CHAPTER 10
Local Host Security: Review Questions and Hands-On Exercises
Review the following summary points before proceeding to the “Review Questions” and “Exam Questions” sections at the end of this chapter to make sure you are comfortable with each concept. After completing the review, answer the review questions to verify your knowledge of the material covered in Part II.
Summary Points
- The first level of securing intelligent computing and control devices is to control access to them.
- The most obvious point of access through the outer perimeter of a PC would be its basic input devices: its keyboard, mouse, and touch-sensitive display. If someone can simply sit down in front of the system and freely use its input devices (keyboard, mouse, touchpad, or touchscreen), they have an avenue for accessing the information inside.
- The User Password option enables administrators to establish passwords that users must enter during the startup process to complete...