Question: 1 Select the single best answer Identifying users by analyzing

1. Select the single best answer.
Identifying users by analyzing their personal attributes, such as face recognition is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

2. Select the single best answer.
Software generally located on routing devices (bridges, routers, and gateways) to monitor network traffic and prevent unauthorized access is
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

3. Select the single best answer.
An area between the enterprise’s first firewall to the outside world and the next firewall is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

4. Select the single best answer. A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.




Sale on SolutionInn
Sales0
Views89
Comments
  • CreatedFebruary 20, 2015
  • Files Included
Post your question
5000