Which of the following can achieve authentication in information security?

A) Intrusion detection systems
B) Log files
C) Auditing
D) Tokens


D) Tokens

Computer Science & Information Technology

You might also like to view...

You must instantiate an object based on a class in order for the processing in the object to take place.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ secretly gathers personal information about you.

a. Malware b. Virus hoaxes c. Spyware d. Caches

Computer Science & Information Technology

Compare and contrast data types, abstract data types, and data structures.

What will be an ideal response?

Computer Science & Information Technology

A ____ function is any function that has the same name as its class.

a. constructor b. definer c. destructor d. creator

Computer Science & Information Technology