Multiple Choice
Authentication should be ________.
A) as strong as possible
B) appropriate for risks to the resource
C) the same for all resources,for consistency
D) All of the above.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q23: Scripts are likely to be dangerous only
Q25: An attack in which an authentic-looking e-mail
Q27: Which of the following specifies what should
Q29: Policies are separated by implementation to take
Q30: Methods that hackers use to break into
Q31: In identity theft,the attacker steals credit card
Q32: Which of the following is not one
Q33: Trojan horses get onto computers by _.<br>A)viruses<br>B)hackers<br>C)Both
Q61: Oversight helps ensure that a policy is
Q90: A specific encryption method is called a