When Jim logs into a system, his password is compared to a hashed value stored in a database. What is this process?
A. Identification
B. Hashing
C. Tokenization
D. Authentication
Answer: D. Authentication
Computer Science & Information Technology
You might also like to view...
Explain why a DNS cache poisoning attack can compromise DKIM but not S/MIME. Describe how DKIM could be modified to defend against DNS based attacks
What will be an ideal response?
Computer Science & Information Technology
The _________profile setting specifies the most restrictive default firewall settings
a. Private b. Guest or public c. Domain d. Workgroup
Computer Science & Information Technology