␡
- Practice Questions
- Quick-Check Answer Key
- Answers and Explanations
This chapter is from the book
Quick-Check Answer Key
Objective 3.1: Analyze and differentiate among types of malware.
- A
- C
- A
- B
- C
- B
- A
- C
- A, B, C
- A
- D
- C
- A
- D
- B
- A
- B
- A
- A, B, D
- A, C
- C
- D
- B
- A
- B
- C
- B
- A, C, D
- D
- C
- B
- A, B, C
- A, C
- B, C, D
- D
- A
- B
- A
- C
- A, C, D
Objective 3.2: Analyze and differentiate among types of attacks.
- C
- A, B
- C
- A
- B
- D
- D
- B
- C
- A, B, D
- A
- B
- D
- C
- B
- D
- B, C, D
- B
- C, D
- A, B
- A, C, D
- A, D
- C
- D
- B
- C
- C
- A
- D
- B
- D
- C
- C
- A
- A
- D
- B, C
- D
- A
- B
- D
- C
- B
- D
- B
Objective 3.3: Analyze and differentiate among types of social engineering attacks.
- B
- C
- B
- A
- D
- D
- B
- A
- C
- D
Objective 3.4: Analyze and differentiate among types of wireless attacks.
- B
- D
- C
- A, B, C
- C
- D
- A
- C
- B
- C
- A
- D
- B
- A
- B
- C
- A
- B
- D
- A
Objective 3.5: Analyze and differentiate among types of application attacks.
- A, D
- C
- B
- B, C
- A
- C
- B
- D
- A
- D
- B
- A
- B
- B, C
- A, D
- B, C
- A
- A, B, C
- A, C
- D
- B
- A
- B
- A, C
- C
Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques.
- B
- C
- B, C
- A
- C
- D
- A
- A, B, D
- A
- B
- A, B, D
- D
- C
- A
- D
- B, C
- C
- D
- C
- A, B, D
- D
- D
- B, C
- B
- C
- A, C, D
- B
- C
- A, B
- B, C
- D
- C
- B
- D
- B
- B
- A
- C
- D
- C
Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities.
- A
- D
- C
- B
- D
- A
- A
- C
- D
- B
- D
- A
- D
- B
- C
Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.
- B
- A, C
- B, C
- D
- A
- A
- B
- B
- C
- A