A string of characters used to identify a particular user is a(n) ________

Fill in the blank(s) with correct word


password

Computer Science & Information Technology

You might also like to view...

What should you configure in Hyper-V Manager when a set of virtual machines requires an independent network for security purposes?

A. virtual local area network B. independent subnetwork C. host security identifier D. globally unique identifier

Computer Science & Information Technology

You can have as many pinboards as you want, organized by ________ or topic

Fill in the blank(s) with correct word

Computer Science & Information Technology

One purpose of a database is to store data so that information can be obtained easily by asking questions

Indicate whether the statement is true or false

Computer Science & Information Technology

The document ____ makes recommendations for establishing firewall policies and for selecting, configuring, testing, deploying, and managing firewall solutions.

A. SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans B. SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations C. SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy D. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems

Computer Science & Information Technology