Which of the following is an example of authentication by characteristic?

A) Smartcard
B) Fingerprint scan
C) One-time passcode
D) Cognitive password


B) Fingerprint scan

Computer Science & Information Technology

You might also like to view...

BGP is considered to be which of the following?

a. An external routing protocol b. Good for routing between the same networks c. Good for routing between switches and routers on the same networks d. Outdated

Computer Science & Information Technology

The item on which the mouse pointer is resting in the accompanying figure changes to reflect the tool currently selected on the ____.



a. Document panel
b. Tools panel
c. Options panel
d. context menu

Computer Science & Information Technology

Match the following terms with their description:I.Unqualified referenceII.Fully qualified structured referenceIII.Structured referenceIV.SUBTOTAL functionV.Total rowA.Uses a field name as the reference in a tableB.Contains the table nameC.Field headings without row referencesD.Displays below the last row in a tableE.Calculates an aggregate value

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The familiar background static on radios and telephones is called:

a. echoes b. intermodulation noise c. impulse noise d. cross-talk e. white noise

Computer Science & Information Technology