All of the following are considered bases for authentication credentials except:
A. What you do for work (your profession)
B. What you have (a physical key or a smart card)
C. What you know (a password or a private key)
D. Who you are (your fingerprint)
A. What you do for work (your profession)
Computer Science & Information Technology
You might also like to view...
Does LINUX/UNIX support any file types? If so, name them. Does LINUX/UNIX support file extensions?
What will be an ideal response?
Computer Science & Information Technology
Explain the is-a and has-a relationship between classes used in inheritance and in composition.
What will be an ideal response?
Computer Science & Information Technology
The various views can be selected from the Presentation group on the ________ tab
Fill in the blank(s) with correct word
Computer Science & Information Technology
A Web site that provides search capabilities on the Web is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology