Which of the following is NOT among the three types of authentication mechanisms?
A. something a person knows
B. something a person has
C. something a person says
D. something a person can produce
Answer: C
You might also like to view...
Public key cryptography is so-named because:
a. It is highly popular b. Its use is not restricted by patents c. It utilizes an open source encryption algorithm d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public
Which statement is false?
a. Unless directed otherwise, the computer executes Java statements one after the other in the order in which they're written. b. Activity diagrams normally show the Java code that implements the activity. c. Like pseudocode, activity diagrams help programmers develop and represent algorithms. d. The arrows in
________ can be added only in Design view
A) Fields B) Tables C) Data D) Sections
The ________ button allows you to move a paragraph to a lower level
Fill in the blank(s) with correct word