Question
a.
Key card
b.
fingerprint
c.
retina pattern
d.
Password
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following is least secure method of authentication ?
Similar Questions
Discover Related MCQs
Q. Which of the following is a strong password ?
View solution
Q. Why is one time password safe ?
View solution
Q. What does Light Directory Access Protocol (LDAP) doesn’t store ?
View solution
Q. What is characteristic of RADIUS system ?
View solution
Q. Which happens first authorization or authentication ?
View solution
Q. What is characteristics of Authorization ?
View solution
Q. What forces the user to change password at first logon ?
View solution
Q. What is not a best practice for password policy ?
View solution
Q. What is breach of integrity ?
View solution
Q. What is breach of confidentiality ?
View solution
Q. What is theft of service ?
View solution
Q. What is breach of availability ?
View solution
Q. What is Trojan horse ?
View solution
Q. What is trap door ?
View solution
Q. Which mechanism is used by worm process ?
View solution
Q. Which of the following is not a characteristic of virus ?
View solution
Q. What is known as masquerading ?
View solution
Q. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?
View solution
Q. What is port scanning ?
View solution
Q. Which is not a port scan type ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Software Engineering
Learn about the systematic approach to developing software with our Software...
Microprocessor
Understand the heart of your computer with our Microprocessor MCQs. Topics include...