58) Technical safeguards involve both software and hardware components of an information system. 59) A user name authenticates a user, and a password identifies that user. 60) Smart cards are...





58) Technical safeguards involve both software and hardware components of an information system.



59) A user name authenticates a user, and a password identifies that user.



60) Smart cards are convenient to use because they do not require a personal identification number for authentication.



61) A criticism of biometric authentication is that it provides weak authentication.



62) With asymmetric encryption, two different keys are used for encoding and decoding a message.



63) In the case of public key encryption, each site has a private key to encode a message and a public key to decode it.



64) Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall.



65) A key is a number used with an encryption algorithm to encrypt data.



66) Packet-filtering firewalls are the most sophisticated type of firewall.



67) Spyware programs are installed on a user's computer without the user's knowledge.



68) Viruses, worms, and Trojan horses are types of firewalls.



69) A virus is a computer program that replicates itself.



70) Malware definitions are patterns that exist in malware code.







May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Submit New Assignment

Copy and Paste Your Assignment Here