Deck 4: Ethics and Information Security: Mis Business Concerns

Full screen (f)
exit full mode
Question
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
Use Space or
up arrow
down arrow
to flip the card.
Question
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Question
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.
Question
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Question
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Question
Pirated software is software that is manufactured to look like the real thing and sold as such.
Question
Information compliance is the act of conforming,acquiescing,or yielding information.
Question
A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Question
Ethics and security are two fundamental building blocks for all organizations.
Question
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Question
Information governance is a method or system of government for information management or control.
Question
A social media policy outlines the corporate guidelines or principles governing employee online communications.
Question
Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Question
Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Question
Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.
Question
Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.
Question
An ethical computer use policy contains general principles to guide computer user behavior.
Question
An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.
Question
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
Question
Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Question
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Question
Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
Question
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Question
A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.
Question
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Question
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
Question
Cyberbullying is an act or object that poses a danger to assets.
Question
Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
Question
Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Question
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
Question
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Question
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
Question
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
Question
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Question
Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.
Question
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Question
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
Question
Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.
Question
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
Question
Cybervandalism is the electronic defacing of an existing website.
Question
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
Question
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Question
The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.
Question
Organizations address security risks through two lines of defense.The first is people and the second is technology.
Question
Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.
Question
Backdoor programs change their form as they propagate.
Question
Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.
Question
Information security policies detail how an organization will implement the information security plan.
Question
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Question
Backdoor programs open a way into the network for future attacks.
Question
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Question
Tokens are small electronic devices that change user passwords automatically.
Question
A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.
Question
Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
Question
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Question
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
Question
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Question
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Question
Script-kiddies have criminal intent when hacking.
Question
The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.
Question
A certificate authority is a trusted third party,such as VeriSign,that validates user identities by means of digital certificates.
Question
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
Question
Which of the following represents the two fundamental building blocks that protect organizational information?

A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
Question
Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
Question
Phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username,password,and sometimes credit card information.
Question
A zombie farm is a group of computers on which a hacker has planted zombie programs.
Question
Identity theft is the forging of someone's identity for the purpose of fraud.
Question
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Question
Phishing reroutes requests for legitimate websites to false websites.
Question
Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.
Question
Worms are computer viruses that wait for a specific date before executing their instructions.
Question
Trust between companies,customers,partners,and suppliers are the support structure of which of the following?

A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
Question
Decrypt information is to decode it and is the opposite of encrypt.
Question
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Question
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
Question
A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.
Question
What is the legal protection afforded an expression of an idea,such as a song,book,or video game?

A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
Question
Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Question
A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
Question
Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/344
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Ethics and Information Security: Mis Business Concerns
1
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
True
Explanation: Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
2
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
True
Explanation: The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
3
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.
True
Explanation: Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents
4
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
5
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
6
Pirated software is software that is manufactured to look like the real thing and sold as such.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
7
Information compliance is the act of conforming,acquiescing,or yielding information.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
8
A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
9
Ethics and security are two fundamental building blocks for all organizations.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
10
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
11
Information governance is a method or system of government for information management or control.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
12
A social media policy outlines the corporate guidelines or principles governing employee online communications.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
13
Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
14
Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
15
Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
16
Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
17
An ethical computer use policy contains general principles to guide computer user behavior.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
18
An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
19
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
20
Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
21
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
22
Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
23
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
24
A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
25
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
26
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
27
Cyberbullying is an act or object that poses a danger to assets.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
28
Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
29
Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
30
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
31
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
32
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
33
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
34
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
35
Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
36
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
37
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
38
Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
39
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
40
Cybervandalism is the electronic defacing of an existing website.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
41
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
42
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
43
The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
44
Organizations address security risks through two lines of defense.The first is people and the second is technology.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
45
Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
46
Backdoor programs change their form as they propagate.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
47
Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
48
Information security policies detail how an organization will implement the information security plan.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
49
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
50
Backdoor programs open a way into the network for future attacks.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
51
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
52
Tokens are small electronic devices that change user passwords automatically.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
53
A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
54
Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
55
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
56
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
57
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
58
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
59
Script-kiddies have criminal intent when hacking.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
60
The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
61
A certificate authority is a trusted third party,such as VeriSign,that validates user identities by means of digital certificates.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
62
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following represents the two fundamental building blocks that protect organizational information?

A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
64
Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
65
Phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username,password,and sometimes credit card information.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
66
A zombie farm is a group of computers on which a hacker has planted zombie programs.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
67
Identity theft is the forging of someone's identity for the purpose of fraud.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
68
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
69
Phishing reroutes requests for legitimate websites to false websites.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
70
Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
71
Worms are computer viruses that wait for a specific date before executing their instructions.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
72
Trust between companies,customers,partners,and suppliers are the support structure of which of the following?

A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
73
Decrypt information is to decode it and is the opposite of encrypt.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
74
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
75
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
76
A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
77
What is the legal protection afforded an expression of an idea,such as a song,book,or video game?

A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
78
Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
79
A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
80
Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting.
Unlock Deck
Unlock for access to all 344 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 344 flashcards in this deck.