AppendixAnswers to Review Questions
Chapter 1: Threats, Attacks, and Vulnerabilities
- C. Banner grabbing is the communications technique a hacker can use to identify the product that is running on an open port facing the Internet.
- A. The only real option to return a system to a secure state after a rootkit is reconstitution.
- D. Social engineering is more likely to occur if users aren’t properly trained to detect and prevent it. The lack of user awareness training won’t have as much impact on man-in-the-middle, reverse hash-matching, or physical intrusion attacks.
- C. A watering hole attack could be used to plant phone-home-to-identity malware on the systems of subsequent visitors.
- A, B, and D. A programmer can implement the most effective ...
Get CompTIA Security+ Review Guide, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.