156) An ________ defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet.
157) ________devises plans for the restoration of computing and communications services after they have been disrupted.
158) A ________is a physical device, similar to an identification card, that is designed to prove the identity of a single user.
159) A ________is a device about the size of a credit card that contains a chip formatted with access permission and other data.
160) ________uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access.
161) A ________ is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
162) ________ examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation.
163) ________feature full-time monitoring tools placed at the most vulnerable points or “hot spots” of corporate networks to detect and deter intruders continually.
164) ________is designed to check computer systems and drives for the presence of computer viruses.
165) ________is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
166) ________ encryption uses two keys: one shared (or public) and one private.