Which of the following is not a method for deterring intrusion?

a. training end users not to divulge passwords
b. using a smart card in conjunction with a password to gain access to a computer system
c. using biometric devices to gain access to a computer system
d. using a security software package that logs out users if that user is 'idle' for a certain amount of time
e. performing social engineering


Ans: e. performing social engineering

Computer Science & Information Technology

You might also like to view...

If a method contains a local variable with the same name as one of its class’s fields, the local variable _______ the field in that method’s scope.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The first step of the Mail Merge wizard is to ________

A) Select starting document B) Select recipients C) Select document type D) Write your letter

Computer Science & Information Technology

With a solid understanding of the requirements document, an understanding of the necessary decisions, and a sketch of the worksheet, the next step is to ____.

A. use Excel to create the worksheet B. design the 3-D Pie chart C. perform calculations D. create the 3-D Pie chart

Computer Science & Information Technology

Which of the following operations cannot be applied as effects?

A. distortions B. transformations C. path offsets D. corner points

Computer Science & Information Technology