A string of characters used to control network access is called a(n):
A) password B) secure identifier C) passphrase D) login
C
Computer Science & Information Technology
You might also like to view...
The best countermeasure for a SYN attack is:
a. Block SYN packets on border routers b. Block SYN packets at the firewall c. Increase the number of open SYN requests on the firewall d. Increase the number of open SYN requests on servers
Computer Science & Information Technology
Which of the following options describes the portrait page orientation?
A. Page height is smaller than its width. B. Page width is smaller than its height. C. Page width is equal to its height. D. computer screen resolution
Computer Science & Information Technology
The default width assigned to columns
A) Equal B) Unbalanced C) Proportional
Computer Science & Information Technology
Existing conditional formatting rules can be edited
Indicate whether the statement is true or false.
Computer Science & Information Technology