19.9. Review Questions

  1. Which of the following terms refers to the prevention of unauthorized disclosure of keys?

    1. Authentication

    2. Integrity

    3. Access control

    4. Nonrepudiation

  2. Which of the following is a hacker's favorite target account on Microsoft's SQL Server?

    1. Ordinary user account

    2. Default systems administrator account

    3. Temporary user account

    4. Print operators

  3. You're in the process of securing the IT infrastructure by adding fingerprint scanners to your existing authentication methods. This type of security is an example of which of the following?

    1. Access control

    2. Physical barriers

    3. Biometrics

    4. Softening

  4. Which file extension should not be allowed with an e-mail attachment?

    1. .DOC

    2. .SCR

    3. .TXT

    4. .XLS

  5. Which type of attack denies authorized users access to network resources?

    1. DoS

    2. Worm ...

Get CompTIA A+® Complete Deluxe Study Guide:Exams 220-701 (Essentials) and 220-702 (Practical Application) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.