Answers to Review Questions

1. C. In order for network monitoring to work properly, you need a PC and a network card running in promiscuous mode.

2. D. In Linux, the whatis utility can show if there is more than one set of documentation on the system for a command you are trying to find information on.

3. B. The administrator is the person/account responsible for setting the security policy for an organization.

4. C. An anomaly-detection IDS (AD-IDS) looks for anomalies, meaning it looks for things outside of the ordinary.

5. A. Port spanning (also known as port mirroring) copies the traffic from all ports to a single port and disallows bidirectional traffic on that port.

6. D. Shunning, or ignoring an attack, is a common response.

7. D. A heuristic ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.