The strongest form of authentication is ________
A) biometrics
B) cryptographic authentication
C) reusable passwords
D) smart cards
Answer: B
Business
You might also like to view...
An activity diagram cannot be used to ________
A) Depict the flow of control from activity to activity B) Help in identifying extensions in a use case C) Model work flow but not business processes D) Model the sequential and concurrent steps in a computation process
Business
Cascading deletions are generally not used with relationships between strong entities
Indicate whether the statement is true or false
Business