REVIEW ANSWERS
 
  1.  B   The theft of equipment can be prevented with adequate physical security.
  2.  A   Another name for port filtering is port blocking.
  3.  D   A demilitarized zone (DMZ) would normally be found protecting a larger network with web and e-mail servers.
  4.  B   Because the problems occurred after opening a file in its associated program, a malicious macro is likely embedded in the spreadsheet.
  5.  C   A rogue access point provides unauthorized access to a wireless network.
  6.  A and C   Change your password regularly. If you must write it down to help you remember it, keep it locked in a drawer.
  7.  A   A DoS attack uses a single infected computer (zombie), whereas a DDoS attack uses multiple infected computers ...

Get Mike Meyers’ CompTIA Network+ Certification Passport, 4th Edition (Exam N10-005), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.