Which of the following can achieve authentication?

A. Intrusion detection systems
B. Log files
C. Auditing
D. Tokens


Answer: D
Explanation: Tokens are a form of authentication. Intrusion detection systems and log files are used to achieve accountability, and auditing is used for assurance purposes.

Computer Science & Information Technology

You might also like to view...

C++0x will be

a. easier to learn b. better for building libraries c. more compatible with C d. all of the above

Computer Science & Information Technology

You can use the Relationships group on the ____ tab to create, view, and modify relationships between the tables in a database.

A. DATABASE B. DATABASE TOOLS C. TABLES D. DETAILS

Computer Science & Information Technology

Evaluate the formula of conversion of Fahrenheit to Celsius , if . Round your answer to one decimal place, if necessary.__________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user’s computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a computing system result in a 10 percent denial of service to the legitimate users? How?

What will be an ideal response?

Computer Science & Information Technology