Question: 1. Select the single best answer. Identifying users by analyzing their personal attributes, such as face recognition is called a. honeypot. b. firewall. c. DMZ.

1. Select the single best answer.
Identifying users by analyzing their personal attributes, such as face recognition is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

2. Select the single best answer.
Software generally located on routing devices (bridges, routers, and gateways) to monitor network traffic and prevent unauthorized access is
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

3. Select the single best answer.
An area between the enterprise’s first firewall to the outside world and the next firewall is called
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

4. Select the single best answer. A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be
a. honeypot.
b. firewall.
c. DMZ.
d. biometrics.

Step by Step Solution

3.47 Rating (167 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

1 d biometrics Correc... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

405-B-A-I-S (6537).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!