Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system?
Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?
Which of the following protocols is used to secure workstation and computer authentication across the network?
Which of the following will he suggest his team members to do when a suspicious email that contains an embedded hyperlink is received from a customer?
Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?