100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank For Computer Security Fundamentals, 5th Edition by William Chuck Easttom, All Chapters 1-15

Rating
-
Sold
-
Pages
61
Grade
A+
Uploaded on
24-11-2025
Written in
2025/2026

Test Bank For Computer Security Fundamentals, 5th Edition by William Chuck Easttom, All Chapters 1-15. Full Chapters Include;...Chapter 1: Introduction to Computer Security 2 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 How Seriously Should You Take Threats to Network Security?. . . . . . . . . . 4 Identifying Types of Threats.. . . . . . . . . . . . . . . . . . . . . . . . 7 Assessing the Likelihood of an Attack on Your Network.. . . . . . . . . . . . 17 Basic Security Terminology. . . . . . . . . . . . . . . . . . . . . . . . 18 Concepts and Approaches.. . . . . . . . . . . . . . . . . . . . . . . . 21 How Do Legal Issues Impact Network Security?.. . . . . . . . . . . . . . . 24 Online Security Resources.. . . . . . . . . . . . . . . . . . . . . . . . 25 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 2: Networks and the Internet 34 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Network Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 How the Internet Works. . . . . . . . . . . . . . . . . . . . . . . . . 43 History of the Internet.. . . . . . . . . . . . . . . . . . . . . . . . . . 50 Basic Network Utilities.. . . . . . . . . . . . . . . . . . . . . . . . . 52 Other Network Devices.. . . . . . . . . . . . . . . . . . . . . . . . . 59 Advanced Network Communications Topics.. . . . . . . . . . . . . . . . 60 Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Chapter 3: Cyber Stalking, Fraud, and Abuse 74 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 How Internet Fraud Works.. . . . . . . . . . . . . . . . . . . . . . . . 75 Identity Theft.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Cyber Stalking.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Protecting Yourself Against Cybercrime.. . . . . . . . . . . . . . . . . . 91 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Chapter 4: Denial of Service Attacks 106 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 DoS Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Illustrating an Attack.. . . . . . . . . . . . . . . . . . . . . . . . . . 107 Common Tools Used for DoS Attacks.. . . . . . . . . . . . . . . . . . . 109 DoS Weaknesses.. . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Specific DoS Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . 112 Real-World Examples of DoS Attacks.. . . . . . . . . . . . . . . . . . . 120 How to Defend Against DoS Attacks.. . . . . . . . . . . . . . . . . . . 121 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Chapter 5: Malware 130 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Viruses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Trojan Horses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 The Buffer-Overflow Attack. . . . . . . . . . . . . . . . . . . . . . . 145 Spyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Other Forms of Malware.. . . . . . . . . . . . . . . . . . . . . . . . 149 Detecting and Eliminating Viruses and Spyware. . . . . . . . . . . . . . . 153 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Chapter 6: Techniques Used by Hackers 166 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Basic Terminology.. . . . . . . . . . . . . . . . . . . . . . . . . . . 167 The Reconnaissance Phase.. . . . . . . . . . . . . . . . . . . . . . . 167 Actual Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Malware Creation. . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Penetration Testing.. . . . . . . . . . . . . . . . . . . . . . . . . . 187 The Dark Web. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Chapter 7: Industrial Espionage in Cyberspace 200 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 What Is Industrial Espionage?.. . . . . . . . . . . . . . . . . . . . . . 202 Information as an Asset. . . . . . . . . . . . . . . . . . . . . . . . . 203 Real-World Examples of Industrial Espionage.. . . . . . . . . . . . . . . 205 How Does Espionage Occur?. . . . . . . . . . . . . . . . . . . . . . 207 Protecting Against Industrial Espionage.. . . . . . . . . . . . . . . . . . 212 Trade Secrets.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 The Industrial Espionage Act.. . . . . . . . . . . . . . . . . . . . . . 218 Spear Phishing.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Chapter 8: Encryption 226 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Cryptography Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . 227 History of Encryption.. . . . . . . . . . . . . . . . . . . . . . . . . . 228 Modern Cryptography Methods.. . . . . . . . . . . . . . . . . . . . . 236 Public Key (Asymmetric) Encryption.. . . . . . . . . . . . . . . . . . . 245 PGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Legitimate Versus Fraudulent Encryption Methods.. . . . . . . . . . . . . 251 Digital Signatures. . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Hashing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 MAC and HMAC.. . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Steganography. . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Cryptanalysis.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Cryptography Used on the Internet.. . . . . . . . . . . . . . . . . . . . 259 Quantum Computing Cryptography. . . . . . . . . . . . . . . . . . . . 259 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Chapter 9: Computer Security Technology 268 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Virus Scanners.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Firewalls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Antispyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 IDSs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Digital Certificates.. . . . . . . . . . . . . . . . . . . . . . . . . . . 292 SSL/TLS.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Virtual Private Networks.. . . . . . . . . . . . . . . . . . . . . . . . 296 Wi-Fi Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Chapter 10: Security Policies 304 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 What Is a Policy?.. . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Important Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . 305 Defining User Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 308 Defining System Administration Policies.. . . . . . . . . . . . . . . . . . 316 Security Breaches.. . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Defining Access Control.. . . . . . . . . . . . . . . . . . . . . . . . 321 Development Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 322 Standards, Guidelines, and Procedures.. . . . . . . . . . . . . . . . . . 323 Disaster Recovery.. . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Zero Trust.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Important Laws.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Chapter 11: Network Scanning and Vulnerability Scanning 336 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Basics of Assessing a System.. . . . . . . . . . . . . . . . . . . . . . 337 Securing Computer Systems.. . . . . . . . . . . . . . . . . . . . . . 346 Scanning Your Network. . . . . . . . . . . . . . . . . . . . . . . . . 352 Testing and Scanning Standards.. . . . . . . . . . . . . . . . . . . . . 363 Getting Professional Help.. . . . . . . . . . . . . . . . . . . . . . . . 366 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Chapter 12: Cyber Terrorism and Information Warfare 378 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Actual Cases of Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 379 Weapons of Cyber Warfare.. . . . . . . . . . . . . . . . . . . . . . . 382 Economic Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Military Operations Attacks. . . . . . . . . . . . . . . . . . . . . . . 386 General Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Supervisory Control and Data Acquisitions (SCADA).. . . . . . . . . . . . . 387 Information Warfare.. . . . . . . . . . . . . . . . . . . . . . . . . . 388 Actual Cases of Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 391 Future Trends.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 Defense Against Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 399 Terrorist Recruiting and Communication.. . . . . . . . . . . . . . . . . . 399 TOR and the Dark Web.. . . . . . . . . . . . . . . . . . . . . . . . . 400 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Chapter 13: Cyber Detective 408 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 General Searches. . . . . . . . . . . . . . . . . . . . . . . . . . . 410 Company Searches.. . . . . . . . . . . . . . . . . . . . . . . . . . 413 Court Records and Criminal Checks.. . . . . . . . . . . . . . . . . . . 413 Usenet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 Google.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Maltego. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421 Chapter 14: Introduction to Forensics 426 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 General Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . 427 Finding Evidence on a PC. . . . . . . . . . . . . . . . . . . . . . . . 440 Finding Evidence in System Logs.. . . . . . . . . . . . . . . . . . . . 441 Getting Back Deleted Files.. . . . . . . . . . . . . . . . . . . . . . . 442 Operating System Utilities. . . . . . . . . . . . . . . . . . . . . . . . 445 The Windows Registry. . . . . . . . . . . . . . . . . . . . . . . . . 447 Mobile Forensics: Cell Phone Concepts.. . . . . . . . . . . . . . . . . . 452 The Need for Forensic Certification.. . . . . . . . . . . . . . . . . . . . 457 Expert Witnesses.. . . . . . . . . . . . . . . . . . . . . . . . . . . 458 Additional Types of Forensics.. . . . . . . . . . . . . . . . . . . . . . 459 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463 Chapter 15: Cybersecurity Engineering 466 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Defining Cybersecurity Engineering.. . . . . . . . . . . . . . . . . . . . 467 Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 SecML. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480 Modeling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491

Show more Read less
Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals

Document information

Uploaded on
November 24, 2025
Number of pages
61
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security Fundamentals
UV
– 5th Edition


TEST BANK
IA
_A
PP

William Chuck Easttom
RO
VE
Comprehensive Test Bank for Instructors and

Students
D?

© William Chuck Easttom
??

All rights reserved. Reproduction or distribution without permission is prohibited.
??

©Medexcellence ✅��

, Computer Security Fundamentals 5e
Chapter 1 Introduction to Computer Security

True / False
UV
1. The Domain Name System is what translates human-readable domain names into IP
addresses that computers and routers understand.
True

2. The type of hacking that involves breaking into telephone systems is called sneaking.
IA
False—This type of hacking is called phreaking.

3. The technique for breaching a system’s security by exploiting human nature rather than
technology is war-driving.
_A
False—This describes social engineering.

4. Malware is a generic term for software that has a malicious purpose.
True
PP
5. Software that lays dormant until some specific condition is met is a Trojan horse.
False—This describes a logic bomb. Usually, the condition that is met is a date
and time.

6. Someone who breaks into a system legally to assess security deficiencies is a
RO
penetration tester.
True

7. Auditing is the process to determine if a user’s credentials are authorized to access a
network resource.
False—This describes authentication. Auditing is the process of reviewing logs,
VE
records, and procedures.

8. Confidentiality, integrity, and availability are three pillars of security, called the CIA
triangle.
True
D?
9. The Health Insurance Portability and Accountability Act of 1996 requires government
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False—This describes the Computer Security Act of 1987.
??
10. The SANS Institute website is a vast repository of security-related documentation.
True
??
Multiple Choice

, 1. Which type of hacking is designed to prevent legitimate access to a computer system?
a. Denial of service
b. Web attack
c. Session hijacking
UV
d. DNS poisoning

Answer A.

2. Your company is instituting a new security awareness program. You are responsible
IA
for educating end users on a variety of threats, including social engineering. Which of the
following best defines social engineering?
a. Illegal copying of software
b. Gathering information from discarded manuals and printouts
_A
c. Using people skills to obtain proprietary information
d. Destruction or alteration of data

Answer C.
PP
3. Which type of hacking occurs when the attacker monitors an authenticated session
between the client and the server and takes over that session?
a. Denial of service
b. Web attack
c. Session hijacking
RO
d. DNS poisoning

Answer C.

4. Someone who finds a flaw in a system and reports that flaw to the vendor of the
system is a __________.
VE
a. White hat hacker
b. Black hat hacker
c. Gray hat hacker
d. Red hat hacker
D?
Answer A.

5. Someone who gains access to a system and causes harm is a __________?
a. White hat hacker
b. Black hat hacker
??
c. Gray hat hacker
d. Red hat hacker

Answer B.
??
6. A black hat hacker is also called a __________.

, a. Thief
b. Cracker
c. Sneaker
d. Script kiddy
UV
Answer B.

7. Someone who calls himself a hacker but lacks the expertise is a __________.
a. Script kiddy
b. Sneaker
IA
c. White hat hacker
d. Black hat hacker

Answer A.
_A
8. Someone who legally breaks into a system to assess security deficiencies is a
__________.
a. Script kiddy
b. Penetration tester
PP
c. Gray hat hacker
d. Black hat hacker

Answer B.
RO
9. A(n) __________ is a basic security device that filters traffic and is a barrier between a
network and the outside world or between a system and other systems.
a. Firewall
b. Proxy server
c. Intrusion detection system
d. Network monitor
VE
Answer A.

10. A(n) __________ hides the internal network’s IP address and presents a single IP
address to the outside world.
D?
a. Firewall
b. Proxy server
c. Intrusion detection system
d. Network monitor
??
Answer B.

11. Which one of these is NOT one of the three pillars of security in the CIA triangle?
a. Confidentiality
??
b. Integrity
c. Availability

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MedExcellence Western Governors University
View profile
Follow You need to be logged in order to follow users or courses
Sold
217
Member since
1 year
Number of followers
90
Documents
951
Last sold
3 weeks ago
MedExcellence: - Verified Solutions, Test Banks & Guides for Medical, Nursing, Business, Engineering, Accounting, Chemistry, Biology & Other Subjects

MedExcellence – Study Smarter with Expert-Curated Guides for Online Learners Are you a busy online student juggling work, life, and school? At MedExcellence, we specialize in providing A+ graded study guides, exam notes, and course summaries that help Western Governors University, SNHU, and ASU Online students master their coursework efficiently. Our materials are created by experienced professionals and top-performing students to help you: - Understand complex concepts quickly - Prepare confidently for assessments - Download instantly—no delays, no fluff - Perfect for competency-based learning - Covers business, healthcare, education, IT, and more - 100% digital and mobile-friendly for online learners Whether you're prepping for performance assessments, final exams, or weekly tasks—MedExcellence is your trusted study companion. Share with fellow online learners and boost your entire cohort's performance. Ace your courses with MedExcellence—optimized for the online student lifestyle.

Read more Read less
3.3

22 reviews

5
10
4
2
3
2
2
1
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions