Which of the following is not a method for deterring intrusion?
a. training end users not to divulge passwords
b. using a smart card in conjunction with a password to gain access to a computer system
c. using biometric devices to gain access to a computer system
d. using a security software package that logs out users if that user is 'idle' for a certain amount of time
e. performing social engineering
Ans: e. performing social engineering
You might also like to view...
If a method contains a local variable with the same name as one of its class’s fields, the local variable _______ the field in that method’s scope.
Fill in the blank(s) with the appropriate word(s).
The first step of the Mail Merge wizard is to ________
A) Select starting document B) Select recipients C) Select document type D) Write your letter
With a solid understanding of the requirements document, an understanding of the necessary decisions, and a sketch of the worksheet, the next step is to ____.
A. use Excel to create the worksheet B. design the 3-D Pie chart C. perform calculations D. create the 3-D Pie chart
Which of the following operations cannot be applied as effects?
A. distortions B. transformations C. path offsets D. corner points