An authentication token:
A) is a device the size of a credit card that contains access permission data.
B) is a type of smart card.
C) is a device that displays passcodes.
D) is an electronic marker attached to a digital authorization file.
E) compares a person's unique characteristics against a stored profile of these characteristics to determine any differences between these characteristics and the stored profile.
C
You might also like to view...
Under the indirect method of determining the net cash from operating activities on the statement of cash flows, depreciation is added to the net income for the period
Indicate whether the statement is true or false
Which of the following are methods of reducing manufacturing lead time?
I. subcontracting II. forward scheduling III. operation overlapping IV. operation splitting A) I, II, III and IV B) III and IV C) I and III D) I and II E) II and III
Which of the following is a posttest method for measuring advertising effectiveness conducted in a field setting?
A. consumer juries B. recognition tests C. physiological measures D. portfolio tests E. readability tests
Typically, the most common way for an attacker to get extensive privileges on a computer is to ________
A) take over an application program B) take over the operating system C) take over a computer's hardware D) privilege escalation after an initial takeover