Appendix A. Answer Key

CHAPTER 1 Evolution of Hacking

  1. C

  2. Written authorization

  3. Vulnerablilty

  4. Scanning

  5. D

  6. D

  7. B

  8. D

  9. D

  10. D

CHAPTER 2 TCP/IP Review

  1. C

  2. D

  3. B

  4. C

  5. ping

  6. B

  7. D

  8. B

  9. C

  10. B

CHAPTER 3 Cryptographic Concepts

  1. A

  2. B

  3. D

  4. C

  5. A

  6. C

  7. C

  8. D

  9. B

  10. A

  11. A

  12. A

  13. A

CHAPTER 4 Physical Security

  1. B

  2. C

  3. C

  4. Bollard

  5. A

  6. C

  7. D

  8. A

  9. D

  10. D

  11. B

  12. D

  13. A

CHAPTER 5 Footprinting Tools and Techniques

  1. A

  2. A

  3. D

  4. EDGAR

  5. C

  6. ARIN

  7. C

  8. B

  9. D

  10. A

CHAPTER 6 Port Scanning

  1. A

  2. C

  3. D

  4. B

  5. A

  6. B

  7. D

  8. A

  9. UDP

  10. D

  11. B

  12. A

  13. C

CHAPTER 7 Enumeration and Computer System Hacking

  1. B

  2. B

  3. B

  4. A

  5. A

  6. B

  7. Backdoor

  8. A

  9. A

  10. Password cracker

  11. A

  12. C

CHAPTER 8 Wireless Vulnerabilities

  1. B

  2. A

  3. Bluetooth

  4. A

  5. D

  6. A

  7. B

  8. A

  9. A

  10. C

CHAPTER 9 Hacking Web Servers

  1. B

  2. A

  3. B

  4. B

  5. B

  6. A and C

  7. C

  8. B

  9. B

CHAPTER 10 Trojans and Backdoors

  1. B

  2. A

  3. C

  4. C

  5. C

  6. B

  7. B

  8. Education

  9. A

  10. A

  11. B

  12. A

  13. Logic bombs

  14. B

CHAPTER 11 Malware, Worms, and Viruses

  1. A

  2. A

  3. D

  4. B

  5. Covert channels

  6. A

  7. A

  8. D

CHAPTER 12 Sniffers, Session Hacking, and Denial of Service Attacks

  1. A

  2. B

  3. B

  4. A

  5. A

  6. Hijacking

  7. MAC flooding

  8. A

  9. B

  10. B

CHAPTER 13 Linux, Live CDs, ...

Get Hacker Techniques, Tools, and Incident Handling now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.