Security advice wrap-up answer key


Security advice wrap-up answer key

Here are the answers to's security advice wrap-up quiz:

Part I: Just the facts -- or are they?

1. In "Two-factor authentication best practices for SMBs," Joel Dubin lists forms of authentication, including biometrics. What isn't an example of biometrics?
Answer: c. smart cards

2. In "Email encryption: Five steps to success," what isn't one of Mike Rothman's examples of content that's usually encrypted?
Answer: a. photos

3. Managed service security providers can take care of a number of tasks, Dubin writes in "Managed security services: What's right for you?" What task isn't listed in the tip?
Answer: c. They can design Web sites.

4. "NAC helps SMBs control network, costs" lists three approaches to creating interoperability among access control solutions from various vendors. Which isn't an approach listed:
Answer: c. Network Patrol Program

5. In "Endpoint security: The weakest link," Rothman lists reasons why the endpoint is a target. What isn't on his list?
Answer: a. lack of email encryption

Part II: By the numbers

1. According to Dubin in "Two-factor authentication best practices for SMBs," how many factors are there in authentication?
Answer: b. Three

2. "IE flaws stats stark, but omit big picture," focuses on a blogger's count of how many days in 2006 Microsoft Explorer was "unsafe." What number did the blogger come to?
Answer: a. 284

3. According to a report from McAfee Inc.'s Avert Labs, what percent of known Trojan password stealers target multiplayer online role-playing games?
Answer: a. 18%

4. In "NAC helps SMBs control network, costs," Michael Gregg lists how many methods of NAC deployment?
Answer: c. Three

5. Security will be the priority for SMBs in 2007, according to a survey. What percentage of respondents listed it first?
Answer: b. 46%

Return to our security advice wrap-up quiz

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy