Which of the following authentication types has the weakest form of encryption?

a. Basic
b. Message digest
c. Certificate-based
d. Form-based


ANS: A

Computer Science & Information Technology

You might also like to view...

Most Web browsers display a vertical ____________________ only if the page content exceeds one screen.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Only include images in a table to enhance and illustrate table ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The security manager reports that the process of revoking certificates authority is too slow and should be automated. Which of the following should be used to automate this process?

A. CRL B. GPG C. OCSP D. Key escrow

Computer Science & Information Technology

The three basic components of analog and digital signals are: amplitude, frequency, and ____.?

A. ?cycles B. ?baud C. ?hertz D. ?phase

Computer Science & Information Technology