Datasheet

Fundamentals of Security
6
Which of the following are forms of biometrics? (Select all that apply.)
A Fingerprint scan
B Smart card
C Username and password
D Retinal scan
7
What type of backup copies the files that have changed but does not clear the
archive bit?
A Full backup
B Incremental backup
C Differential backup
D Copy
8
What technology is typically used to encrypt traffic between a Web server and
Web browser?
A DoS
B IPSec
C Smart card
D SSL
9
In high-security environments, what should you do with old hard drives?
A Donate them to charity.
B Recycle them.
C Physically destroy them.
D Drive a spike through them.
10
What type of attack involves the hacker modifying the source address of the
packet?
A Spoof attack
B Eavesdrop attack
C Man-in-the-middle attack
D Social engineering attack
49_487389-bk09ch01.indd 106449_487389-bk09ch01.indd 1064 9/10/09 11:03 PM9/10/09 11:03 PM