Answers to Assessment Test

  1. A. privilege audit is used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of an organization. For more information, see Chapter 11.
  2. D. A mantrap limits access to one individual at a time. It could be, for example, a small room. Mantraps typically use electronic locks and other methods to control access. For more information, see Chapter 10.
  3. B. Public Key Cryptography Standards is a set of voluntary standards for public key cryptography. This set of standards is coordinated by RSA. For more information, see Chapter 8.
  4. B. The Recovery Point Objective (RPO) is the point of maximum tolerable loss for a system due to a major incident. For additional ...

Get CompTIA Security+ Study Guide, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.