100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Network Security Essentials Applications and Standards 5th Edition By Willaim Stallings - Test Bank

Rating
-
Sold
-
Pages
56
Grade
A+
Uploaded on
16-12-2023
Written in
2022/2023

Network Security Essentials Applications and Standards 5th Edition By Willaim Stallings - Test Bank












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 16, 2023
Number of pages
56
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

,Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings

CHAPTER 1: INTRODUCTION



TRUE OR FALSE


1. T
2. T
3. F
4. T
5. T
6. F
7. F
8. T
9. F
10. T
11. F
12. F
13. T
14. F
15. T




MULTIPLE CHOICE


1. B
2. A
3. B
4. C
5. A
6. A
7. B
8. D
9. D
10. C
11. B
12. A
13. C
14. D
15. A

,Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings


SHORT ANSWER

1. Computer Security
2. integrity
3. attack
4. availability
5. Encipherment
6. Family Educational Rights and Privacy Act (FERPA)
7. threat
8. passive
9. encryption
10. masquerade
11. data confidentiality
12. access control
13. International Organization for Standardization (ISO)
14. Nonrepudiation
15. digital signature

, Network Security Essentials Applications and Standards, 5th Edition, by William
Stallings


CHAPTER 1: INTRODUCTION


TRUE OR FALSE

T F 1. With the introduction of the computer the need for automated
tools for protecting files and other information stored on the
computer became evident.

T F 2. There is a natural tendency on the part of users and system
managers to perceive little benefit from security investment until a
security failure occurs.

T F 3. There are clear boundaries between network security and internet
security.

T F 4. The CIA triad embodies the fundamental security objectives for
both data and for information and computing services.

T F 5. In developing a particular security mechanism or algorithm one
must always consider potential attacks on those security features.

T F 6. A loss of confidentiality is the unauthorized modification or
destruction of information.

T F 7. Patient allergy information is an example of an asset with a
moderate requirement for integrity.

T F 8. The more critical a component or service, the higher the level of
availability required.

T F 9. Data origin authentication provides protection against the
duplication or modification of data units.

T F 10. The emphasis in dealing with passive attacks is on prevention
rather than detection.

T F 11. Data integrity is the protection of data from unauthorized
disclosure.

T F 12. Information access threats exploit service flaws in computers to
inhibit use by legitimate users.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
evileye251 TestBank Expert
View profile
Follow You need to be logged in order to follow users or courses
Sold
168
Member since
2 year
Number of followers
74
Documents
2377
Last sold
1 week ago
Test Bank Expert

We sell test banks that helps students to pass their classes easily and get A+

4.2

24 reviews

5
15
4
4
3
2
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions