A string of characters used to control network access is called a(n):

A) password B) secure identifier C) passphrase D) login


C

Computer Science & Information Technology

You might also like to view...

The best countermeasure for a SYN attack is:

a. Block SYN packets on border routers b. Block SYN packets at the firewall c. Increase the number of open SYN requests on the firewall d. Increase the number of open SYN requests on servers

Computer Science & Information Technology

Which of the following options describes the portrait page orientation?

A. Page height is smaller than its width. B. Page width is smaller than its height. C. Page width is equal to its height. D. computer screen resolution

Computer Science & Information Technology

The default width assigned to columns

A) Equal B) Unbalanced C) Proportional

Computer Science & Information Technology

Existing conditional formatting rules can be edited

Indicate whether the statement is true or false.

Computer Science & Information Technology