Multiple Choice
Authentication methods are based on _______.
A) Something you have
B) Something you want
C) Someone you know
D) None of the above
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: What technology or technologies use the AAA
Q5: A user who can view a network
Q6: What wireless security technology replaces WEP as
Q7: What ACL entry would eliminate the effect
Q8: A dictionary attack is being used by
Q10: Which is not a stage of forensics
Q11: The network administrator suspects that packet sniffing
Q12: There is a new virus reported on
Q13: What is the name for the process
Q14: A network administrator is considering placing a