Solutions – Chapter 1
CIAMPA – Security+ Guide to Network Security Fundamentals, 5th ed.
1. D. is only used by hactivists against foreign enemies
2. D. gray hat hackers
3. C. greater sophistication of defense tools
4. C. The vulnerability was previously unknown and is unlikely to be patched
quickly.
5. D. the necessary steps to protect a person or property from harm
6. C. Authorization
7. B. purposes
8. A. threat agent
9. C. Authentication
10. C. The aim of a hactivist is not to incite panic like cyberterrorists.
11. A. avoid legal consequences
12. D. Health Insurance Portability and Accountability Act (HIPAA)
13. B. They can cause significant disruption by destroying only a few targets.
14. D. reconnaissance
15. B. diversity
16. C. stockholders
17. A. cybercriminals
18. B. to spy on citizens
19. C. obscurity
20. D. Chief Information Security Officer (CISO)
Solutions – Chapter 2
CIAMPA – Security+ Guide to Network Security Fundamentals, 5th ed.
, 1. C. virus
2. A. transport itself through the network to another device
3. B. ransomware
4. C. intimidation
5. C. Trojan
6. D. Reformat the hard drive and reinstall the operating system.
7. C. Send spam email to all users in the company on Tuesday.
8. B. typo squatting
9. A. adware
10. B. Software keyloggers are easy to detect.
11. C. Hypertext Transport Protocol (HTTP)
12. D. users who access a common website
13. A. Spear phishing
14. A. spim
15. B. impersonation
16. B. A hoax could convince a user that a bad Trojan is circulating and that he
should change his security settings.
17. D. books
18. C. Tailgating
19. A. it displays the attacker’s programming skills
20. C. bot herder
Solutions – Chapter 3
CIAMPA – Security+ Guide to Network Security Fundamentals, 5th ed.
CIAMPA – Security+ Guide to Network Security Fundamentals, 5th ed.
1. D. is only used by hactivists against foreign enemies
2. D. gray hat hackers
3. C. greater sophistication of defense tools
4. C. The vulnerability was previously unknown and is unlikely to be patched
quickly.
5. D. the necessary steps to protect a person or property from harm
6. C. Authorization
7. B. purposes
8. A. threat agent
9. C. Authentication
10. C. The aim of a hactivist is not to incite panic like cyberterrorists.
11. A. avoid legal consequences
12. D. Health Insurance Portability and Accountability Act (HIPAA)
13. B. They can cause significant disruption by destroying only a few targets.
14. D. reconnaissance
15. B. diversity
16. C. stockholders
17. A. cybercriminals
18. B. to spy on citizens
19. C. obscurity
20. D. Chief Information Security Officer (CISO)
Solutions – Chapter 2
CIAMPA – Security+ Guide to Network Security Fundamentals, 5th ed.
, 1. C. virus
2. A. transport itself through the network to another device
3. B. ransomware
4. C. intimidation
5. C. Trojan
6. D. Reformat the hard drive and reinstall the operating system.
7. C. Send spam email to all users in the company on Tuesday.
8. B. typo squatting
9. A. adware
10. B. Software keyloggers are easy to detect.
11. C. Hypertext Transport Protocol (HTTP)
12. D. users who access a common website
13. A. Spear phishing
14. A. spim
15. B. impersonation
16. B. A hoax could convince a user that a bad Trojan is circulating and that he
should change his security settings.
17. D. books
18. C. Tailgating
19. A. it displays the attacker’s programming skills
20. C. bot herder
Solutions – Chapter 3
CIAMPA – Security+ Guide to Network Security Fundamentals, 5th ed.