Answers to Review Questions
1. A. A certificate policy dictates how an organization uses, manages, and validates certificates.
2. C. The third party is responsible for assuring the relying party that the subscriber is genuine.
3. A. A security group is used to manage user access to a network or system.
4. A. An audit is used to inspect and test procedures within an organization to verify that those procedures are working and up-to-date. The result of an audit is a report to management.
5. A. The ISO standard 27002 (which updates 17799) states: “Privileges should be allocated to individuals on a need-to-use basis and on an event-by-event basis, i.e. the minimum requirement for their functional role when needed.”
6. B. The supervisor user in NetWare ...
Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.