11.7. Answers to Review Questions

  1. A. The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility.

  2. A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.

  3. A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environment.

  4. A. The Bell-La Padula model is intended to protect confidentiality of information. This is accomplished by prohibiting users from reading above their security level and preventing them from writing below their security level.

  5. A. BitLocker provides drive encryption and is available with Windows Vista.

  6. C. TPM is the name assigned ...

Get CompTIA A+ Complete Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.