Which one of the following tools is most often used for identification purposes and is not suitable for use as an authenticator?

A. Password
B. Retinal scan
C. Username
D. Token


Ans: C. Username

Computer Science & Information Technology

You might also like to view...

The number of calls to recursively calculate the Fibonacci value of 7 is:

a. 7 b. 13 c. 41 d. 39

Computer Science & Information Technology

Which of the following is NOT an advantage of using digital signals to communicate?

A) The accuracy depends on the sampling rate. B) Errors can be detected and corrected. C) Digital signals can be compressed and decompressed. D) It is easier to correct for attenuation.

Computer Science & Information Technology

What is the default authentication method according to the 802.11 standard?

A. basic B. open system C. shared key D. private key

Computer Science & Information Technology

Medium-sized organizations tend to spend approximately __________ percent of the total IT budget on security.

A. 2 B. 5 C. 11 D. 20

Computer Science & Information Technology