Datasheet

Fundamentals of Security
Answers
1
D. Social engineering is a type of hack that involves contacting victims through
phone or e-mail and tricking them into doing something that compromises com-
pany security. See “Social engineering attacks.”
2
B. An eavesdropping attack occurs when a hacker monitors network traffic to try
to capture information that could be useful in another attack. Review
“Eavesdropping attack.”
3
A. A denial of service (DoS) attack is when a hacker consumes all the system’s
processing power or bandwidth so that it cannot to perform its normal job.
Check out “Denial of service.”
4
B. A mirrored volume is used to create a full duplicate of the data on two differ-
ent disks. Peruse “Implementing RAID solutions.”
5
D. A lockdown cable is used to secure the laptop to a desk to help prevent the
laptop from being stolen. Refer to “Understanding Physical Security.”
6
A, D. Biometric devices involve authenticating a user through the user’s unique
physical characteristics. Fingerprint scans and retinal scans are popular biomet-
ric authentication methods. See “Authentication.”
7
C. A differential backup backs up only those files that have changed since the
last full backup and then does not clear the archive bit. Check out “Backup
review.”
8
D. Secure Socket Layer (SSL) is used to encrypt Web traffic. You can identify
whether you are on a secure Web site by looking for the lock icon at the bottom
of the screen. Peruse “Methods of Securing Transmissions.”
9
C. You want to make sure that you physically destroy the drives if securing data
is critical to the business. Take a look at “Destroying data.”
10
A. A spoof attack occurs when the hacker modifies the source address, trying to
hide the origin of the packet. Refer to “Spoofing.”
49_487389-bk09ch01.indd 106549_487389-bk09ch01.indd 1065 9/10/09 11:03 PM9/10/09 11:03 PM