Common implementations of strong authentication may use which of the following factors in their authentication efforts (choose all that apply):
Effective transactional controls are often capable of offering which of the following benefits (choose all that apply):
Physical access controls are usually implemented based on which of the following means (choose all that apply):
Fault-tolerance is a feature particularly sought-after in which of the following kinds of computer systems (choose all that apply):
The technique of rummaging through commercial trash to collect useful business information is known as: