Multiple Choice
Hardware, software, or a combination of both that is designed to block unauthorized access to an IT system is called:
A) Computer log
B) Biometric device
C) Firewall
D) Security token
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q66: Authorized employees may need to access the
Q67: A group of LANs connected to each
Q68: A battery to maintain power in the
Q69: This method of monitoring exposure can involve
Q70: This item, that strengthens the use of
Q72: This encryption method requests connection to the
Q73: Many IT systems have redundant data storage
Q74: Internal controls used specifically in accounting applications
Q75: Specific software tools that monitor data flow
Q76: Internal controls that apply overall to the