Which of the following is easy to counterfeit?
A. smart cards
B. token cards
C. memory cards
D. proximity cards
C
Explanation: A memory card is a swipe card that is issued to valid users. The card contains user authentication information. However, the data on the memory cards is not protected, a weakness that organizations should consider before implementing this type of system. Memory-only cards are very easy to counterfeit.
You might also like to view...
Identify a true statement about theevt.eventPhaseproperty.
A. It returns the object currently experiencing the event. B. It returns a Boolean value indicating whether the event is trusted by the browser. C. It returns the type of event. D. It returns the stage of the event propagation the event object is currently at.
The actual planning for the response to a threat takes place once the threat situation is ____.
A. well structured B. past C. thoroughly documented D. thoroughly understood
Programmers use the term ____________ to describe the part of a program in which a variable may be accessed.
a. scope b. lifetime c. method d. accessibility
NIST recommends the documentation of performance measurements in a standardized format to ensure ____________.
A. the suitability of performance measure selection B. the effectiveness of performance measure corporate reporting C. the repeatability of measurement development, customization, collection, and reporting activities D. the acceptability of the performance measurement program by upper management