58) Technical safeguards involve both software and hardware components of an information system.
59) A user name authenticates a user, and a password identifies that user.
60) Smart cards are convenient to use because they do not require a personal identification number for authentication.
61) A criticism of biometric authentication is that it provides weak authentication.
62) With asymmetric encryption, two different keys are used for encoding and decoding a message.
63) In the case of public key encryption, each site has a private key to encode a message and a public key to decode it.
64) Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.
65) A key is a number used with an encryption algorithm to encrypt data.
66) Packet-filtering firewalls are the most sophisticated type of firewall.
67) Spyware programs are installed on a user's computer without the user's knowledge.
68) Viruses, worms, and Trojan horses are types of firewalls.
69) A virus is a computer program that replicates itself.
70) Malware definitions are patterns that exist in malware code.