Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming
more common in the business environment. It is the most secure method of authentication.
Answer option C is incorrect. Username and password is the least secure method of authentication in comparison of smart card and biometrics
authentication. Username and password can be intercepted.
Answer option A is incorrect. Smart card authentication is not as reliable as biometrics authentication.
Answer option B is incorrect. Anonymous authentication does not provide security as a user can log on to the system anonymously and he is
not prompted for credentials.
Cassie
3 months agoHyun
3 months agoGerri
3 months agoMabel
4 months agoAhmad
4 months agoLon
4 months agoGlen
4 months agoCasie
4 months agoBarrett
5 months agoTequila
5 months agoElenore
5 months agoAlpha
5 months agoVanesa
5 months agoWeldon
5 months agoMeghan
5 months agoMelvin
5 months agoFrank
9 months agoDick
9 months agoIvette
9 months agoMirta
10 months agoInes
8 months agoLonna
8 months agoLeonardo
9 months agoArt
10 months agoLavera
8 months agoCandida
9 months agoDexter
9 months agoNan
10 months agoKyoko
9 months agoChauncey
10 months agoBettina
10 months agoRex
11 months agoGail
10 months agoAmina
10 months agoVallie
11 months agoCasie
11 months ago