____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.

A. Multifactor authentication
B. Database authentication
C. Biometrics
D. RADIUS


Answer: C

Computer Science & Information Technology

You might also like to view...

14) Write a complete Java class that uses the console window to prompt the user for a sentence to parse. Use the StringTokenizer class to echo the tokens back to the console.

What will be an ideal response?

Computer Science & Information Technology

Word inserts a picture into a document as a(n) ________ object

Fill in the blank(s) with correct word

Computer Science & Information Technology

Excel's ________ format is used to present information in charts, graphs, and pictures

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To create the effect of a border around another element, you first create a ______ of the appropriate dimensions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology