Multiple Choice
Each individual who is to be included in the database of authorized users must first be __________ in the system.
A) verified
B) identified
C) authenticated
D) enrolled
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: The technique for developing an effective and
Q2: User authentication is the fundamental building block
Q10: Identifiers should be assigned carefully because authenticatedidentities
Q14: A _ is a separate file from
Q16: To counter threats to remote user authentication,systems
Q18: User authentication is a procedure that allows
Q19: Memory cards store and process data.
Q23: The most common means of human-to-human identification
Q38: In a biometric scheme some physical characteristic
Q39: Depending on the details of the overall