All of the following are considered bases for authentication credentials except:

A. What you do for work (your profession)
B. What you have (a physical key or a smart card)
C. What you know (a password or a private key)
D. Who you are (your fingerprint)


A. What you do for work (your profession)

Computer Science & Information Technology

You might also like to view...

Does LINUX/UNIX support any file types? If so, name them. Does LINUX/UNIX support file extensions?

What will be an ideal response?

Computer Science & Information Technology

Explain the is-a and has-a relationship between classes used in inheritance and in composition.

What will be an ideal response?

Computer Science & Information Technology

The various views can be selected from the Presentation group on the ________ tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

A Web site that provides search capabilities on the Web is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology