Answers to Review Questions

1. A. A certificate policy dictates how an organization uses, manages, and validates certificates.

2. C. The third party is responsible for assuring the relying party that the subscriber is genuine.

3. A. A security group is used to manage user access to a network or system.

4. A. An audit is used to inspect and test procedures within an organization to verify that those procedures are working and up-to-date. The result of an audit is a report to management.

5. A. The ISO standard 27002 (which updates 17799) states: “Privileges should be allocated to individuals on a need-to-use basis and on an event-by-event basis, i.e. the minimum requirement for their functional role when needed.”

6. B. The supervisor user in NetWare ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.