Answer the following statement(s) true (T) or false (F)

1. The three primary information security areas are authentication and authorization, policies and rewards, and detection and response.
2. Tokens are small electronic devices that change user passwords automatically.
3. The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.
4. A process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space, is called authentication.
5. One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.


1. False
2. True
3. True
4. False
5. True

Computer Science & Information Technology

You might also like to view...

Windows 2000, XP, and 2003 operating systems authenticate only the users who access resources within the domain.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A prebuilt set of effects, colors, and backgrounds applied to a chart that is designed to work with the

presentation theme. A) Chart effect B) Chart layout C) Chart style

Computer Science & Information Technology

The ____ of a function of a single variable can be thought of as the area under a curve.

a. derivative b. integration c. name d. root

Computer Science & Information Technology

The Date object has a ________ method that formats the user's input in a date format

Fill in the blank(s) with correct word

Computer Science & Information Technology