TEST BANK FOR
Network Defense and Countermeasures Principles and Practices, 4th Edition
JN
U
R
SE
TEST BANK
,William Easttom: Network Defense and Countermeasures Principles and Practices
Chapter 1 Introduction to Network Security
1) Which of the following is the unique address of the network interface card (NIC)?
A) IP address
B) NIC address
C) MAC address
D) URL address
Answer: C
2) Which of the following commands can you use to find your computer‟s IP address and
network information about your system?
A) Ipconfig
B) Ping
C) Tracert
D) None of the above
JN
Answer: A
3) Which of the following commands can be used to determine if a system is reachable and how
long a packet takes to reach that system?
A) Ipconfig
U
B) Ping
C) Tracert
D) None of the above
R
Answer: B
4) Which of the following protocols operates at the transport layer of the OSI model?
SE
A) FTP
B) TCP
C) DNS
D) IP
Answer: B
5) Which of the following layers of the OSI model is responsible for routing the information in
the network?
A) Transport layer
B) Network layer
C) Session layer
D) Physical layer
Answer: B
6) The OSI model is divided into how many layers?
,A) Four
B) Five
C) Six
D) Seven
Answer: D
7) Most attacks can be classified as one of three broad classes. Which of the following is not one
of these classes?
A) Viruses
B) Malware
C) Blocking
D) Intrusion
Answer: A
8) Denial of service (DoS) attacks fall under which of the following categories of attacks?
A) Viruses
B) Malware
JN
C) Blocking
D) Intrusion
Answer: C
9) Which of the following is a small text file that web pages can place on your computer to keep
U
track of your browsing activity?
A) Spyware
B) Cookie
R
C) Key logger
D) Trojan
Answer: B
SE
10) In which of the following attacks does a hacker use a computer to call phone numbers in
sequence until another computer answers?
A) War-driving
B) War-calling
C) War-dialing
D) War-flying
Answer: C
11) Which of the following types of hackers will report a vulnerability when they find it?
A) White hat
B) Gray hat
C) Green hat
D) Black hat
Answer: A
12) Which of the following types of hackers hacks into systems to cause harm or steal data?
A) White hat
B) Gray hat
, C) Green hat
D) Black hat
Answer: D
13) Which of the following is another term for a black hat hacker?
A) Cracker
B) White hat
C) Sneaker
D) Creeker
Answer: A
14) Which of the following is another term for ethical hacker?
A) Cracker
B) Black hat
C) Sneaker
D) Creeker
Answer: C
JN
15) Which of the following can be used to protect the confidentiality of information?
A) Encryption
B) Auditing
C) Backups
D) Network server redundancy
U
Answer: A
16) Which of the following is used to ensure information integrity?
R
A) Auditing
B) Digital signatures
C) Backups
SE
D) Passwords
Answer: B
17) Which of the following is not part of the CIA triangle?
A) Integrity
B) Confidentiality
C) Discretion
D) Availability
Answer: C
18) Which of the following statements about the layered security approach is true?
A) The perimeter is secured, but the systems within the perimeter are vulnerable.
B) The systems within the perimeter are secured, but the perimeter is vulnerable.
C) Both the perimeter and the individual systems within the perimeter are secured.
D) Both the perimeter and the individual systems within the perimeter are vulnerable.
Answer: C