11.6. Review Questions
Which component of physical security addresses outer-level access control?
Which technology uses a physical characteristic to establish identity?
As part of your training program, you're trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced technological methods. Some attacks, you explain, take advantage of human shortcoming to gain access that should otherwise be denied. What term do you use to describe attacks of this type?
You've recently been hired by ACME to do a security audit. The ...