Which one of the following tools is most often used for identification purposes and is not suitable for use as an authenticator?
A. Password
B. Retinal scan
C. Username
D. Token
Ans: C. Username
Computer Science & Information Technology
You might also like to view...
The number of calls to recursively calculate the Fibonacci value of 7 is:
a. 7 b. 13 c. 41 d. 39
Computer Science & Information Technology
Which of the following is NOT an advantage of using digital signals to communicate?
A) The accuracy depends on the sampling rate. B) Errors can be detected and corrected. C) Digital signals can be compressed and decompressed. D) It is easier to correct for attenuation.
Computer Science & Information Technology
What is the default authentication method according to the 802.11 standard?
A. basic B. open system C. shared key D. private key
Computer Science & Information Technology
Medium-sized organizations tend to spend approximately __________ percent of the total IT budget on security.
A. 2 B. 5 C. 11 D. 20
Computer Science & Information Technology