Part I: Just the facts -- or are they?
1. In "Two-factor authentication best practices for SMBs," Joel Dubin lists forms of authentication, including biometrics. What isn't an example of biometrics?
Answer: c. smart cards
2. In "Email encryption: Five steps to success," what isn't one of Mike Rothman's examples of content that's usually encrypted?
Answer: a. photos
3. Managed service security providers can take care of a number of tasks, Dubin writes in "Managed security services: What's right for you?" What task isn't listed in the tip?
Answer: c. They can design Web sites.
4. "NAC helps SMBs control network, costs" lists three approaches to creating interoperability among access control solutions from various vendors. Which isn't an approach listed:
Answer: c. Network Patrol Program
5. In "Endpoint security: The weakest link," Rothman lists reasons why the endpoint is a target. What isn't on his list?
Answer: a. lack of email encryption
Part II: By the numbers
1. According to Dubin in "Two-factor authentication best practices for SMBs," how many factors are there in authentication?
Answer: b. Three
2. "IE flaws stats stark, but omit big picture," focuses on a blogger's count of how many days in 2006 Microsoft Explorer was "unsafe." What number did the blogger come to?
Answer: a. 284
3. According to a report from McAfee Inc.'s Avert Labs, what percent of known Trojan password stealers target multiplayer online role-playing games?
Answer: a. 18%
4. In "NAC helps SMBs control network, costs," Michael Gregg lists how many methods of NAC deployment?
Answer: c. Three
5. Security will be the priority for SMBs in 2007, according to a SearchSMB.com survey. What percentage of respondents listed it first?
Answer: b. 46%