O'Reilly logo

Network Security First-Step, Second Edition by Donald Stoddard, Thomas M. Thomas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Answers to Review Questions

Chapter 1

1. What is a target of opportunity?

Answer: A target of opportunity is one in which a vulnerability has been detected by an attacker, who decides to try an exploit because the target has enabled him to find it.

2. What is a target of choice?

Answer: A target of choice occurs when attackers choose you as a target. Their reason is irrelevant because this is a mental commitment on the part of the attackers.

3. What is the purpose of footprinting?

Answer: Footprinting is the process attackers take to understand a target’s network and associated systems. This is a continuous process used throughout all planned attacks, and in which attackers want to gain as much information about the target as possible. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required