100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Test Bank - Network Defense and Countermeasures, Principles and Practices, 4th Edition by William Easttom | All Chapters included.

Puntuación
-
Vendido
-
Páginas
70
Grado
A+
Subido en
09-01-2026
Escrito en
2025/2026

Test Bank - Network Defense and Countermeasures, Principles and Practices, 4th Edition by William Easttom | All Chapters included.

Institución
Network Defense And Countermeasures
Grado
Network Defense and Countermeasures











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Institución
Network Defense and Countermeasures
Grado
Network Defense and Countermeasures

Información del documento

Subido en
9 de enero de 2026
Número de páginas
70
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

JHGFDS



TEST BANK

Network Defense and Countermeasures: Principles and Practices


by William Easttom II
4th Edition
@
Pa
ss
vi
b es

JHGFDS
@Passvibes @Passvibes

, JHGFDS



TEST BANK FOR
Network Defense and Countermeasures Principles and Practices, 4th Edition by William Easttom


Chapter 1 I n t r o d u c t i o n to Network Security

1) Which of the following is the unique address of the network interface card (NIC)?
A) IP address
B) NIC address
C) MAC address
D) URL address
Answer: C

2) Which of the following commands can you use to find your computer‟s IP address and
network information about your system?
@

A) Ipconfig
B) Ping
C) Tracert
D) None of the above
Answer: A
Pa

3) Which of the following commands can be used to determine if a system is reachable and how
long a packet takes to reach that system?
A) Ipconfig
B) Ping
C) Tracert
D) None of the above
Answer: B
ss

4) Which of the following protocols operates at the transport layer of the OSI model?
A) FTP
B) TCP
C) DNS
D) IP
Answer: B
vi

5) Which of the following layers of the OSI model is responsible for routing the information in
the network?
A) Transport layer
B) Network layer
b

C) Session layer
D) Physical layer
Answer: B
es

6) The OSI model is divided into how many layers?




JHGFDS
@Passvibes @Passvibes

, JHGFDS


A) Four
B) Five
C) Six
D) Seven
Answer: D

7) Most attacks can be classified as one of three broad classes. Which of the following is not one
of these classes?
A) Viruses
B) Malware
C) Blocking
D) Intrusion
Answer: A

8) Denial of service (DoS) attacks fall under which of the following categories of attacks?
A) Viruses
@

B) Malware
C) Blocking
D) Intrusion
Answer: C

9) Which of the following is a small text file that web pages can place on your computer to keep
Pa

track of your browsing activity?
A) Spyware
B) Cookie
C) Key logger
D) Trojan
Answer: B

10) In which of the following attacks does a hacker use a computer to call phone numbers in
ss

sequence until another computer answers?
A) War-driving
B) War-calling
C) War-dialing
D) War-flying
Answer: C
vi

11) Which of the following types of hackers will report a vulnerability when they find it?
A) White hat
B) Gray hat
C) Green hat
b

D) Black hat
Answer: A

12) Which of the following types of hackers hacks into systems to cause harm or steal data?
es

A) White hat
B) Gray hat


JHGFDS
@Passvibes @Passvibes

, JHGFDS


C) Green hat
D) Black hat
Answer: D
13) Which of the following is another term for a black hat hacker?
A) Cracker
B) White hat
C) Sneaker
D) Creeker
Answer: A

14) Which of the following is another term for ethical hacker?
A) Cracker
B) Black hat
C) Sneaker
D) Creeker
Answer: C
@

15) Which of the following can be used to protect the confidentiality of information?
A) Encryption
B) Auditing
C) Backups
D) Network server redundancy
Pa

Answer: A

16) Which of the following is used to ensure information integrity?
A) Auditing
B) Digital signatures
C) Backups
D) Passwords
Answer: B
ss

17) Which of the following is not part of the CIA triangle?
A) Integrity
B) Confidentiality
C) Discretion
D) Availability
Answer: C
vi

18) Which of the following statements about the layered security approach is true?
A) The perimeter is secured, but the systems within the perimeter are vulnerable.
B) The systems within the perimeter are secured, but the perimeter is vulnerable.
b

C) Both the perimeter and the individual systems within the perimeter are secured.
D) Both the perimeter and the individual systems within the perimeter are vulnerable.
Answer: C
es

JHGFDS
@Passvibes @Passvibes
$18.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
Passvibes

Conoce al vendedor

Seller avatar
Passvibes Walden University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
12
Miembro desde
4 semanas
Número de seguidores
4
Documentos
276
Última venta
4 días hace
PASSVIBES - Your Ultimate Study Companion for Academic Excellence

Passvibes is your all-in-one global study guide hub — built to make learning simple, smart, and rewarding. We bring together thousands of high-quality study materials, topic-specific notes, and verified answers designed to help students master every subject with ease. Whether you’re in high school, college, or university, passvibes has everything you need — from clear explanations to exam-ready practice questions. Our goal is to turn studying into a confident, stress-free journey toward success. Trusted by learners and educators worldwide, passvibes is where great grades begin and excellence grows.

Lee mas Leer menos
0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes