100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank - Computer Security Fundamentals, 4th Edition by William (Chuck) Easttom II, All Chapters Fully Covered | Latest Edition.

Rating
-
Sold
-
Pages
58
Grade
A+
Uploaded on
21-08-2025
Written in
2025/2026

Test Bank - Computer Security Fundamentals, 4th Edition by William (Chuck) Easttom II, All Chapters Fully Covered | Latest Edition.

Institution
Computer Security Fundamentals, 4th Edition
Module
Computer Security Fundamentals, 4th Edition











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Computer Security Fundamentals, 4th Edition
Module
Computer Security Fundamentals, 4th Edition

Document information

Uploaded on
August 21, 2025
Number of pages
58
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

True / False

1. The Domain Name Service is what translates human-readable domain names into IP
addresses that computers and routers understand.
True

2. The type of hacking that involves breaking into telephone systems is called sneaking.
False—This type of hacking is called phreaking.

3. The technique for breaching a system’s security by exploiting human nature rather than
technology is war-driving.
False—This describes social engineering.

4. Malware is a generic term for software that has a malicious purpose.
True

5. Software that lays dormant until some specific condition is met is a Trojan horse.
False—This describes a logic bomb. Usually the condition that is met is a date
and time.

6. Someone who breaks into a system legally to assess security deficiencies is a sneaker.
True—Companies may solicit the services of a sneaker to assess the company’s
vulnerabilities.

7. Auditing is the process to determine if a user’s credentials are authorized to access a
network resource.
False—This describes authentication. Auditing is the process to review logs,
records, and procedures.

8. Confidentiality, integrity, and availability are three pillars of the CIA triangle.
True

9. The Health Insurance Portability and Accountability Act of 1996 requires government
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False—This describes the Computer Security Act of 1987.

10The SANS Institute website is a vast repository of security-related documentation.
True


Multiple Choice

1. In which type of hacking does the user block access from legitimate users without
actually accessing the attacked system?
a. Denial of service




SCHOLARVAULT

, b. Web #nhattack
c. Session #nhhijacking
d. None #nhof #nhthe #nhabove

Answer #nhA. #nhA #nhdenial-of-service #nhattack #nhis #nhprobably #nhthe #nhmost #nhcommon #nhattack #nhon
#nhthe #nhweb.




2. Your #nhcompany #nhis #nhinstituting #nha #nhnew #nhsecurity #nhawareness #nhprogram. #nhYou #nhare
#nhresponsible #nhfor #nheducating #nhend #nhusers #nhon #nha #nhvariety #nhof #nhthreats, #nhincluding #nhsocial

#nhengineering. #nhWhich #nhof #nhthe #nhfollowing #nhbest #nhdefines #nhsocial #nhengineering?

a. Illegal #nhcopying #nhof #nhsoftware
b. Gathering #nhinformation #nhfrom #nhdiscarded #nhmanuals #nhand #nhprintouts
c. Using #nhpeople #nhskills #nhto #nhobtain #nhproprietary #nhinformation
d. Destruction #nhor #nhalteration #nhof #nhdata

Answer #nhD. #nhSocial #nhEngineering #nhis #nhbasically #nhusing #nhpeople #nhskills #nhto #nhgather
#nhinformation




3. Which #nhtype #nhof #nhhacking #nhoccurs #nhwhen #nhthe #nhattacker #nhmonitors #nhan
#nhauthenticated #nhsession #nhbetween #nhthe #nhclient #nhand #nhthe #nhserver #nhand #nhtakes #nhover

#nhthat #nhsession?

a. Denial #nhof #nhservice
b. Web #nhattack
c. Session #nhhijacking
d. None #nhof #nhthe #nhabove

Answer #nhC.

4. Someone #nhwho #nhfinds #nha #nhflaw #nhin #nha #nhsystem #nhand #nhreports #nhthat #nhflaw #nhto
#nhthe #nhvendor #nhof #nhthe #nhsystem #nhis #nha #nh .
a. White #nhhat #nhhacker
b. Black #nhhat #nhhacker
c. Gray #nhhat #nhhacker
d. Red #nhhat #nhhacker

Answer #nhA. #nhWhite #nhhat #nhhackers #nhare #nhoften #nhhired #nhby #nhcompanies #nhto #nhdo #nhpenetration
#nhtests.




5. Someone #nhwho #nhgains #nhaccess #nhto #nha #nhsystem #nhand #nhcauses #nhharm #nhis #nha #nh ?
a. White #nhhat #nhhacker
b. Black #nhhat #nhhacker
c. Grey #nhhat #nhhacker
d. Red #nhhat #nhhacker
Answer #nhB. # n h A #nhblack #nhhat #nhhacker #nhmight #nhsteal #nhdata, #nherase #nhfiles, #nhor #nhdeface
#nhwebsites.




6. A #nhblack #nhhat #nhhacker #nhis #nhalso #nhcalled #nha #nh
a. Thief
b. Cracker
c. Sneaker
SCHOLARVAULT

,d. None #nhof #nhthe #nhabove




SCHOLARVAULT

, Answer #nhB.

7. Someone #nhwho #nhcalls #nhhimself #nha #nhhacker #nhbut #nhlacks #nhthe #nhexpertise #nhis #nha #nh .
a. Script #nhkiddy
b. Sneaker
c. White #nhhat #nhhacker
d. Black #nhhat #nhhacker

Answer #nhA. # n h There #nhare #nhmany #nhInternet #nhtools #nhthat #nhcan #nhbe #nhused #nhto #nhperform
#nhhacking #nhtasks, #nhand #nhusers #nhof #nhthese #nhtools #nhwho #nhdon’t #nhunderstand #nhthe #nhtarget

#nhsystem #nhare #nhscript #nhkiddies.




8. Someone #nhwho #nhlegally #nhbreaks #nhinto #nha #nhsystem #nhto #nhassess #nhsecurity #nhdeficiencies #nhis #nha
.
a. Script #nhkiddy
b. Penetration #nhtester
c. White #nhhat #nhhacker
d. Black #nhhat #nhhacker

Answer #nhB. #nhAnyone #nhhired #nhto #nhassess #nhthe #nhvulnerabilities #nhof #nha #nhsystem #nhshould #nhbe
#nhboth #nhtechnically #nhproficient #nhand #nhethical.




9. A(n) #nh is #nha #nhbasic #nhsecurity #nhdevice #nhthat #nhfilters #nhtraffic #nhand #nhis #nha
#nhbarrier #nhbetween #nha #nhnetwork #nhand #nhthe #nhoutside #nhworld #nhor #nhbetween #nha #nhsystem

#nhand #nhother #nhsystems.

a. Firewall
b. Proxy #nhserver
c. Intrusion #nhdetection #nhsystem
d. Network #nhMonitor

Answer #nhA. #nhA #nhfirewall #nhcan #nhbe #nha #nhserver, #nha #nhrouter, #nhor #nhsoftware #nhrunning #nhon #nha
#nhmachine.




10. A(n) #nhhides #nhthe #nhinternal #nhnetwork’s #nhIP #nhaddress #nhand #nhpresents #nha #nhsingle #nhIP
#nhaddress #nhto #nhthe #nhoutside #nhworld.

a. Firewall
b. Proxy #nhserver
c. Intrusion #nhdetection #nhsystem
d. Network #nhMonitor

Answer #nhB.

11. Which #nhone #nhof #nhthese #nhis #nhNOT #nhone #nhthe #nhthree #nhpillars #nhof #nhsecurity #nhin #nhthe #nhCIA
#nhtriangle?

a. Confidentiality
b. Integrity
c. Availability
d. Authentication

SCHOLARVAULT

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ScholarVault West Virgina University
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
5 months
Number of followers
1
Documents
559
Last sold
1 week ago
StudyHub: I provide A+ solutions in Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology, and many other subjects.

Greetings, Are you tired of scouring for reliable study materials? Look no further! I'm here to provide you with accurate, comprehensive, and current study documents to ace your quizzes, assignments, midterms, and final exams. Whatever your study needs may be, I've got you covered. Feel free to reach out for assistance with any study materials, and don't hesitate to refer me to your friends. Thank you for choosing my services, and welcome to your solution! Best regards,

Read more Read less
3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions