Appendix: End of Chapter Question Answers

Chapter 2: The Anthem Break-in Case Study

1.  

a.  Spear phishing

b.  Waterholes

2.  

a.  Enterprise Compromise Assessment Tool (ECAT) scanning software

3.  

a.  The China Chopper web shell

4.  

a.  They use the Sticky Keys trick to modify the registry on the target’s system server.

5.  

a.  It’s a network of virtual tunnels that is used to hide websites from each other and outsiders.

6.  

a.  Control and relay packets. Tor packets set up an anonymous path. The path sets up links in sequence, and when it is finished, hackers send relay packets containing malware, code, and software to the target site.

7.  

a.  The process of encapsulating a transmitted message in a series of encrypted IP addressing layers ...

Get Network and Data Security for Non-Engineers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.