5.4. Review Questions

  1. What is physical security?

  2. What does Kerberos use to authenticate a principal?

  3. Which authentication method sends a challenge to the client that is encrypted and then sent back to the server?

  4. Which type of authentication method uses more than one authentication process for a logon?

  5. What type of technology relies on a physical characteristic of the user to verify identity?

  6. In which type of attack does someone try to con your organization into revealing account and password information?

  7. What type of malicious code attempts to replicate using whatever means are available?

  8. Which type of malware enters the system disguised as a legitimate program?

  9. What could be one cause of unusual activity on the system disk when no user is accessing ...

Get CompTIA A+ Complete: Review Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.