________ involve using a physical attribute such as a fingerprint for authentication

a. Backdoors
b. Rootkits
c. Biometrics
d. Trojan horses


C

Computer Science & Information Technology

You might also like to view...

Within a site, Active Directory replication is uncontrolled.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ character is used to indicate that a letter is a hot key on a menu item.

A. ampersand (&) B. forward slash (/) C. back slash (\) D. underscore (_)

Computer Science & Information Technology

What part of http://www.nps.gov/history/preserve-places.html is the host name?

A. http:// B. www.nps.gov C. history D. preserve-places.html

Computer Science & Information Technology

What is a touch pad?

What will be an ideal response?

Computer Science & Information Technology