Chapter 75: Penetration Testing
Review Questions/Exercises
True/False
1. False
2. True
3. True
4. True
5. True
Multiple Choice
1. E
2. C
3. C
4. B
5. D
Exercise
Solution
The following is a partial exercise solution. The students should be able to expand on the following:
• How well the system tolerates real world-style attack patterns.
• The likely level of sophistication an attacker needs to successfully compromise the system.
• Additional countermeasures that could mitigate threats against the system.
• Defenders' ability to detect attacks and respond appropriately.
Hands-on Project
Solution
The following is a partial project solution. The students should be able to expand on the following:
• Host name and IP address information can be gathered through many methods, ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.