Rotating password can be restricted by the use of:
Rotating password can be restricted by the use of:
What should you do immediately if the root password is compromised?
What should you do immediately if the root password is compromised?
Which of the following is the most secure way to distribute password?
Which of the following is the most secure way to distribute password?
Which of the following does not apply to system-generated passwords?
Which of the following does not apply to system-generated passwords?
Passwords can be required to change monthly, quarterly, or any other intervals:
Passwords can be required to change monthly, quarterly, or any other intervals:
what kind of authentication is supported?
In SSL/TLS protocol, what kind of authentication is supported?
Which of the following correctly describe the difference between identification and authentication?
Which of the following correctly describe the difference between identification and authentication?
Identification establishes:
Identification establishes:
Identification usually takes the form of:
Identification usually takes the form of:
What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?
What is called the act of a user professing an identity to a system, usually in the form of a log-on
ID?