Answers to Review Questions

1. D. This email is likely a hoax. When you receive an email hoax, the first step is to inform your network administrator. Don’t follow its directions, forward it to others, or open any attachments.

2. A. The only real option to return a system to a secure state after a rootkit is reconstitution.

3. A. A land DoS attack uses network packets that have been spoofed so that the source and destination address are that of the victim. A teardrop attack uses fragmented IP packets. Smurf and fraggle attacks use spoofed ICMP and UDP packets, respectively, against an amplification network.

4. D. Social engineering is more likely to occur if users aren’t properly trained to detect and prevent it. The lack of user awareness training ...

Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.