Chapter 17: Security

1. A. The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility.

2. A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.

3. A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environment.

4. C. A fingerprint scanner, or any device that identifies a person by a physical trait, is considered a biometric security control.

5. A. Although the end result of any of these attacks may be denying authorized users access to network resources, a DoS attack is specifically intended to prevent access to network resources by ...

Get CompTIA A+ Complete Deluxe Study Guide Recommended Courseware: Exams 220-801 and 220-802, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.