Appendix D. Answers to Chapter Q&A

Chapter 1 Q&A

1:

Which resources in a network are considered the most trusted?

A1:

Answer: The resources in a network that are considered the most trusted include internal servers, domain controllers, and network-attached devices.

2:

List five types of malware.

A2:

Answer: Five types of malware are viruses, worms, Trojan horses, spyware, and hoaxes.

3:

What is a hoax?

A3:

Answer: A hoax is a special kind of malware. Hoaxes do not contain any code, instead relying on the gullibility of the users to spread them. They often use emotional subjects such as a child's last wish. Any e-mail message that asks you to forward copies to everyone you know is almost certainly a hoax.

4:

What is the difference between a hacker and ...

Get Network Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.