This preview shows page 1. Sign up to view the full content.
Unformatted text preview: T F 6. Biometric scanning systems are limited to scanning a persons fingerprint or handprint. T F 7. A virtual private network uses a private dedicated connection, similar to a phone line. T F 8. The hardening process makes a system more secure by removing unnecessary accounts, services, and features. T F 9. When an intruder raids desks or trash bins for valuable information it is called dumpster diving. T F 10. A system becomes obsolete when it is five years old or older....
View Full Document
- Spring '12