1.8. Answers

  1. D. Social engineering is a type of hack that involves contacting victims through phone or e-mail and tricking them into doing something that compromises company security. See "Social engineering attacks".

  2. B. An eavesdropping attack occurs when a hacker monitors network traffic to try to capture information that could be useful in another attack. Review "Eavesdropping attack".

  3. A. A denial of service (DoS) attack is when a hacker consumes all the system's processing power or bandwidth so that it cannot to perform its normal job. Check out "Denial of service".

  4. B. A mirrored volume is used to create a full duplicate of the data on two different disks. Peruse "Implementing RAID solutions".

  5. D. A lockdown cable is used to secure the laptop to a desk to help prevent the laptop from being stolen. Refer to "Understanding Physical Security".

  6. A, D. Biometric devices involve authenticating a user through the user's unique physical characteristics. Fingerprint scans and retinal scans are popular biometric authentication methods. See "Authentication".

  7. C. A differential backup backs up only those files that have changed since the last full backup and then does not clear the archive bit. Check out "Backup review".

  8. D. Secure Socket Layer (SSL) is used to encrypt Web traffic. You can identify whether you are on a secure Web site by looking for the lock icon at the bottom of the screen. Peruse "Methods of Securing Transmissions".

  9. C. You want to make sure that you physically destroy the drives ...

Get CompTIA A+® Certification All-In-One For Dummies®, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.