Short Answer
A (n)__________ is something the user has,like an ID card or security token.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q17: Unsolicited e-mail is more commonly known as
Q37: Most computer attacks are accomplished through what
Q38: The tool used to apply policy settings
Q45: What is a common LAN authentication protocol
Q50: What are the benefits of incidence reporting?
Q63: What can be used to create entries
Q65: To lock down security settings on a
Q66: All of the following are considered environmental
Q69: List five ways to increase security protection
Q72: The security protocol that works with HTTP