Describe three types of credentials may be used for authentication.

What will be an ideal response?


There are several types of credentials. User name and password are common for identification, but it might also be a security token such as a smart card, retinal scan, or digital certificate. It might even be a combination of some of these.
 

Computer Science & Information Technology

You might also like to view...

Give two reasons why RAID cannot replace backups.

What will be an ideal response?

Computer Science & Information Technology

To create a custom interface for the end user, the database designer can customize the ________

A) Form view B) Report view C) Quick Access Toolbar D) Navigation Pane

Computer Science & Information Technology

A data ________ is the characteristic that defines the kind of data that can be entered into a field

Fill in the blank(s) with correct word

Computer Science & Information Technology

When creating a PivotTable, it is possible to use an external data source.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology