The strongest form of authentication is ________

A) biometrics
B) cryptographic authentication
C) reusable passwords
D) smart cards

Answer: B

Business

You might also like to view...

An activity diagram cannot be used to ________

A) Depict the flow of control from activity to activity B) Help in identifying extensions in a use case C) Model work flow but not business processes D) Model the sequential and concurrent steps in a computation process

Business

Cascading deletions are generally not used with relationships between strong entities

Indicate whether the statement is true or false

Business