Answers to Review Questions

1. A. With black box testing, you begin with the premise that the attacker has no knowledge of the network.

2. D. The IEEE standard 802.1X is often referred to as EAP over LAN. It defines port-based security for wireless network access control.

3. B. The Security log in Windows 7 (as well as in all versions of Windows) shows successful and unsuccessful login attempts and can be viewed with Event Viewer.

4. C. During a code review, you look at all custom written applications for holes that may exist (in the form of the finished application, configuration files, libraries, and the like).

5. B, C. There are two states that an application can fail in. In a failsafe mode, the crash leaves the system secure. In a failopen ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.