AppendixAnswers to Review Questions

Chapter 1: Threats, Attacks, and Vulnerabilities

  1. C. Banner grabbing is the communications technique a hacker can use to identify the product that is running on an open port facing the Internet.
  2. A. The only real option to return a system to a secure state after a rootkit is reconstitution.
  3. D. Social engineering is more likely to occur if users aren’t properly trained to detect and prevent it. The lack of user awareness training won’t have as much impact on man-in-the-middle, reverse hash-matching, or physical intrusion attacks.
  4. C. A watering hole attack could be used to plant phone-home-to-identity malware on the systems of subsequent visitors.
  5. A, B, and D. A programmer can implement the most effective ...

Get CompTIA Security+ Review Guide, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.