1. Select the single best answer. Identifying users by analyzing their personal attributes, such as face recognition...

Question:

1. Select the single best answer.
Identifying users by analyzing their personal attributes, such as face recognition is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

2. Select the single best answer.
Software generally located on routing devices (bridges, routers, and gateways) to monitor network traffic and prevent unauthorized access is
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

3. Select the single best answer.
An area between the enterprise’s first firewall to the outside world and the next firewall is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

4. Select the single best answer. A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Question Posted: