Possessed knowledge access systems use physical objects for
identification purposes and are frequently used to access facilities and
computer systems.
False
While two-factor authentication systems are common in the United States, they are not widely used in other countries.
False
True
Many Internet security concerns today can be categorized as computer wars.
True
False
____ are sets of tools that allow hackers to access a system.
Toolkits
Crimekits
Rootkits
Hackkits
____ software, such as that shown in the accompanying figure,
can control which devices can be connected to an employee’s computer.
Device authentication
Professional firewall
Data-leakage prevention
Network quarantine
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
Unauthorized Access
Vandalizing
Phishing
Spoofing
One of the biggest disadvantages of password-based systems is that passwords can be forgotten.
False
True
The best protection against many dot cons is ____.
common sense
antivirus programs
your ISP
updated operating systems
Once installed, ____________________ are designed to record every
keystroke made on the infected computer and transmit account numbers,
passwords, and other related information to criminals.
In businesses, access control systems are often integrated into a
comprehensive ____________________ system designed to manage users’
access to enterprise systems
No comments:
Post a Comment