Review Questions

1. As part of your training program, you’re trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced technological methods. Some attacks, you explain, take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe attacks of this type?

A. Social engineering

B. IDS system

C. Perimeter security

D. Biometrics

2. Which classification of information designates that information can be released on a restricted basis to outside organizations?

A. Private information

B. Full distribution

C. Restricted information

D. Limited distribution

3. You’ve recently been hired by ACME to do a security audit. The managers ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.