_______________________ is the process of identifying an individual, usually based ona username and password. A. Authentication B. Authorization C. integrity D. crytography
Home/network security
SIKSHAPATH Latest Questions
Berlin
Asked: December 30, 2021In: Other
Firewalls are used to protect against A. Virus Attacks B. Fire Attacks C. Data Driven Attacks D. Unauthorized Attacks
Berlin
Asked: December 30, 2021In: Other
The secret key between members needs to be created as a ________key when two members contact KDC. A. public B. session C. complimentary D. private
Berlin
Asked: December 30, 2021In: Other
Password-based authentication can be divided into two broad categories: and_____ A. fixed; variable B. time-stamped; fixed C. fixed; one-time D. none of the above
Berlin
Asked: December 30, 2021In: Other
A hash function must meet criteria. A. two B. three C. four D. ten
Berlin
Asked: December 30, 2021In: Other
A(n) can be used to preserve the integrity of a document or amessage. A. message digest B. message summary C. encrypted message D. ENCRYPTION