Multiple Choice
A user can be identified by ________.
A) user knowledge, such as passwords, PINs and lock combinations
B) ownership of an item, such as badges, keys and smart cards
C) a unique characteristic such as a fingerprint
D) all of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q32: Cryptography is important because it _.<br>A) protects
Q33: According to the text, approximately how many
Q34: Each cell in an access control matrix
Q35: A distributed denial-of-service attack is _.<br>A) an
Q36: The primary appeal of a role-based access
Q38: Which of the following is a problem
Q39: _ is the most common key-agreement protocol.<br>A)
Q40: A biometric is a(n) _.<br>A) unique personal
Q41: Which of the following is not true
Q42: How does a cryptanalytic attack typically work?<br>A)