6.8. Answers to Review Questions

  1. B. The only real countermeasure to social engineering is employee training. The other three options are good security measures, but they aren't countermeasures to social engineering.

  2. B. The proper procedure is to restore the full backup and then the last differential backup. The other three options are incorrect or incomplete.

  3. D. Business continuity is used when business processes are threatened. Security policy is used when new software is distributed. Disaster recovery is used when business processes are interrupted. Incident response is used when a user steals company data.

  4. A. When a user signs an acceptable use policy, it's a form of consent to the monitoring and auditing processes used by the organization. ...

Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.