Appendix A. Answer Key

CHAPTER 1 Evolution of Hacking

  1. C

  2. Written authorization

  3. Vulnerablilty

  4. Scanning

  5. D

  6. D

  7. B

  8. D

  9. D

  10. D

CHAPTER 2 TCP/IP Review

  1. C

  2. D

  3. B

  4. C

  5. ping

  6. B

  7. D

  8. B

  9. C

  10. B

CHAPTER 3 Cryptographic Concepts

  1. A

  2. B

  3. D

  4. C

  5. A

  6. C

  7. C

  8. D

  9. B

  10. A

  11. A

  12. A

  13. A

CHAPTER 4 Physical Security

  1. B

  2. C

  3. C

  4. Bollard

  5. A

  6. C

  7. D

  8. A

  9. D

  10. D

  11. B

  12. D

  13. A

CHAPTER 5 Footprinting Tools and Techniques

  1. A

  2. A

  3. D

  4. EDGAR

  5. C

  6. ARIN

  7. C

  8. B

  9. D

  10. A

CHAPTER 6 Port Scanning

  1. A

  2. C

  3. D

  4. B

  5. A

  6. B

  7. D

  8. A

  9. UDP

  10. D

  11. B

  12. A

  13. C

CHAPTER 7 Enumeration and Computer System Hacking

  1. B

  2. B

  3. B

  4. A

  5. A

  6. B

  7. Backdoor

  8. A

  9. A

  10. Password cracker

  11. A

  12. C

CHAPTER 8 Wireless Vulnerabilities

  1. B

  2. A

  3. Bluetooth

  4. A

  5. D

  6. A

  7. B

  8. A

  9. A

  10. C

CHAPTER 9 Hacking Web Servers

  1. B

  2. A

  3. B

  4. B

  5. B

  6. A and C

  7. C

  8. B

  9. B

CHAPTER 10 Trojans and Backdoors

  1. B

  2. A

  3. C

  4. C

  5. C

  6. B

  7. B

  8. Education

  9. A

  10. A

  11. B

  12. A

  13. Logic bombs

  14. B

CHAPTER 11 Malware, Worms, and Viruses

  1. A

  2. A

  3. D

  4. B

  5. Covert channels

  6. A

  7. A

  8. D

CHAPTER 12 Sniffers, Session Hacking, and Denial of Service Attacks

  1. A

  2. B

  3. B

  4. A

  5. A

  6. Hijacking

  7. MAC flooding

  8. A

  9. B

  10. B

CHAPTER 13 Linux, Live CDs, and Automated Assessment Tools

  1. A

  2. B

  3. A

  4. A

  5. B

  6. B

  7. A

  8. A

  9. B

  10. A

CHAPTER 14 Incident Response

  1. Fault tolerance

  2. Chief information security officer (CISO), Information security officer (ISO), Chief security officer (CSO), Chief executive officer (CEO), Chief information officer (CIO), Chief operating officer (COO)

  3. A

  4. B

  5. Evidence

  6. C

  7. Secondary evidence

  8. Alternate site

CHAPTER 15 Defensive Technologies

  1. B

  2. C

  3. A

  4. B

  5. A

  6. A

  7. A

  8. A

  9. B

  10. D

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.11.226