Which of the following is not a method for deterring intrusion?
a. training end users not to divulge passwords
b. using a smart card in conjunction with a password to gain access to a computer system
c. using biometric devices to gain access to a computer system
d. using a security software package that logs out users if that user is 'idle' for a certain amount of time
e. performing social engineering
Ans: e. performing social engineering
You might also like to view...
If a method contains a local variable with the same name as one of its class’s fields, the local variable _______ the field in that method’s scope.
Fill in the blank(s) with the appropriate word(s).
Which of the following operations cannot be applied as effects?
A. distortions B. transformations C. path offsets D. corner points
The first step of the Mail Merge wizard is to ________
A) Select starting document B) Select recipients C) Select document type D) Write your letter
With a solid understanding of the requirements document, an understanding of the necessary decisions, and a sketch of the worksheet, the next step is to ____.
A. use Excel to create the worksheet B. design the 3-D Pie chart C. perform calculations D. create the 3-D Pie chart