Give us your feedback!
Question:
What is the name of the authentication system developed at MIT to identify networked users' identity?
Response:
Kerberos
Aurora
CHAP
Pegasus
To accept or reject a wireless device during a RADIUS authentication, the AP must create a data packet containing verification information called the ________.
access request
accounting request
authentication request
verification request
Which of the rules may be applied to a domain using an AD Group Policy:
Passwords cannot be shared between users of a single system
Password history
Passwords must not be written down
Passwords may not use certain common phrases or words
Passwords must be unique across multiple accounts
Minimum password length
Unlike standard biometrics or behavioral biometrics, cognitive biometrics focus on
a person's physical characteristics (iris, thumbprint, etc.)
how a person answers a CAPTCHA (text pattern recognition, math problem, etc.)
what a person knows, remembers or perceives (image recollection, memorable events and details, etc.)
the way a person uses a computer or performs an act (keyboard typing, voice recognition, etc.)