COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
swipe cards to allow access to a restricted area
|
|
biometrics to validate physical characteristics
|
|
firewalls to monitor traffic
|
|
intrusion detection system (IDS) to watch for suspicious network activity
|
|
fences to protect the perimeter of a building
|
Detailed explanation-1: -Biometrics to validate physical characteristics. Firewalls to monitor traffic. Swipe cards to allow access to a restricted area. Guards to monitor security screens. Fences to protect the perimeter of a building. More items •23-May-2022
Detailed explanation-2: -Logical access control is done via access control lists (ACLs), group policies, passwords, and account restrictions.
Detailed explanation-3: -Which one of the following is an example of a logical access control? Logical access controls restrict access to a computer system or network and a password is the most common example. Physical keys, access cards, and fences are all examples of physical access controls.
Detailed explanation-4: -Common physical access control examples of access points include security gate systems, turnstiles and door locks.
Detailed explanation-5: -Discretionary access control (DAC) A discretionary access control system, on the other hand, puts a little more control back into leadership’s hands. Rule-based access control. Identity-based access control. 09-Mar-2023