159) A ________
is a device about the size of a credit card that contains a chip formatted with access permission and other data.
160) ________
uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access.
161) A ________ is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
162) ________ examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation.
163) ________
feature full-time monitoring tools placed at the most vulnerable points or "hot spots" of corporate networks to detect and deter intruders continually.
164) ________
is designed to check computer systems and drives for the presence of computer viruses.
165) ________
is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
166) ________ encryption uses two keys: one shared (or public) and one private.
167) A ________ system uses a trusted third party, known as a certificate authority (CA), to validate a user's identity.
168) ________ computer systems contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service.