Appendix A. Answer Key
CHAPTER 1 Evolution of Hacking
C
Written authorization
Vulnerablilty
Scanning
D
D
B
D
D
D
CHAPTER 2 TCP/IP Review
C
D
B
C
ping
B
D
B
C
B
CHAPTER 3 Cryptographic Concepts
A
B
D
C
A
C
C
D
B
A
A
A
A
CHAPTER 4 Physical Security
B
C
C
Bollard
A
C
D
A
D
D
B
D
A
CHAPTER 5 Footprinting Tools and Techniques
A
A
D
EDGAR
C
ARIN
C
B
D
A
CHAPTER 6 Port Scanning
A
C
D
B
A
B
D
A
UDP
D
B
A
C
CHAPTER 7 Enumeration and Computer System Hacking
B
B
B
A
A
B
Backdoor
A
A
Password cracker
A
C
CHAPTER 8 Wireless Vulnerabilities
B
A
Bluetooth
A
D
A
B
A
A
C
CHAPTER 9 Hacking Web Servers
B
A
B
B
B
A and C
C
B
B
CHAPTER 10 Trojans and Backdoors
B
A
C
C
C
B
B
Education
A
A
B
A
Logic bombs
B
CHAPTER 11 Malware, Worms, and Viruses
A
A
D
B
Covert channels
A
A
D
CHAPTER 12 Sniffers, Session Hacking, and Denial of Service Attacks
A
B
B
A
A
Hijacking
MAC flooding
A
B
B
CHAPTER 13 Linux, Live CDs, ...
Get Hacker Techniques, Tools, and Incident Handling now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.