Appendix D. Answers to Chapter Q&A
Chapter 1 Q&A
Which resources in a network are considered the most trusted? | |
Answer: The resources in a network that are considered the most trusted include internal servers, domain controllers, and network-attached devices. | |
List five types of malware. | |
Answer: Five types of malware are viruses, worms, Trojan horses, spyware, and hoaxes. | |
What is a hoax? | |
Answer: A hoax is a special kind of malware. Hoaxes do not contain any code, instead relying on the gullibility of the users to spread them. They often use emotional subjects such as a child's last wish. Any e-mail message that asks you to forward copies to everyone you know is almost certainly a hoax. | |
What is the difference between a hacker and ... |
Get Network Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.