Which of the following can achieve authentication?
A. Intrusion detection systems
B. Log files
C. Auditing
D. Tokens
Answer: D
Explanation: Tokens are a form of authentication. Intrusion detection systems and log files are used to achieve accountability, and auditing is used for assurance purposes.
Computer Science & Information Technology
You might also like to view...
In your home or office, when you have multiple computers that need to share an Internet connection, printer, or files, you will want to connect them to a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
The most popular standard for wireless LAN services is 802.11
Indicate whether the statement is true or false.
Computer Science & Information Technology