Multiple Choice
In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user?
A) "What users should have"
B) "What users should think"
C) "What users can argue they should be"
D) "What users do"
Correct Answer:

Verified
Correct Answer:
Verified
Q5: Authentication is the granting of specific permissions
Q6: Which of the following describes the wireless
Q7: What protocol would you use for remote
Q8: With IPsec,AH and ESP<br>A)Must be used together<br>B)Must
Q9: L2TP uses<br>A)UDP port 1701<br>B)TCP port 1701<br>C)TCP port
Q11: The main weakness of SSH is that
Q12: Which protocol enables the secure transfer of
Q13: In Kerberos environment,the first ticket in the
Q14: _ is the collection of billing and
Q15: Protecting the header information of a packet