Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Study Set 2
Quiz 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.
Question 62
Short Answer
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.