As mentioned in the section "How to Use This Book" in the Introduction, you have two choices for review questions: the Q&A questions here or the exam simulation questions on the CD-ROM. The questions that follow present a bigger challenge than the exam itself because they use an open-ended question format. By using this more difficult format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. You can find the answers to these questions in the appendix.

1 An operating system application weakness that allows a user to alter software or gain access to a system or network is called a_.

2. What are the three reasons that attacks can occur and damage networks?

3. If an organization has a high turnover rate for its system administrators, this is considered a security policy weakness because of_.

4. Because smaller organizations have a limited IT staff, there is a greater chance that this organization would be susceptible to which kinds of configuration issues?

5. What is one of the most common default settings overlooked by most network and security administrators?

6 Describe an operating system weakness?

7. What is a structured threat and why does the Federal Bureau of Investigation (FBI) consider it important?

8. What are the five core reasons for intruding on a system or network?

9. The types of reconnaissance attacks are DNS queries, ping sweep, vertical scans, horizontal scans, and_.

10. What is a DoS attack and why is it considered so destructive?



0 0

Post a comment