Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

TEST BANK FOR Network Defense and Countermeasures Principles and Practices, 4th Edition by William Easttom | All Chapters | Latest Version A+

Beoordeling
-
Verkocht
-
Pagina's
69
Cijfer
A+
Geüpload op
18-01-2025
Geschreven in
2024/2025

TEST BANK FOR Network Defense and Countermeasures Principles and Practices, 4th Edition by William Easttom | All Chapters | Latest Version A+

Instelling
Vak

Voorbeeld van de inhoud

TEST BANK FOR
Network Defense and Countermeasures Principles and Practices, 4th Edition by William Easttom


Chapter 1 Introduction to Network Security

1) Which of the following is the unique address of the network interface card (NIC)?
A) IP address
B) NIC address
C) MAC address
D) URL address
Answer: C

2) Which of the following commands can you use to find your computer‟s IP address and
network information about your system?
A) Ipconfig
B) Ping
C) Tracert
D) None of the above
Answer: A

3) Which of the following commands can be used to determine if a system is reachable and how
long a packet takes to reach that system?
A) Ipconfig
B) Ping
C) Tracert
D) None of the above
Answer: B

4) Which of the following protocols operates at the transport layer of the OSI model?
A) FTP
B) TCP
C) DNS
D) IP
Answer: B

5) Which of the following layers of the OSI model is responsible for routing the information in
the network?
A) Transport layer
B) Network layer
C) Session layer
D) Physical layer
Answer: B

6) The OSI model is divided into how many layers?

,A) Four
B) Five
C) Six
D) Seven
Answer: D

7) Most attacks can be classified as one of three broad classes. Which of the following is not one
of these classes?
A) Viruses
B) Malware
C) Blocking
D) Intrusion
Answer: A

8) Denial of service (DoS) attacks fall under which of the following categories of attacks?
A) Viruses
B) Malware
C) Blocking
D) Intrusion
Answer: C

9) Which of the following is a small text file that web pages can place on your computer to keep
track of your browsing activity?
A) Spyware
B) Cookie
C) Key logger
D) Trojan
Answer: B

10) In which of the following attacks does a hacker use a computer to call phone numbers in
sequence until another computer answers?
A) War-driving
B) War-calling
C) War-dialing
D) War-flying
Answer: C

11) Which of the following types of hackers will report a vulnerability when they find it?
A) White hat
B) Gray hat
C) Green hat
D) Black hat
Answer: A

12) Which of the following types of hackers hacks into systems to cause harm or steal data?
A) White hat
B) Gray hat

,C) Green hat
D) Black hat
Answer: D
13) Which of the following is another term for a black hat hacker?
A) Cracker
B) White hat
C) Sneaker
D) Creeker
Answer: A

14) Which of the following is another term for ethical hacker?
A) Cracker
B) Black hat
C) Sneaker
D) Creeker
Answer: C

15) Which of the following can be used to protect the confidentiality of information?
A) Encryption
B) Auditing
C) Backups
D) Network server redundancy
Answer: A

16) Which of the following is used to ensure information integrity?
A) Auditing
B) Digital signatures
C) Backups
D) Passwords
Answer: B

17) Which of the following is not part of the CIA triangle?
A) Integrity
B) Confidentiality
C) Discretion
D) Availability
Answer: C

18) Which of the following statements about the layered security approach is true?
A) The perimeter is secured, but the systems within the perimeter are vulnerable.
B) The systems within the perimeter are secured, but the perimeter is vulnerable.
C) Both the perimeter and the individual systems within the perimeter are secured.
D) Both the perimeter and the individual systems within the perimeter are vulnerable.
Answer: C

, 19) Which of the following requires government agencies to identify sensitive systems, conduct
computer security training, and develop computer security plans?
A) Center for Information Technology
B) Computer Crimes Act of Oklahoma
C) Sarbanes-Oxley (SOX)
D) Computer Security Act of 1987
Answer: D

20) Which of the following security resources offers a repository for detailed information on
virus outbreaks?
A) SANS Institute
B) F-Secure Corporation
C) CERT
D) Microsoft Security TechCenter
Answer: B

21) The term/concept URL is:
A) synonymous with URI
B) synonymous with URN
C) a scheme followed by authority, path, and possibly query and fragment
D) a subset of URI
Answer: D


22) Which statement about the IMAP protocol is true?
A) It is used for chat rooms.
B) It is a successor to POP3.
C) It is used by Microsoft Active Directory.
D) It is used to transfer files between computers.
Answer: B


23) Which of the following is NOT a TCP/IP model layer?
A) Application layer
B) Transport layer
C) Digital layer
D) Data-link layer
Answer: C


24) What is the name of the virus that caused 29% of malicious attacks on macOS devices in
2019?
A) Schlayer
B) Slayer
C) BadApple
D) Malicious 2.0
Answer: A

Gekoppeld boek

Geschreven voor

Vak

Documentinformatie

Geüpload op
18 januari 2025
Aantal pagina's
69
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
TestsSolution
5.0
(1)

Maak kennis met de verkoper

Seller avatar
TestsSolution Techme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5
Lid sinds
1 jaar
Aantal volgers
0
Documenten
96
Laatst verkocht
1 maand geleden
I have Accounting, Finance, Biology, Chemistry, Economics, Nursing and other Subjects A+

Welcome To TestsSolution! The place to find the best study materials for various subjects. You can be assured that you will receive only the best which will help you to ace your exams. All the materials posted are A+ Graded. Please rate and write a review after using my materials. Your reviews will motivate me to add more materials. Thank You Soo Much!!!

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen