Multiple Choice
The most secure procedures combine which of the following authentication and authorization techniques?
A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) All of these
Correct Answer:

Verified
Correct Answer:
Verified
Q85: What is pretexting?<br>A) A form of social
Q86: What is a data file that identifies
Q87: Phishing reroutes requests for legitimate websites to
Q88: Organizations address security risks through two lines
Q89: What is an insider?<br>A) A form of
Q91: The technique to gain personal information for
Q92: A smart card is a device the
Q93: What is spear phishing?<br>A) Reroutes requests for
Q94: Pretexting is a form of social engineering
Q95: Single-factor authentication is the traditional security process,