Deck 5: Protecting Information Resources

Full screen (f)
exit full mode
Question
Black hats are also known as ethical hackers.
Use Space or
up arrow
down arrow
to flip the card.
Question
A worm travels from computer to computer in a network,but it does not usually erase data.
Question
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
Question
An intrusion detection system can protect against both external and internal access.
Question
Part of ensuring integrity is identifying authorized users and granting them access privileges.
Question
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
Question
A proxy server acts as an intermediary between network users and the Internet.
Question
If a drive in the RAID system fails,data stored on it can be reconstructed from data stored on the remaining drives.
Question
Social engineering techniques are easily detectable because they involve threatening employees with physical violence.
Question
Application-filtering firewalls are less expensive than packet-filtering firewalls.
Question
Social engineering takes advantage of the human element of security systems.
Question
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
Question
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
Question
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
Question
Trojans do not replicate themselves,as viruses and worms do.
Question
Viruses can only be transmitted through direct computer-to-computer contact.
Question
A firewall cannot reject an incoming packet,but instead sends a warning to the network administrator.
Question
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Question
Social engineering is an example of an unintentional security threat.
Question
Hand geometry is an example of a biometric security measure.
Question
A ____ is an inexperienced,usually young hacker who uses programs that others have developed to attack computer and network systems.

A)script kiddie
B)black hat
C)white hat
D)hex editor
Question
Backup facilities should never be shared in an attempt to reduce costs.
Question
Level 2 security involves ____.

A)back-end systems
B)corporate networks
C)physical security
D)front-end servers
Question
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
Question
____ refers to the accuracy of information resources within an organization.

A)Validity
B)Confidentiality
C)Integrity
D)Availability
Question
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Question
____ is the process of capturing and recording network traffic.

A)Sniffing
B)Phishing
C)Spoofing
D)Pharming
Question
____ are hackers who specialize in unauthorized penetration of information systems.

A)Script kiddies
B)Black hats
C)White hats
D)Hex editors
Question
Level 3 security involves ____.

A)back-end systems
B)corporate networks
C)physical security
D)front-end servers
Question
Level 1 security involves ____.

A)back-end systems
B)corporate networks
C)physical security
D)front-end servers
Question
The cost of setting up a virtual private network is usually high.
Question
____ means that computers and networks are operating and authorized users can access the information they need.

A)Validity
B)Confidentiality
C)Integrity
D)Availability
Question
An ideal password should be eight characters or longer.
Question
In symmetric encryption,the same key is used to encrypt and decrypt the message.
Question
____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.

A)Script kiddies
B)Black hats
C)White hats
D)Hex editors
Question
An intrusion detection system cannot prevent DoS attacks.
Question
____ means that a system must prevent disclosing information to anyone who is not authorized to access it.

A)Validity
B)Confidentiality
C)Integrity
D)Availability
Question
Symmetric encryption is also called public key encryption.
Question
Data encryption transforms data into a scrambled form called ciphertext.
Question
Corner bolts are secured to a computer at the power outlet.
Question
Which of the following is considered an intentional threat?

A)Floods
B)User's accidental deletion of data
C)Social engineering
D)Power outages
Question
A(n)____ is often used so remote users have a secure connection to the organization's network.

A)biometric security system
B)intrusion detection system
C)virtual private network
D)terminal resource network
Question
A(n)____ is software that acts as an intermediary between two systems.

A)packet-filtering firewall
B)application-filtering firewall
C)proxy server
D)intrusion detection system
Question
Which of the following is a type of access control?

A)Steel encasements
B)Passwords
C)Firewalls
D)Identification badges
Question
____ security measures use a physiological element to enhance security measures.

A)Physical
B)Social
C)Biofeedback
D)Biometric
Question
Typically,an organization leases the media used for a VPN on a(n)____ basis.

A)yearly
B)10-year
C)as-needed
D)monthly
Question
Which of the following is a biometric security measure?

A)electronic trackers
B)passwords
C)firewalls
D)signature analysis
Question
A ____ is a programming routine built into a system by its designer or programmer.

A)logic bomb
B)worm
C)virus
D)backdoor
Question
____ encryption uses a public key known to everyone and a private key known only to the recipient.

A)Symmetric
B)Asymmetric
C)SSL
D)TLS
Question
____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

A)Intrusion detection systems
B)Proxy servers
C)Physical security measures
D)Biometric security measures
Question
____ is a commonly used encryption protocol that manages transmission security on the Internet.

A)Transport Layer Security
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
Question
A logic bomb is a type of ____.

A)Trojan program
B)worm
C)virus
D)backdoor
Question
A ____ travels from computer to computer in a network,but it does not usually erase data.

A)Trojan program
B)worm
C)virus
D)backdoor
Question
Which of the following is a physical security measure?

A)Electronic trackers
B)Passwords
C)Firewalls
D)Signature analysis
Question
A ____ attack typically targets Internet servers.

A)logic bomb
B)denial-of-service
C)backdoor
D)worm
Question
____ take advantage of the human element of security systems.

A)Denial-of-service attacks
B)Trojan programs
C)Blended threats
D)Social engineering attacks
Question
____ ensures data security and integrity over public networks,such as the Internet.

A)Transport Layer Security
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
Question
Which of the following is a nonbiometric security measure?

A)electronic trackers
B)passwords
C)firewalls
D)signature analysis
Question
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.

A)logic bomb
B)denial-of-service
C)backdoor
D)worm
Question
Data encryption transforms data into a scrambled form called ____.

A)plaintext
B)cleartext
C)codetext
D)ciphertext
Question
A(n)____________________ contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.
Question
____________________ is an attack that takes advantage of the human element of security systems.
Question
Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.

A)CERT
B)Sarbanes-Oxley
C)CIRC
D)McCumber cube
Question
____________________ means that a system must prevent disclosing information to anyone who is not authorized to access it.
Question
A(n)____________________ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
Question
____________________ are independent programs that can spread themselves without having to be attached to a host program.
Question
A ____ plan lists the tasks that must be performed to restore damaged data and equipment.

A)risk assessment
B)systems engineering
C)disaster recovery
D)security compliance
Question
____________________ ensure availability in the event of a system failure by using a combination of hardware and software.
Question
In ____ encryption,the same key is used to encrypt and decrypt the message.

A)symmetric
B)asymmetric
C)SSL
D)TLS
Question
The main function of the ____ model is to provide information on security incidents,including information systems' vulnerabilities,viruses,and malicious programs.

A)CERT
B)Sarbanes-Oxley
C)CIRC
D)McCumber cube
Question
A(n)____________________ consists of self-propagating program code that is triggered by a specified time or event.
Question
A(n)____________________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
Question
____________________ are inexperienced,usually young hackers who use programs that others have developed to attack computer and network systems.
Question
____________________ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
Question
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

A)Systems engineering
B)Business continuity planning
C)Risk management
D)Security analysis
Question
____________________ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Question
____________________ means that computers and networks are operating and authorized users can access the information they need.
Question
In ____________________ encryption,the same key is used to encrypt and decrypt the message.
Question
A(n)____________________ is software that acts as an intermediary between two systems.
Question
The ____________________ biometric security method translates words into digital patterns,which are recorded and examined for tone and pitch.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Protecting Information Resources
1
Black hats are also known as ethical hackers.
False
2
A worm travels from computer to computer in a network,but it does not usually erase data.
True
3
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
True
4
An intrusion detection system can protect against both external and internal access.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Part of ensuring integrity is identifying authorized users and granting them access privileges.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
A proxy server acts as an intermediary between network users and the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
If a drive in the RAID system fails,data stored on it can be reconstructed from data stored on the remaining drives.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Social engineering techniques are easily detectable because they involve threatening employees with physical violence.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Application-filtering firewalls are less expensive than packet-filtering firewalls.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Social engineering takes advantage of the human element of security systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Trojans do not replicate themselves,as viruses and worms do.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Viruses can only be transmitted through direct computer-to-computer contact.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
A firewall cannot reject an incoming packet,but instead sends a warning to the network administrator.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Social engineering is an example of an unintentional security threat.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Hand geometry is an example of a biometric security measure.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
A ____ is an inexperienced,usually young hacker who uses programs that others have developed to attack computer and network systems.

A)script kiddie
B)black hat
C)white hat
D)hex editor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Backup facilities should never be shared in an attempt to reduce costs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
Level 2 security involves ____.

A)back-end systems
B)corporate networks
C)physical security
D)front-end servers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
____ refers to the accuracy of information resources within an organization.

A)Validity
B)Confidentiality
C)Integrity
D)Availability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
____ is the process of capturing and recording network traffic.

A)Sniffing
B)Phishing
C)Spoofing
D)Pharming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
____ are hackers who specialize in unauthorized penetration of information systems.

A)Script kiddies
B)Black hats
C)White hats
D)Hex editors
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Level 3 security involves ____.

A)back-end systems
B)corporate networks
C)physical security
D)front-end servers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Level 1 security involves ____.

A)back-end systems
B)corporate networks
C)physical security
D)front-end servers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
The cost of setting up a virtual private network is usually high.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
____ means that computers and networks are operating and authorized users can access the information they need.

A)Validity
B)Confidentiality
C)Integrity
D)Availability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
An ideal password should be eight characters or longer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
In symmetric encryption,the same key is used to encrypt and decrypt the message.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.

A)Script kiddies
B)Black hats
C)White hats
D)Hex editors
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
An intrusion detection system cannot prevent DoS attacks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
____ means that a system must prevent disclosing information to anyone who is not authorized to access it.

A)Validity
B)Confidentiality
C)Integrity
D)Availability
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Symmetric encryption is also called public key encryption.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Data encryption transforms data into a scrambled form called ciphertext.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Corner bolts are secured to a computer at the power outlet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is considered an intentional threat?

A)Floods
B)User's accidental deletion of data
C)Social engineering
D)Power outages
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)____ is often used so remote users have a secure connection to the organization's network.

A)biometric security system
B)intrusion detection system
C)virtual private network
D)terminal resource network
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
A(n)____ is software that acts as an intermediary between two systems.

A)packet-filtering firewall
B)application-filtering firewall
C)proxy server
D)intrusion detection system
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is a type of access control?

A)Steel encasements
B)Passwords
C)Firewalls
D)Identification badges
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
____ security measures use a physiological element to enhance security measures.

A)Physical
B)Social
C)Biofeedback
D)Biometric
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Typically,an organization leases the media used for a VPN on a(n)____ basis.

A)yearly
B)10-year
C)as-needed
D)monthly
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a biometric security measure?

A)electronic trackers
B)passwords
C)firewalls
D)signature analysis
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
A ____ is a programming routine built into a system by its designer or programmer.

A)logic bomb
B)worm
C)virus
D)backdoor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
____ encryption uses a public key known to everyone and a private key known only to the recipient.

A)Symmetric
B)Asymmetric
C)SSL
D)TLS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

A)Intrusion detection systems
B)Proxy servers
C)Physical security measures
D)Biometric security measures
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
____ is a commonly used encryption protocol that manages transmission security on the Internet.

A)Transport Layer Security
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
A logic bomb is a type of ____.

A)Trojan program
B)worm
C)virus
D)backdoor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
A ____ travels from computer to computer in a network,but it does not usually erase data.

A)Trojan program
B)worm
C)virus
D)backdoor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a physical security measure?

A)Electronic trackers
B)Passwords
C)Firewalls
D)Signature analysis
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
A ____ attack typically targets Internet servers.

A)logic bomb
B)denial-of-service
C)backdoor
D)worm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
____ take advantage of the human element of security systems.

A)Denial-of-service attacks
B)Trojan programs
C)Blended threats
D)Social engineering attacks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
____ ensures data security and integrity over public networks,such as the Internet.

A)Transport Layer Security
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is a nonbiometric security measure?

A)electronic trackers
B)passwords
C)firewalls
D)signature analysis
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system.

A)logic bomb
B)denial-of-service
C)backdoor
D)worm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Data encryption transforms data into a scrambled form called ____.

A)plaintext
B)cleartext
C)codetext
D)ciphertext
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A(n)____________________ contains code intended to disrupt a computer,network,or Web site,and it is usually hidden inside a popular program.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
____________________ is an attack that takes advantage of the human element of security systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.

A)CERT
B)Sarbanes-Oxley
C)CIRC
D)McCumber cube
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ means that a system must prevent disclosing information to anyone who is not authorized to access it.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
A(n)____________________ is a security threat that combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ are independent programs that can spread themselves without having to be attached to a host program.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
A ____ plan lists the tasks that must be performed to restore damaged data and equipment.

A)risk assessment
B)systems engineering
C)disaster recovery
D)security compliance
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ ensure availability in the event of a system failure by using a combination of hardware and software.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
In ____ encryption,the same key is used to encrypt and decrypt the message.

A)symmetric
B)asymmetric
C)SSL
D)TLS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
The main function of the ____ model is to provide information on security incidents,including information systems' vulnerabilities,viruses,and malicious programs.

A)CERT
B)Sarbanes-Oxley
C)CIRC
D)McCumber cube
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
A(n)____________________ consists of self-propagating program code that is triggered by a specified time or event.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
A(n)____________________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
____________________ are inexperienced,usually young hackers who use programs that others have developed to attack computer and network systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
____ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

A)Systems engineering
B)Business continuity planning
C)Risk management
D)Security analysis
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
____________________ is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
____________________ means that computers and networks are operating and authorized users can access the information they need.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
In ____________________ encryption,the same key is used to encrypt and decrypt the message.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
A(n)____________________ is software that acts as an intermediary between two systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
The ____________________ biometric security method translates words into digital patterns,which are recorded and examined for tone and pitch.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.