Which of the following is an example of a single-factor authentication being used to gain access to a computer system?
A. Using a username and a 16-character password
B. Using a smart card and entering a secret password
C. Using an RSA SecureID token device and entering a private code
D. Using a biometric scan of a fingerprint and entering a PIN
Answer: A. Using a username and a 16-character password
You might also like to view...
Key distribution often involves the use of _________ which are generated and distributed for temporary use between two parties.
A. public key certificates B. session keys C. master keys D. private key certificates
If the path for an image or a link begins with the word home, you will have linking problems.
Answer the following statement true (T) or false (F)
Some of the file management functions that a(n) ____________________ performs are displaying a list of files on a storage medium; organizing files in folders; copying, renaming, deleting, moving, and sorting files.
Fill in the blank(s) with the appropriate word(s).
Software consists of programs, which are sets of instructions telling you how to use the computer.
Answer the following statement true (T) or false (F)