____ uses the unique human characteristics of a person for authentication (something the user is).

A. Digital certificates
B. Passwords
C. Biometrics
D. Password tokens


Answer: C

Computer Science & Information Technology

You might also like to view...

Encryption does not prevent data loss, but it can lessen the impact of data loss.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Programming languages that use instructions resembling written languages, such as English, are referred to as high-level languages.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the hashing implementation of a set, the Bag class is used to represent an item and a pointer to the next item in a chain.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A network administrator would MOST likely use a port scanner to do which of the following?

A. Capture incoming network packets to port 80 on a workstation. B. Trace a physical network port through a building. C. Remotely test a firewall configuration on a server. D. Report the link speed and duplex of all ports on a switch

Computer Science & Information Technology