6.7. Review Questions

  1. Which is the best countermeasure to social-engineering attacks?

    1. Preventing the download of mobile code from the Internet

    2. Employee training

    3. Strong password policies

    4. Auditing user activities

  2. You run a full backup every Monday. You also run a differential backup every other day of the week. You experience a drive failure on Friday. Which of the following restoration procedures should you use to restore data to the replacement drive?

    1. Restore the full backup and then each differential backup

    2. Restore the full backup and then the last differential backup

    3. Restore the differential backup

    4. Restore the full backup

  3. When is business continuity needed?

    1. When new software is distributed

    2. When business processes are interrupted

    3. When a user steals company ...

Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.