Part I: Just the facts -- or are they?
1. In "Two-factor authentication best practices for SMBs," Joel Dubin lists forms of authentication, including biometrics. What isn't an example of biometrics?
b. facial or voice patterns
c. smart cards
2. In "Email encryption: Five steps to success," what isn't one of Mike Rothman's examples of content that's usually encrypted?
b. customer records
c. intellectual property
3. Managed service security providers can take care of a number of tasks, Dubin writes in "Managed security services: What's right for you?" What task isn't listed in the tip?
a. They can monitor firewalls.
b. They can run intrusion detection systems.
c. They can design Web sites.
4. "NAC helps SMBs control network, costs" lists three approaches to creating interoperability among access control solutions from various vendors. Which isn't an approach listed:
a. Trusted Network Connect
b. Cisco's Network Admission Control
c. Network Patrol Program
5. In "Endpoint security: The weakest link," Rothman lists reasons why the endpoint is a target. What isn't on his list?
a. lack of email encryption
b. human behavior
c. increasing mobility
Part II: By the numbers
1. According to Dubin in "Two-factor authentication best practices for SMBs," how many factors are there in authentication?
2. "IE flaws stats stark, but omit big picture," focuses on a blogger's count of how many days in 2006 Microsoft Explorer was "unsafe." What number did the blogger come to?
3. According to a report from McAfee Inc.'s Avert Labs, what percent of known Trojan password stealers target multiplayer online role-playing games?
4. In "NAC helps SMBs control network, costs," Michael Gregg lists how many methods of NAC deployment?
5. Security will be the priority for SMBs in 2007, according to a SearchSMB.com survey. What percentage of respondents listed it first?