30.11.2015 Views

SECURITY BASICS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Copyright © 2004 by Course Technology. All rights reserved.This publication is protected by federal copyright law. No part of this publication<br />

may be reproduced without prior permission in writing from Course Technology. Some of the product names and company names have been<br />

used for identification purposes only and may be trademarks or registered trademarks of their respective manufactures and sellers.<br />

34 Chapter 3 Security Basics<br />

Review Questions<br />

1. What is the advantage of removing the name of the last user to log on?<br />

a. allows users to share computers<br />

b. requires users to remember their user names<br />

c. requires a hacker to take an extra step when cracking passwords<br />

d. hides the identity of the Windows domain<br />

2. Which default Windows NT/2003 account should be renamed to assist this<br />

method of authentication protection?<br />

a. Domain Admins<br />

b. Domain Guests<br />

c. Administrator<br />

d. Guest<br />

3. Which account should be disabled to assist this method of authentication protection?<br />

a. Guest<br />

b. Administrator<br />

c. User1<br />

d. User2<br />

4. Who can delete the Guest account?<br />

a. no one<br />

b. Administrator<br />

c. Domain Admins<br />

d. Guest<br />

5. Biometrics is an additional method that can be used to secure authentication.<br />

Which of the following is an example of a biometric device? (Choose all that<br />

apply.)<br />

a. complex passwords<br />

b. fingerprints<br />

c. retinal scans<br />

d. smart cards

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!