Which of the following is not considered sensitive authentication data?

A) Full magnetic stripe data
B) CAV2 code
C) Expiration date
D) CVC2 code


C) Expiration date

Computer Science & Information Technology

You might also like to view...

Declaring main as static allows the JVM to invoke main ________.

a. without knowing the name of the class in which main is declared. b. by creating an object of the class in which main is declared. c. without creating an instance of the class in which main is declared. d. None of the above.

Computer Science & Information Technology

There are several pieces of hardware that will need to be purchased when outfitting a new forensic department. The workstations and servers are quite obvious. What are some other things you should add to your shopping list?

a. Forensic write-blockers b. Electronic name badges for each member of the team c. Separate routers for the department d. A high-capacity data storage facility

Computer Science & Information Technology

Document ____ are not referenced using an array property.

A. anchors B. images C. cookies D. forms

Computer Science & Information Technology

Most database programs create ____ databases.?

A. ?macro B. ?relational C. ?transitional D. ?marginal

Computer Science & Information Technology