100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank For Computer Security Fundamentals 4th Edition by William Chuck Easttom

Rating
-
Sold
-
Pages
60
Grade
A+
Uploaded on
06-11-2025
Written in
2025/2026

Test Bank For Computer Security Fundamentals 4th Edition by William Chuck Easttom. Full Chapters Include;....Chapter 1: Introduction to Computer Security 2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 How Seriously Should You Take Threats to Network Security? . . . . . . . . . 4 Identifying Types of Threats . . . . . . . . . . . . . . . . . . . . . . . . 7 Assessing the Likelihood of an Attack on Your Network . . . . . . . . . . . . 16 Basic Security Terminology . . . . . . . . . . . . . . . . . . . . . . . 16 Concepts and Approaches . . . . . . . . . . . . . . . . . . . . . . . . 19 How Do Legal Issues Impact Network Security? . . . . . . . . . . . . . . . 22 Online Security Resources . . . . . . . . . . . . . . . . . . . . . . . . 23 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Chapter 2: Networks and the Internet 32 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Network Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 How the Internet Works . . . . . . . . . . . . . . . . . . . . . . . . . 40 History of the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Basic Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . 49 Other Network Devices . . . . . . . . . . . . . . . . . . . . . . . . . 55 Advanced Network Communications Topics . . . . . . . . . . . . . . . . 56 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Chapter 3: Cyber Stalking, Fraud, and Abuse 66 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 How Internet Fraud Works . . . . . . . . . . . . . . . . . . . . . . . . 67 Identity Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Cyber Stalking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Chapter 4: Denial of Service Attacks 96 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Illustrating an Attack . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Common Tools Used for DoS Attacks . . . . . . . . . . . . . . . . . . . 99 DoS Weaknesses . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Specific DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 102 Real-World Examples of DoS Attacks . . . . . . . . . . . . . . . . . . . 109 How to Defend Against DoS Attacks . . . . . . . . . . . . . . . . . . . 111 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Chapter 5: Malware 120 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Trojan Horses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 The Buffer-Overflow Attack . . . . . . . . . . . . . . . . . . . . . . . 132 Spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Other Forms of Malware . . . . . . . . . . . . . . . . . . . . . . . . 137 Detecting and Eliminating Viruses and Spyware . . . . . . . . . . . . . . 140 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Chapter 6: Techniques Used by Hackers 152 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Basic Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 The Reconnaissance Phase . . . . . . . . . . . . . . . . . . . . . . . 153 Actual Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Malware Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Penetration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . 171 The Dark Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Chapter 7: Industrial Espionage in Cyberspace 182 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 What Is Industrial Espionage? . . . . . . . . . . . . . . . . . . . . . . 183 Information as an Asset . . . . . . . . . . . . . . . . . . . . . . . . 184 Real-World Examples of Industrial Espionage . . . . . . . . . . . . . . . 187 How Does Espionage Occur? . . . . . . . . . . . . . . . . . . . . . . 189 Low-Tech Industrial Espionage . . . . . . . . . . . . . . . . 189 Spyware Used in Industrial Espionage . . . . . . . . . . . . . 193 Steganography Used in Industrial Espionage . . . . . . . . . . . 193 Phone Taps and Bugs . . . . . . . . . . . . . . . . . . . . 194 Protecting Against Industrial Espionage . . . . . . . . . . . . . . . . . . 194 The Industrial Espionage Act . . . . . . . . . . . . . . . . . . . . . . 197 Spear Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Chapter 8: Encryption 206 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Cryptography Basics . . . . . . . . . . . . . . . . . . . . . . . . . . 207 History of Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Modern Cryptography Methods . . . . . . . . . . . . . . . . . . . . . 216 Public Key (Asymmetric) Encryption . . . . . . . . . . . . . . . . . . . 223 PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Legitimate Versus Fraudulent Encryption Methods . . . . . . . . . . . . . 229 Digital Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 MAC and HMAC . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Cryptography Used on the Internet . . . . . . . . . . . . . . . . . . . . 236 Quantum Computing Cryptography . . . . . . . . . . . . . . . . . . . 237 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Chapter 9: Computer Security Technology 244 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Virus Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Antispyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Digital Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 SSL/TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Virtual Private Networks . . . . . . . . . . . . . . . . . . . . . . . . 268 Wi-Fi Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Chapter 10: Security Policies 278 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 What Is a Policy? . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Defining User Policies . . . . . . . . . . . . . . . . . . . . . . . . . 280 Defining System Administration Policies . . . . . . . . . . . . . . . . . . 287 New Employees . . . . . . . . . . . . . . . . . . . . . . . 287 Departing Employees . . . . . . . . . . . . . . . . . . . . 287 Change Requests . . . . . . . . . . . . . . . . . . . . . . 288 Security Breaches . . . . . . . . . . . . . . . . . . . . . . 290 Virus Infection . . . . . . . . . . . . . . . . . . . . . . . 290 DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . 291 Intrusion by a Hacker . . . . . . . . . . . . . . . . . . . . 291 Defining Access Control . . . . . . . . . . . . . . . . . . . . . . . . 292 Development Policies . . . . . . . . . . . . . . . . . . . . . . . . . 293 Standards, Guidelines, and Procedures . . . . . . . . . . . . . . . . . . 294 Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Important Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Chapter 11: Network Scanning and Vulnerability Scanning 306 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 Basics of Assessing a System . . . . . . . . . . . . . . . . . . . . . . 307 Securing Computer Systems . . . . . . . . . . . . . . . . . . . . . . 315 Scanning Your Network . . . . . . . . . . . . . . . . . . . . . . . . 321 Getting Professional Help . . . . . . . . . . . . . . . . . . . . . . . . 330 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Chapter 12: Cyber Terrorism and Information Warfare 342 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Actual Cases of Cyber Terrorism . . . . . . . . . . . . . . . . . . . . . 343 Weapons of Cyber Warfare . . . . . . . . . . . . . . . . . . . . . . . 345 Economic Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Military Operations Attacks . . . . . . . . . . . . . . . . . . . . . . . 350 General Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Supervisory Control and Data Acquisitions (SCADA) . . . . . . . . . . . . . 351 Information Warfare . . . . . . . . . . . . . . . . . . . . . . . . . . 352 Actual Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 Future Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 Defense Against Cyber Terrorism . . . . . . . . . . . . . . . . . . . . . 362 Terrorist Recruiting and Communication . . . . . . . . . . . . . . . . . . 362 TOR and the Dark Web . . . . . . . . . . . . . . . . . . . . . . . . . 363 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Chapter 13: Cyber Detective 370 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 General Searches . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Court Records and Criminal Checks . . . . . . . . . . . . . . . . . . . 375 Usenet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Chapter 14: Introduction to Forensics 386 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 General Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Finding Evidence on the PC . . . . . . . . . . . . . . . . . . . . . . . 397 Finding Evidence in System Logs . . . . . . . . . . . . . . . . . . . . 398 Getting Back Deleted Files . . . . . . . . . . . . . . . . . . . . . . . 399 Operating System Utilities . . . . . . . . . . . . . . . . . . . . . . . 402 The Windows Registry . . . . . . . . . . . . . . . . . . . . . . . . . 404 Mobile Forensics: Cell Phone Concepts . . . . . . . . . . . . . . . . . . 408 The Need for Forensic Certification . . . . . . . . . . . . . . . . . . . . 413 Expert Witnesses . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 Additional Types of Forensics . . . . . . . . . . . . . . . . . . . . . . 415 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Chapter 15: Cybersecurity Engineering 422 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Defining Cybersecurity Engineering . . . . . . . . . . . . . . . . . . . . 423

Show more Read less
Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals

Document information

Uploaded on
November 6, 2025
Number of pages
60
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security Fundamentals
ST

– 4th Edition
UV
IA

TEST BANK
_A
PP

William Chuck Easttom
RO
VE
Comprehensive Test Bank for Instructors and
Students
D?
© William Chuck Easttom

All rights reserved. Reproduction or distribution without permission is prohibited.
??

©STUDYSTREAM

, True / False

1. The Domain Name Service is what translates human-readable domain names into IP
ST
addresses that computers and routers understand.
True

2. The type of hacking that involves breaking into telephone systems is called sneaking.
False—This type of hacking is called phreaking.
UV
3. The technique for breaching a system’s security by exploiting human nature rather than
technology is war-driving.
False—This describes social engineering.
IA
4. Malware is a generic term for software that has a malicious purpose.
True

5. Software that lays dormant until some specific condition is met is a Trojan horse.
False—This describes a logic bomb. Usually the condition that is met is a date
_A
and time.

6. Someone who breaks into a system legally to assess security deficiencies is a sneaker.
True—Companies may solicit the services of a sneaker to assess the company’s
vulnerabilities.
PP
7. Auditing is the process to determine if a user’s credentials are authorized to access a
network resource.
False—This describes authentication. Auditing is the process to review logs,
records, and procedures.
RO
8. Confidentiality, integrity, and availability are three pillars of the CIA triangle.
True

9. The Health Insurance Portability and Accountability Act of 1996 requires government
VE
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False—This describes the Computer Security Act of 1987.

10The SANS Institute website is a vast repository of security-related documentation.
D?
True


Multiple Choice
??
1. In which type of hacking does the user block access from legitimate users without
actually accessing the attacked system?
a. Denial of service

, b. Web attack
c. Session hijacking
d. None of the above
ST
Answer A. A denial-of-service attack is probably the most common attack on the web.

2. Your company is instituting a new security awareness program. You are responsible
for educating end users on a variety of threats, including social engineering. Which of the
UV
following best defines social engineering?
a. Illegal copying of software
b. Gathering information from discarded manuals and printouts
c. Using people skills to obtain proprietary information
d. Destruction or alteration of data
IA
Answer D. Social Engineering is basically using people skills to gather information

3. Which type of hacking occurs when the attacker monitors an authenticated session
between the client and the server and takes over that session?
_A
a. Denial of service
b. Web attack
c. Session hijacking
d. None of the above
PP
Answer C.

4. Someone who finds a flaw in a system and reports that flaw to the vendor of the
system is a __________.
a. White hat hacker
RO
b. Black hat hacker
c. Gray hat hacker
d. Red hat hacker

Answer A. White hat hackers are often hired by companies to do penetration tests.
VE
5. Someone who gains access to a system and causes harm is a __________?
a. White hat hacker
b. Black hat hacker
c. Grey hat hacker
D?
d. Red hat hacker
Answer B. A black hat hacker might steal data, erase files, or deface websites.

6. A black hat hacker is also called a ___________
a. Thief
??
b. Cracker
c. Sneaker
d. None of the above

, Answer B.
ST
7. Someone who calls himself a hacker but lacks the expertise is a ________.
a. Script kiddy
b. Sneaker
c. White hat hacker
d. Black hat hacker
UV
Answer A. There are many Internet tools that can be used to perform hacking tasks, and
users of these tools who don’t understand the target system are script kiddies.

8. Someone who legally breaks into a system to assess security deficiencies is a
IA
________.
a. Script kiddy
b. Penetration tester
c. White hat hacker
d. Black hat hacker
_A
Answer B. Anyone hired to assess the vulnerabilities of a system should be both
technically proficient and ethical.

9. A(n) ______ is a basic security device that filters traffic and is a barrier between a
PP
network and the outside world or between a system and other systems.
a. Firewall
b. Proxy server
c. Intrusion detection system
d. Network Monitor
RO
Answer A. A firewall can be a server, a router, or software running on a machine.

10. A(n) hides the internal network’s IP address and presents a single IP address to the
outside world.
VE
a. Firewall
b. Proxy server
c. Intrusion detection system
d. Network Monitor
D?
Answer B.

11. Which one of these is NOT one the three pillars of security in the CIA triangle?
a. Confidentiality
b. Integrity
??
c. Availability
d. Authentication

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudyStream Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
81
Member since
1 year
Number of followers
30
Documents
1234
Last sold
15 hours ago
StudySteam - Verified Solutions, Test Banks & Guides for Medical, Nursing, Business, Engineering, Accounting, Chemistry, Biology & Other Subjects

Welcome to Your Exam Success Headquarters! Tired of endless textbook reading? Our shop is your go-to for high-quality, exam-ready study materials designed for university and college students. We specialize in original publisher content, including solutions manuals, test banks, and comprehensive study guides across a wide range of subjects. Every document is an instant PDF download – no waiting, no fuss! Get immediate access to top-tier academic resources like step-by-step solutions and real test formats to truly ace your coursework and exams. Our materials are perfect for exam preparation, offering insights and practice for every study style. Ready to boost your grades? Dive in and discover your next A+ resource. Found something great? Share our shop with your classmates – let's achieve success together!

Read more Read less
4.1

8 reviews

5
5
4
1
3
1
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions