Appendix A. Answers to Chapter Review Questions

Chapter 1

1. a, b, and e

2. a, d, and e

3. a. Preventative = f. Lock

b. Deterrent = e. Video surveillance

c. Detective = d. Motion sensor

4. a. White hat = p. Breaks security for nonmalicious reasons

b. Black hat = k. Unethical hacker

c. Gray hat = m. Ethically questionable hacker

d. Blue hat = i. Bug tester

e. Cracker = o. Synonymous with black hat hacker

f. Phreaker = l. Hacker of telecommunication systems

g. Script kiddy = j. Hacker with little skill

h. Hacktivist = n. Hacker with a political agenda

5. a. Escalate privilege = Step 4

b. Leverage the compromised system = Step 7

c. Perform footprint analysis = Step 1

d. Install back doors = Step 6

e. Enumerate applications and operating systems ...

Get Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.