What are the four assurance methods? Give examples of each.

What will be an ideal response?


The four different assurance methods are as follows:
* Something you have: A smart card, an ATM card, or hardware token
* Something you know: A user ID, a password, or PIN
* Something you are: A part of the body such as a thumbprint, handprint, or retinal scan
* Something you do: Your handwriting or your speaking voice

Computer Science & Information Technology

You might also like to view...

____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.?

A. ?System-monitoring B. ?User-analysis C. ?Network analysis D. ?Log-analysis

Computer Science & Information Technology

Media ____ are style sheet files that specify set parameters for displaying pages on separate devices.

A. installs B. views C. queries D. displays

Computer Science & Information Technology

________ is the operator for performing multiplication

Fill in the blank(s) with correct word

Computer Science & Information Technology

While investigating a user who is suspected of collecting pornographic images on a company computer, you find that all of the files pointing to his guilt all have one thing in common. In your opinion, that one thing actually may prove his is innocent. What is that one thing common to all files that is the focus here?

a. All files appeared within moments of a single "TYPEDURL"/. b. The HTTP headers indicates that each and every one of the suspicious files is the result of a REDIRECT. c. All the files appear to have come from the same URL. d. Most of the files were PNG files and not JPEG files.

Computer Science & Information Technology