100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Computer Security Fundamentals (5th Edition) – Pre & Post Assessment Questions | William Easttom.

Puntuación
-
Vendido
-
Páginas
61
Grado
A+
Subido en
11-06-2025
Escrito en
2024/2025

Computer Security Fundamentals (5th Edition) – Pre & Post Assessment Questions | William Easttom.

Institución
Computer Security Fundamentals
Grado
Computer Security Fundamentals











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Computer Security Fundamentals
Grado
Computer Security Fundamentals

Información del documento

Subido en
11 de junio de 2025
Número de páginas
61
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

lkjhgfdsa All Chapters Included



Post-Assessment / Computer Security Fundamentals (Easttom)
All Answers Included
Question #1
Question: A hides the internal network’s IP address and presents a single IP
address to the outside world.
A. Firewall
B. Proxy server
C. Intrusion detection system
D. Network Monitor
Answer: B
Explanation of answer: A proxy server is often used with a firewall to hide the internal network’s
IP address and present a single IP address (its own) to the outside world. In fact, today’s modern
firewalls offer proxy functionality so an external proxy server is often not required.
Chapter this maps to: Chapter 1 Introduction to Computer Security


Question #2
Question: A black hat hacker is also called a
A. Thief
B. Cracker
C. Sneaker
D. None of the above
Answer: B
Explanation of answer: A black hat hacker upon gaining access to a system, causes intentional
harm and has a malicious intent. The black hat might steal data, erase files, or deface websites.
Black hat hackers are sometimes referred to as crackers.
Chapter this maps to: Chapter 1 Introduction to Computer Security


Question #3
@



Question: Someone who calls himself a hacker but lacks the expertise is a .
A. Script kiddy
B. Sneaker
C. White hat hacker
Ap



D. Black hat hacker
Answer: A
Explanation of answer: There are many Internet tools that can be used to perform hacking tasks,
and users of these tools who don’t understand the target system are script kiddies.
lu



Chapter this map to: Chapter 1 Introduction to Computer Security
s st



Question #4
Question: A(n) is a basic security device that filters traffic and is a barrier between a
network and the outside world or between a system and other systems.
uv



A. Firewall
B. Proxy server
ia




kiujytrfew
@Testbanksmafia

, lkjhgfdsa


C. Intrusion detection system
D. Network Monitor
Answer: A
Explanation of answer: A firewall is a barrier between a network and the outside world.
Sometimes a firewall takes the form of a standalone server, sometimes a router, and sometimes
software running on a machine. Whatever its physical form, a firewall filters traffic entering and
exiting the network.
Chapter this maps to: Chapter 1 Introduction to Computer Security

Question #5
Question: Which of these is a repository of security-related documentation and also sponsors a
number of security research projects?
A. Computer Emergency Response Team
B. F-Secure
C. SANS Institute
D. Microsoft Security Advisor
Answer: C
Explanation of answer: The SANS Institute website (www.sans.org) is a vast repository of
security-related documentation. On this site, you will find detailed documentation on virtually
every aspect of computer security you can imagine.
Chapter this maps to: Chapter 1 Introduction to Computer Security

Question #6
Question: CIA explains the three pillars of security. What does ‘I’ stand for in CIA?
A. Information
B. Intermission
C. Intermittent
D. Integrity
Answer: D
Explanation of answer: CIA references the three pillars of security: Confidentiality, Integrity,
@



and Availability. The Integrity pillar takes into account the factors that may affect the integrity of
information in motion or at rest.
Chapter this maps to: Chapter 1 Introduction to Computer Security
Ap



Question #7
Question: Someone who was previously a criminal but has turned ethical is known as a
?
A. White hat hacker
lu



B. Black hat hacker
C. Gray hat hacker
D. Red hat hacker
s



Answer: C
Explanation of answer: There are a few other terms you should be familiar with. A gray hat
st



hacker is one who was previously a black hat hacker and turned into a white hat hacker.
(Basically, a former criminal now turned ethical.)
Chapter this maps to: Chapter 1 Introduction to Computer Security
uv




Question #8
ia




kiujytrfew
@Testbanksmafia

, lkjhgfdsa


Question: Which TCP/IP protocol operates on port 80 and displays web pages?
A. FTP
B. SMTP
C. HTTP
D. DNS
Answer: C
Explanation of answer: HTTP (Hyper Text Transfer Protocol) is responsible for displaying the web
pages on the Internet and any Intranet websites. HTTP leverages TCP port 80 by default. Tomcat
and IIS are common examples of HTTP servers.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #9
Question: Internet addresses of the form www.google.com is known as what?
A. User-friendly web addresses
B. Uniform resource locators
C. User-accessible web addresses
D. Uniform address identifiers
Answer: B
Explanation of answer: When you type www.google.com into your web browser, your
computer, or your ISP, must translate the name you typed in known as a uniform resource
locator (URL) into an IP address. This is done with help of DNS protocol.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #10
Question: Which U.S. government agency created the distributed network that formed the basis
for the Internet?
A. Advanced Research Projects Agency
B. Central Intelligence Agency
C. NASA
D. Department of Energy
@



Answer: A
Explanation of answer: ARPA or Advanced Research Projects Agency commissioned the
construction of ARPANET, a simple Internet web of four points (called nodes): UCLA, Stanford,
UC Berkley, and the University of Utah. Although no one knew it at the time, this small web was
Ap



the birth of what would become the Internet.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #11
lu



Question: The TCP protocol operates at what layer of the OSI model?
A. Transport
B. Application
s



C. Network
D. Data link
st



Answer: A
Explanation of answer: OSI Stack is depicted as follows:
uv
ia




kiujytrfew
@Testbanksmafia

, lkjhgfdsa




TCP operates at transport layer and is responsible for providing connection oriented services.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #12
Question: Which TCP/IP protocol operates on port 53 and translates URLs into web addresses?
A. FTP
B. SMTP
C. HTTP
D. DNS
Answer: D
Explanation of answer: DNS (Domain Name Service) translates URLs into web addresses. DNS
works on UDP port 53.
Chapter this maps to: Chapter 2 Networks and the Internet

Question #13
Question: Which layer of the OSI model is divided into two sublayers: Media Access Control and
@



Logical Link Control?
A. Data link
B. Network
C. Presentation
Ap




D. Session
Answer: A
Explanation of answer: The Data Link layer describes the logical organization of data bits
transmitted on a particular medium. Data link is divided into two sublayers: the Media Access
lu



Control layer (MAC) and the Logical Link Control layer (LLC).
Chapter this maps to: Chapter 2 Networks and the Internet
s



Question #14
Question: Which of the following is the process to try to induce someone to provide you with
st



personal information?
A. Cyberstalking
B. Looping
uv



C. Phishing
D. Licensing
ia




kiujytrfew
@Testbanksmafia
14,41 €
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Testbanksmafia Michigan State University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
162
Miembro desde
1 año
Número de seguidores
12
Documentos
445
Última venta
1 semana hace
Test Banks, Solution Manuals, Case studies, Summaries, Essays, and Exclusive Package Deals, All Graded A+.

Welcome to my store! In need to elevate your academic grades? search no more. Here you'll find thousands of comprehensive 5-star rated resources designed to empower you on your academic journey. I'm dedicated to provide you with top-quality, accurate , reliable , verified and latest updated documents with 100% pass guarantee. Your success is our priority, Let's achieve those top grades together !!!

4,6

14 reseñas

5
11
4
2
3
0
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes