Unformatted text preview: T F 6. Biometric scanning systems are limited to scanning a person’s fingerprint or handprint. T F 7. A virtual private network uses a private dedicated connection, similar to a phone line. T F 8. The hardening process makes a system more secure by removing unnecessary accounts, services, and features. T F 9. When an intruder raids desks or trash bins for valuable information it is called dumpster diving. T F 10. A system becomes obsolete when it is five years old or older....
View Full Document
- Spring '12
- Virtual private network, Five years, The Real World, Biometrics in schools, Biometric scanning systems