When Jim logs into a system, his password is compared to a hashed value stored in a database. What is this process?

A. Identification
B. Hashing
C. Tokenization
D. Authentication

Answer: D. Authentication

Computer Science & Information Technology

You might also like to view...

Explain why a DNS cache poisoning attack can compromise DKIM but not S/MIME. Describe how DKIM could be modified to defend against DNS based attacks

What will be an ideal response?

Computer Science & Information Technology

The _________profile setting specifies the most restrictive default firewall settings

a. Private b. Guest or public c. Domain d. Workgroup

Computer Science & Information Technology