Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming
more common in the business environment. It is the most secure method of authentication.
Answer option C is incorrect. Username and password is the least secure method of authentication in comparison of smart card and biometrics
authentication. Username and password can be intercepted.
Answer option A is incorrect. Smart card authentication is not as reliable as biometrics authentication.
Answer option B is incorrect. Anonymous authentication does not provide security as a user can log on to the system anonymously and he is
not prompted for credentials.
Cassie
4 months agoHyun
5 months agoGerri
5 months agoMabel
5 months agoAhmad
5 months agoLon
6 months agoGlen
6 months agoCasie
6 months agoBarrett
6 months agoTequila
6 months agoElenore
6 months agoAlpha
6 months agoVanesa
6 months agoWeldon
6 months agoMeghan
6 months agoMelvin
6 months agoFrank
11 months agoDick
10 months agoIvette
10 months agoMirta
11 months agoInes
10 months agoLonna
10 months agoLeonardo
10 months agoArt
11 months agoLavera
10 months agoCandida
10 months agoDexter
10 months agoNan
12 months agoKyoko
11 months agoChauncey
11 months agoBettina
12 months agoRex
1 year agoGail
11 months agoAmina
12 months agoVallie
1 year agoCasie
1 year ago