answer #jhB.

9. A(n) #jh is #jha #jhbasic #jhsecurity #jhdevice #jhthat #jhfilters #jhtraffic #jhand #jhis #jha #jhbarrier
#jhbetween #jha #jhnetwork #jhand #jhthe #jhoutside #jhworld #jhor #jhbetween #jha #jhsystem #jhand #jhother

#jhsystems.

a. Firewall
b. Proxy #jhserver
c. Intrusion #jhdetection #jhsystem
d. Network #jhmonitor

Answer #jhA.

10. A(n) #jh hides #jhthe #jhinternal #jhnetwork’s #jhIP #jhaddress #jhand #jhpresents #jha
#jhsingle #jhIP #jhaddress #jhto #jhthe #jhoutside #jhworld.

a. Firewall
b. Proxy #jhserver
c. Intrusion #jhdetection #jhsystem
d. Network #jhmonitor

Answer #jhB.

11. Which #jhone #jhof #jhthese #jhis #jhNOT #jhone #jhof #jhthe #jhthree #jhpillars #jhof #jhsecurity #jhin #jhthe #jhCIA
#jhtriangle?

a. Confidentiality
b. Integrity
c. Availability


SCHOLARVAULT

, d. Authentication

Answer #jhD.

12. Which #jhof #jhthese #jhis #jhthe #jhprocess #jhto #jhdetermine #jhif #jhthe #jhcredentials #jhgiven
#jhby #jha #jhuser #jhor #jhanother #jhsystem #jhare #jhauthorized #jhto #jhaccess #jhthe #jhnetwork

#jhresource #jhin #jhquestion?

a. Confidentiality
b. Integrity
c. Availability
d. Authentication

Answer #jhD.

13. Which #jhof #jhthese #jhis #jha #jhrepository #jhof #jhsecurity-related #jhdocumentation #jhand #jhalso
#jhsponsors #jha #jhnumber #jhof #jhsecurity #jhresearch #jhprojects?

a. Computer #jhEmergency #jhResponse #jhTeam
b. F-Secure
c. SANS #jhInstitute
d. Microsoft #jhSecurity #jhResponse #jhCenter

Answer #jhC.

14. Which #jhof #jhthese #jhwas #jhthe #jhfirst #jhcomputer #jhincident-response #jhteam?
a. Computer #jhEmergency #jhResponse #jhTeam
b. F-Secure
c. SANS #jhInstitute
d. Microsoft #jhSecurity #jhResponse #jhCenter

Answer #jhA.

15. Which #jhof #jhthese #jhis #jha #jhrepository #jhfor #jhdetailed #jhinformation #jhon #jhvirus #jhoutbreaks?
a. Computer #jhEmergency #jhResponse #jhTeam
b. F-Secure
c. SANS #jhInstitute
d. Microsoft #jhSecurity #jhResponse #jhCenter

Answer #jhB.




SCHOLARVAULT

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ScholarVault West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
5 months
Number of followers
1
Documents
559
Last sold
1 week ago
StudyHub: I provide A+ solutions in Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology, and many other subjects.

Greetings, Are you tired of scouring for reliable study materials? Look no further! I'm here to provide you with accurate, comprehensive, and current study documents to ace your quizzes, assignments, midterms, and final exams. Whatever your study needs may be, I've got you covered. Feel free to reach out for assistance with any study materials, and don't hesitate to refer me to your friends. Thank you for choosing my services, and welcome to your solution! Best regards,

Read more Read less
3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions