Multiple Choice
Which of the following can achieve authentication in information security?
A) Intrusion detection systems
B) Log files
C) Auditing
D) Tokens
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: Which of the following statements best describes
Q3: Which of the following is not one
Q4: CVSS is short for which of the
Q5: Which of the following best describes the
Q6: The ISO 27002 standard has its origins
Q7: Which of the following best describes the
Q8: Which of the following refers to a
Q9: Which of the following refers to those
Q10: Which of the following is an example
Q11: Which of the following refers to the