Chapter Review Questions
The following questions are designed to check that you have understood the information in the chapter. For a realistic practice exam, please check the practice resources in our exclusive online study tools (refer to Chapter 29, Accessing the online practice resources for instructions to unlock them). The answers and explanations to these questions can be found via this link.
- An IT administrator has been tasked by the CEO to investigate the latest attack methods being used by a bad actor. Which of the following would be the BEST resource to use?
- MITRE ATT&CK
- A honeyfile
- A honeypot
- A CVE list
- What type of system is able to track users’ access if the authentication method uses 802.1x?
- Federation Services
- Kerberos
- OAuth
- RADIUS
- Which of the following can be used to provide non-repudiation?
- Asymmetric encryption
- Symmetric encryption
- A public key
- A SAML token
- An international bank encountered an insider attack where they suffered the theft of $100...