What is the use of physical characteristics — such as your fingerprint, the blood vessels
in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide
identification?
a. Backup
b. Anti‐virus
c. Firewall
d. Biometrics

1 Answer

Answer :

d. Biometrics

Related questions

Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : c. Firewall

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : All of the following are considered biometrics, except: a. Fingerprint b. Retina c. Password d. Voice

Last Answer : c. Password

Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above

Last Answer : a. firewall

Description : All of the following are considered biometrics, except a) Finger print b) Retina c) Password d) Voice

Last Answer : c) Password

Description : Parts A, B, C and D of the human eye are shown in the diagram. Select the option which gives correct identification along with its functions characteristics. (a) C-Aqueous chamber-Reflects the light which does not ... , i.e., rods and cones. (d) B - Blind spot-Has only a few rods and cones.

Last Answer : (c) A - Retina - Contains photoreceptors, i.e., rods and cones.

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above

Last Answer : a. Encryption

Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above

Last Answer : d. All of the above

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : a. Risk management

Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : b. recovery

Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : a. backup

Description : What is the name of the new anti‐Spam bill? a. No‐Spam b. CAN‐Spam c. Spam‐Away d. Stop Spam

Last Answer : b. CAN‐Spam

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above

Last Answer : d. None of the above

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : In comparison to fingerprint identification machines and smart cards passwords are form of authentication. More robust Inexpensive Primitive All of the above?

Last Answer : In comparison to fingerprint identification machines and smartcards, passwords are ___________ form of authentication. Morerobust Inexpensive Primitive All of the above

Description : Access - control based on a person's fingerprints is an example of _____: a) Biometric Identification b) Characteristic Identification c) Characteristic Security d) Fingerprint Security e) Logitstics

Last Answer : a) Biometric Identification

Description : What is the best anti-virus/anti-spyware/anti-hacking & firewall program (free or not free) out there for APPLE MAC?

Last Answer : OSX. There are still 0 confirmed viruses for Macs running OSX. There are a couple Trojans, apparently, but you’d have to go looking for them to find them – and be pretty stupid to actually get infected by them. So, I wouldn’t consider it a problem worth worrying about on a Mac. Enjoy!

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above

Last Answer : d. All the above

Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : True statements about the retinal blood flow include: a. the retina receives 5% of total ocular blood flow b. the retinal blood flow is mainly under the sympathetic control c. the ... are impermeable to ascorbate d. the pericytes control the contractile activity of the retinal blood vessels

Last Answer : the pericytes control the contractile activity of the retinal blood vessels

Description : There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1) Testing 2) Backup and recovery 3) Firewall development 4) Design

Last Answer : 3) Firewall development

Description : There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1 Testing 2 Backup and recovery 3 Firewall development 4 Design

Last Answer : 3 Firewall development

Description : What type of fingerprint that cannot be seen with the naked eye?

Last Answer : Latent fingerprints are the types of fingerprints that aren't visible to the naked eye.

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : Those blood cells you can see when you look at the sky--are those in the lens of your eye, or the retina, or where?

Last Answer : Do you mean ‘floaters’? https://www.mayoclinic.org/diseases-conditions/eye-floaters/symptoms-causes/syc-20372346

Description : The following are true about ocular circulation: a. only 4% of the total blood supply to the eye goes to the retina b. the choroidal blood flow in normal people is ten times that of the grey mater ... and choroidal circulation d. a PaCO2 rise of 1 mm Hg induces a 3% rise in retinal blood flow

Last Answer : a PaCO2 rise of 1 mm Hg induces a 3% rise in retinal blood flow

Description : The smart card which use antenna for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : d) Both B and C

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above

Last Answer : d. All of the above

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : Answer: D

Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing

Last Answer : d. Virtual marketing