6.7. Review Questions
Which is the best countermeasure to social-engineering attacks?
Preventing the download of mobile code from the Internet
Employee training
Strong password policies
Auditing user activities
You run a full backup every Monday. You also run a differential backup every other day of the week. You experience a drive failure on Friday. Which of the following restoration procedures should you use to restore data to the replacement drive?
Restore the full backup and then each differential backup
Restore the full backup and then the last differential backup
Restore the differential backup
Restore the full backup
When is business continuity needed?
When new software is distributed
When business processes are interrupted
When a user steals company ...
Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.