Chapter Review

Each chapter concludes with a “Chapter Review” section. In a question-and-answer format, the “Chapter Review” section tests the basic ideas and concepts covered in each chapter. In tandem with the “Chapter Objectives” and “Chapter Summaries,” the “Chapter Review” section builds upon and reinforces key ideas and concepts. Each “Chapter Review” section is composed of a series of topical questions and answers to the “Chapter Review” section are included in Appendix A, “Answers to Chapter Review Questions.”

1. What is a target of opportunity?

2. What is a target of choice?

3. What is the purpose of footprinting?

4. Which of the following are ways by which an attacker can gain access?

a. Operating system attacks

b. Application attacks

c. Misconfiguration attacks

d. Script attacks

e. DoS or DDoS

f. All the above

5. List four of the network security organizations.

6. Briefly explain why it is important for an attacker to cover his tracks.

7. Social engineering can be damaging to a corporation without an overt attack ever happening. Explain why.

8. What kind of information might be found if an attacker dumpster dives at your place of work?

9. DNS information gained through WHOIS is used for what kind of reconnaissance?

10. What two free reconnaissance tools are available with most versions of the Windows operating system?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.251.56