19.9. Review Questions
Which of the following terms refers to the prevention of unauthorized disclosure of keys?
Authentication
Integrity
Access control
Nonrepudiation
Which of the following is a hacker's favorite target account on Microsoft's SQL Server?
Ordinary user account
Default systems administrator account
Temporary user account
Print operators
You're in the process of securing the IT infrastructure by adding fingerprint scanners to your existing authentication methods. This type of security is an example of which of the following?
Access control
Physical barriers
Biometrics
Softening
Which file extension should not be allowed with an e-mail attachment?
.DOC
.SCR
.TXT
.XLS
Which type of attack denies authorized users access to network resources?
DoS
Worm ...
Get CompTIA A+® Complete Deluxe Study Guide:Exams 220-701 (Essentials) and 220-702 (Practical Application) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.