Personal authentication typically entails any or all the following except _________.

a. something you know
b. something you have
c. something you are
d. someone you know


Answer: d. someone you know

Computer Science & Information Technology

You might also like to view...

To add a picture to a slide master, you click the Picture button in the ________ group on the Insert tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following resides along the left side of a column chart?

A) The plot area B) The y-axis C) The legend D) The x-axis

Computer Science & Information Technology

A hybrid drive is a combination of hard drive and optical drive

Indicate whether the statement is true or false

Computer Science & Information Technology

Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address, causing the network to perform a DoS attack on one of more of its member servers?

a. Stack tweaking b. RST cookies c. Smurf IP attack d. None of the above

Computer Science & Information Technology