Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can.
1. Which of the follow methods would be the most effective method to physically secure computers that are used in a lab environment?
❍ A. Security cables
❍ B. Server cages
❍ C. Locked cabinet
❍ D. Hardware locks
2. Which of the following is included in hardening a host operating system?
❍ A. A policy for antivirus updates
❍ B. An effective system for file-level security
❍ C. An efficient method to connect to remote sites
❍ D. A policy for remote wipe
3. An organization is looking to add a layer of security and improve enterprise desktop management. Which of the ...