Question: 1. Select the single best answer. Identifying users by analyzing their personal attributes, such as face recognition is called a. honeypot. b. firewall. c. DMZ.
Identifying users by analyzing their personal attributes, such as face recognition is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.
2. Select the single best answer.
Software generally located on routing devices (bridges, routers, and gateways) to monitor network traffic and prevent unauthorized access is
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.
3. Select the single best answer.
An area between the enterprise’s first firewall to the outside world and the next firewall is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.
4. Select the single best answer. A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.
Step by Step Solution
3.47 Rating (167 Votes )
There are 3 Steps involved in it
1 d biometrics Correc... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
405-B-A-I-S (6537).docx
120 KBs Word File
