Respuesta :
Answer:
1. Entry control roster - List of people that are allowed to enter a guarded area. Used by security guard to allow, or not allow, people enter the secured area.
2. Biometric locks - Biometric authentication like fingerprint or face scanning can be integrated on the computer systems to provide better security.
3. Virus - A program written to damage, replicate or alter files or data.
4. Rootkit - A virus designed to remain hidden or low key while doing various types of hacking activities.
5. Zero-day - zero day are cyber attacks on vulnerabilities that have not been fixed or made public (zero day), before being patched.
6. Enable the spam filter - Spam filter recognizes bad emails or emails with malicious content including fake ads, and places them on a spam folder of your email account.
7. Phishing - A way to steal private or sensitive information like passwords, account number etc., through disguising or deceptive tactics.
8. Report the person through proper channels.
9. Format the drive - Formatting will wipe out the data on the USB drive and reset it.
Explanation: