Datasheet
Fundamentals of Security
6
Which of the following are forms of biometrics? (Select all that apply.)
A ❑ Fingerprint scan
B ❑ Smart card
C ❑ Username and password
D ❑ Retinal scan
7
What type of backup copies the files that have changed but does not clear the
archive bit?
A ❍ Full backup
B ❍ Incremental backup
C ❍ Differential backup
D ❍ Copy
8
What technology is typically used to encrypt traffic between a Web server and
Web browser?
A ❍ DoS
B ❍ IPSec
C ❍ Smart card
D ❍ SSL
9
In high-security environments, what should you do with old hard drives?
A ❍ Donate them to charity.
B ❍ Recycle them.
C ❍ Physically destroy them.
D ❍ Drive a spike through them.
10
What type of attack involves the hacker modifying the source address of the
packet?
A ❍ Spoof attack
B ❍ Eavesdrop attack
C ❍ Man-in-the-middle attack
D ❍ Social engineering attack
49_487389-bk09ch01.indd 106449_487389-bk09ch01.indd 1064 9/10/09 11:03 PM9/10/09 11:03 PM