Which of the following can achieve authentication?
A. Intrusion detection systems
B. Log files
C. Auditing
D. Tokens
Answer: D
Explanation: Tokens are a form of authentication. Intrusion detection systems and log files are used to achieve accountability, and auditing is used for assurance purposes.
You might also like to view...
C++0x will be
a. easier to learn b. better for building libraries c. more compatible with C d. all of the above
You can use the Relationships group on the ____ tab to create, view, and modify relationships between the tables in a database.
A. DATABASE B. DATABASE TOOLS C. TABLES D. DETAILS
Evaluate the formula of conversion of Fahrenheit to Celsius , if
. Round your answer to one decimal place, if necessary.
__________
Fill in the blank(s) with the appropriate word(s).
Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user’s computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a computing system result in a 10 percent denial of service to the legitimate users? How?
What will be an ideal response?