Chapter 75: Penetration Testing

Review Questions/Exercises

True/False

1. False
2. True
3. True
4. True
5. True

Multiple Choice

1. E
2. C
3. C
4. B
5. D

Exercise

Solution

The following is a partial exercise solution. The students should be able to expand on the following:
• How well the system tolerates real world-style attack patterns.
• The likely level of sophistication an attacker needs to successfully compromise the system.
• Additional countermeasures that could mitigate threats against the system.
• Defenders' ability to detect attacks and respond appropriately.

Hands-on Project

Solution

The following is a partial project solution. The students should be able to expand on the following:
• Host name and IP address information can be gathered through many methods, ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.