Which of the following authentication types has the weakest form of encryption?
a. Basic
b. Message digest
c. Certificate-based
d. Form-based
ANS: A
Computer Science & Information Technology
You might also like to view...
Most Web browsers display a vertical ____________________ only if the page content exceeds one screen.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Only include images in a table to enhance and illustrate table ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The security manager reports that the process of revoking certificates authority is too slow and should be automated. Which of the following should be used to automate this process?
A. CRL B. GPG C. OCSP D. Key escrow
Computer Science & Information Technology
The three basic components of analog and digital signals are: amplitude, frequency, and ____.?
A. ?cycles B. ?baud C. ?hertz D. ?phase
Computer Science & Information Technology