100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

TEST BANK FOR Network Defense and Countermeasures: Principles and Practices (Pearson IT Cybersecurity Curriculum (ITCC)) 4th Edition by William Easttom II , ISBN: 9780138200589 |Chapter 1-17| Guide A+

Rating
-
Sold
-
Pages
69
Grade
A+
Uploaded on
28-07-2025
Written in
2024/2025

TEST BANK FOR Network Defense and Countermeasures: Principles and Practices (Pearson IT Cybersecurity Curriculum (ITCC)) 4th Edition by William Easttom II , ISBN: 9780138200589 |Chapter 1-17| Guide A+

Institution
Network Defense And Countermeasures Principles And
Course
Network Defense and Countermeasures Principles and











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Network Defense and Countermeasures Principles and
Course
Network Defense and Countermeasures Principles and

Document information

Uploaded on
July 28, 2025
Number of pages
69
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

TEST BANK FOR
Network Defense and Countermeasures Principles and Practices, 4th Edition by William Easttom


Chapter 1 Introduction to Network Security

1) Which of the following is the unique address of the network interface card (NIC)?
A) IP address
B) NIC address
C) MAC address
D) URL address
Answer: C

2) Which of the following commands can you use to find your computer‟s IP address and
network information about your system?
A) Ipconfig
B) Ping
C) Tracert
D) None of the above
Answer: A

3) Which of the following commands can be used to determine if a system is reachable and how
long a packet takes to reach that system?
A) Ipconfig
B) Ping
C) Tracert
D) None of the above
Answer: B

4) Which of the following protocols operates at the transport layer of the OSI model?
A) FTP
B) TCP
C) DNS
D) IP
Answer: B

5) Which of the following layers of the OSI model is responsible for routing the information in
the network?
A) Transport layer
B) Network layer
C) Session layer
D) Physical layer
Answer: B

6) The OSI model is divided into how many layers?

,A) Four
B) Five
C) Six
D) Seven
Answer: D

7) Most attacks can be classified as one of three broad classes. Which of the following is not one
of these classes?
A) Viruses
B) Malware
C) Blocking
D) Intrusion
Answer: A

8) Denial of service (DoS) attacks fall under which of the following categories of attacks?
A) Viruses
B) Malware
C) Blocking
D) Intrusion
Answer: C

9) Which of the following is a small text file that web pages can place on your computer to keep
track of your browsing activity?
A) Spyware
B) Cookie
C) Key logger
D) Trojan
Answer: B

10) In which of the following attacks does a hacker use a computer to call phone numbers in
sequence until another computer answers?
A) War-driving
B) War-calling
C) War-dialing
D) War-flying
Answer: C

11) Which of the following types of hackers will report a vulnerability when they find it?
A) White hat
B) Gray hat
C) Green hat
D) Black hat
Answer: A

12) Which of the following types of hackers hacks into systems to cause harm or steal data?
A) White hat
B) Gray hat

,C) Green hat
D) Black hat
Answer: D
13) Which of the following is another term for a black hat hacker?
A) Cracker
B) White hat
C) Sneaker
D) Creeker
Answer: A

14) Which of the following is another term for ethical hacker?
A) Cracker
B) Black hat
C) Sneaker
D) Creeker
Answer: C

15) Which of the following can be used to protect the confidentiality of information?
A) Encryption
B) Auditing
C) Backups
D) Network server redundancy
Answer: A

16) Which of the following is used to ensure information integrity?
A) Auditing
B) Digital signatures
C) Backups
D) Passwords
Answer: B

17) Which of the following is not part of the CIA triangle?
A) Integrity
B) Confidentiality
C) Discretion
D) Availability
Answer: C

18) Which of the following statements about the layered security approach is true?
A) The perimeter is secured, but the systems within the perimeter are vulnerable.
B) The systems within the perimeter are secured, but the perimeter is vulnerable.
C) Both the perimeter and the individual systems within the perimeter are secured.
D) Both the perimeter and the individual systems within the perimeter are vulnerable.
Answer: C

, 19) Which of the following requires government agencies to identify sensitive systems, conduct
computer security training, and develop computer security plans?
A) Center for Information Technology
B) Computer Crimes Act of Oklahoma
C) Sarbanes-Oxley (SOX)
D) Computer Security Act of 1987
Answer: D

20) Which of the following security resources offers a repository for detailed information on
virus outbreaks?
A) SANS Institute
B) F-Secure Corporation
C) CERT
D) Microsoft Security TechCenter
Answer: B

21) The term/concept URL is:
A) synonymous with URI
B) synonymous with URN
C) a scheme followed by authority, path, and possibly query and fragment
D) a subset of URI
Answer: D


22) Which statement about the IMAP protocol is true?
A) It is used for chat rooms.
B) It is a successor to POP3.
C) It is used by Microsoft Active Directory.
D) It is used to transfer files between computers.
Answer: B


23) Which of the following is NOT a TCP/IP model layer?
A) Application layer
B) Transport layer
C) Digital layer
D) Data-link layer
Answer: C


24) What is the name of the virus that caused 29% of malicious attacks on macOS devices in
2019?
A) Schlayer
B) Slayer
C) BadApple
D) Malicious 2.0
Answer: A

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PROFDOC Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
317
Member since
1 year
Number of followers
19
Documents
1476
Last sold
12 hours ago
Welcome to PROFDOC – Your #1 Study Companion on Stuvia !!

Are you a student aiming for top grades without spending countless hours buried in textbooks? At Profdoc Digital Libraries, we’ve got your back! We specialize in high-quality, exam-focused study materials designed to help you understand faster, retain more, and score higher. Whether you're prepping for finals or just trying to keep up, our resources are crafted to support students like you who want results. Subjects We Cover: Business Law Psychology Nursing Biology Chemistry Mathematics Physics Accounting & Finance Etc..... What Makes Profdoc Digital Libraries Stand Out? Clear, structured notes that simplify even the hardest topics Past paper answers to help you prepare like a pro Case studies and real-world examples to deepen understanding Detailed diagrams to visualize complex ideas Time-saving summaries — perfect for revision or quick reference Trusted by hundreds of students across different courses and universities Whether you're cramming the night before or building your knowledge all semester long, our downloadable resources give you the confidence and clarity you need to study smarter, not harder. Browse our bestsellers and see why so many students choose Profdoc Digital Libraries to ace their exams !!!

Read more Read less
4.3

51 reviews

5
33
4
6
3
8
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions