All of the following are considered bases for authentication credentials except:

A. What you do for work (your profession)
B. What you have (a physical key or a smart card)
C. What you know (a password or a private key)
D. Who you are (your fingerprint)


A. What you do for work (your profession)

Computer Science & Information Technology

You might also like to view...

A(n) _________________________ is a device used to convert a hard copy into a digital form for storage, retrieval, or other electronic purposes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The JavaScript Array object supports functions that use sorting __________ to sort arrays.

a. recipes b. loops c. algorithms d. switches

Computer Science & Information Technology

How can graphic styles be shared among Illustrator documents?

What will be an ideal response?

Computer Science & Information Technology

A ______ order is a list of vertices in a directed graph without cycles such that vertex x precedes vertex y if there is a directed edge from x to y in the graph.

a) graphical b) topological c) hierarchal d) spatial

Computer Science & Information Technology