This topic contains a solution. Click here to go to the answer

Author Question: Discuss any two kinds of authentication strategies used in organizations. What will be an ideal ... (Read 73 times)

magmichele12

  • Hero Member
  • *****
  • Posts: 559
Discuss any two kinds of authentication strategies used in organizations.
 
  What will be an ideal response?

Question 2

A(n)________ report is produced when a user enters various values in a pivot table to filter data.
 
  A) drill-down
  B) SQL
  C) ad hoc
  D) production
  E) parameterized



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

zogaridan

  • Sr. Member
  • ****
  • Posts: 328
Answer to Question 1

Technical controls for preventing unauthorized access draw on technologies that can authenticate people and determine what access privileges they should be granted. Reliance on user knowledge is the simplest strategy, although in many ways the weakest and easiest to crack. Financial institutions especially have expanded password security to require the user to have several pieces of knowledge, or to link each login to a particular IP address. They also take the precaution of sending the PIN to account holders by mail in a letter separate from the user ID. Biometric identifiers are also widely used, especially for physical security, since they are more difficult to crack, forge, or copy.

Answer to Question 2

E




magmichele12

  • Member
  • Posts: 559
Reply 2 on: Jul 7, 2018
:D TYSM


elyse44

  • Member
  • Posts: 319
Reply 3 on: Yesterday
Excellent

 

Did you know?

Although puberty usually occurs in the early teenage years, the world's youngest parents were two Chinese children who had their first baby when they were 8 and 9 years of age.

Did you know?

The cure for trichomoniasis is easy as long as the patient does not drink alcoholic beverages for 24 hours. Just a single dose of medication is needed to rid the body of the disease. However, without proper precautions, an individual may contract the disease repeatedly. In fact, most people develop trichomoniasis again within three months of their last treatment.

Did you know?

The FDA recognizes 118 routes of administration.

Did you know?

Cocaine was isolated in 1860 and first used as a local anesthetic in 1884. Its first clinical use was by Sigmund Freud to wean a patient from morphine addiction. The fictional character Sherlock Holmes was supposed to be addicted to cocaine by injection.

Did you know?

There are actually 60 minerals, 16 vitamins, 12 essential amino acids, and three essential fatty acids that your body needs every day.

For a complete list of videos, visit our video library