Lab 1
CER
Speech recognition
PBKDF2
Cell Phones
Weight
Lab 2
DAC
MAC
RBAC
MAC
Lab 3
Playbook
Isolation
UAC
Administrator password
7
Action item
Which of the following authentication method can use location to authenticate a user?
Correct
7
Question
Which of the following plan focuses on malware, hackers, intrusions, attacks, and other security issues?
Correct
4
Question
Which type of evidence collection methods can be used when litigation might be needed? [Choose all that apply]
Correct
Comments
Post a Comment