Answers to Review Questions
1. C. In order for network monitoring to work properly, you need a PC and a network card running in promiscuous mode.
2. D. In Linux, the whatis utility can show if there is more than one set of documentation on the system for a command you are trying to find information on.
3. B. The administrator is the person/account responsible for setting the security policy for an organization.
4. C. An anomaly-detection IDS (AD-IDS) looks for anomalies, meaning it looks for things outside of the ordinary.
5. A. Port spanning (also known as port mirroring) copies the traffic from all ports to a single port and disallows bidirectional traffic on that port.
6. D. Shunning, or ignoring an attack, is a common response.
7. D. A heuristic ...
Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.