159) A ________ is a device about the size of a credit card that contains a chip formatted with access permission and other data. 160) ________ uses systems that read and interpret individual human...





159) A ________
is a device about the size of a credit card that contains a chip formatted with access permission and other data.



160) ________
uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access.



161) A ________ is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.



162) ________ examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation.



163) ________
feature full-time monitoring tools placed at the most vulnerable points or "hot spots" of corporate networks to detect and deter intruders continually.



164) ________
is designed to check computer systems and drives for the presence of computer viruses.



165) ________
is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.



166) ________ encryption uses two keys: one shared (or public) and one private.



167) A ________ system uses a trusted third party, known as a certificate authority (CA), to validate a user's identity.



168) ________ computer systems contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service.





May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here