CEH
Introducing Physical Security 399 When talking about hard drives, we need to cover flash drives as well. Flash drives have prove ...
400 Chapter 17 ■ Physical Security destruction of these materials. In most cases, shredding or similar destructive methods can b ...
Introducing Physical Security 401 Securing the Physical Area When looking at the overall security stance of an organization, you ...
402 Chapter 17 ■ Physical Security Depending on the company or organization involved, the goal of erecting a fence may vary from ...
Introducing Physical Security 403 enough space to hold one occupant. When an individual enters the device and the door closes, t ...
404 Chapter 17 ■ Physical Security Lock types include ■ Mechanical (warded and pin-and-tumbler) ■ Cipher locks (smart and progra ...
Introducing Physical Security 405 a stealthy way to bypass a lock and can make it harder for the victim to determine what has ha ...
406 Chapter 17 ■ Physical Security Lock-picking tools are readily available all over the Internet, including sites such as eBay ...
Introducing Physical Security 407 Voice Recognition This system determines who you are by using voice analysis. Keyboard Dynamic ...
408 Chapter 17 ■ Physical Security Windows Depending on the placement and use of windows, anything from tinted to shatterproof w ...
Exam Essentials 409 opening 18 feet or less above the ground should be considered a potential point of easy access and should be ...
410 Chapter 17 ■ Physical Security Review Questions Physical security can prevent which of the following? A. DDoS B. FTP C. Tai ...
Review Questions 411 Which of the following is a wall that is less than full height? A. Drop wall B. False wall C. Short wall ...
412 Chapter 17 ■ Physical Security Lock-pick sets typically contain which of the following at a minimum? A. Tension wrenches an ...
Review Questions 413 What mechanism is intended to deter theft of hard drives? A. Locks B. Backups C. Encryption D. Size Whic ...
...
Answers to Review Questions Appendix A bapp01.indd 415 22-07-2014 10:56:35 ...
416 Appendix A ■ Answers to Review Questions Chapter 1: Getting Started with Ethical Hacking A. A white hat hacker always has p ...
Chapter 2: System Fundamentals 417 A. TOE stands for target of evaluation and represents the target being tested. C. A vulnerab ...
418 Appendix A ■ Answers to Review Questions D. A true mesh topology creates a natural amount of redundancy due to the number o ...
«
17
18
19
20
21
22
23
24
25
26
»
Free download pdf