Notice: Payments for answers will end 4/10/2017. Click for more info.
You have new items in your feed. Click to view.
Question and answer
Q: Which of the following portrays authentication based on something known? a. PIN b. Fingerprint c. RFID card d. DNA
A: The answer is a. PIN A personal identification number (PIN) portrays authentication based on something known. Compare this to a fingerprint or retinal scan, which is a physical trait rather than something known.
Question
Asked 8/28/2012 7:47:02 AM
Updated 8/28/2012 8:04:41 AM
1 Answer/Comment
Get an answer
New answers
Rating
3
The answer is a. PIN

A personal identification number (PIN) portrays authentication based on something known. Compare this to a fingerprint or retinal scan, which is a physical trait rather than something known.

Added 8/28/2012 8:04:41 AM
This answer has been added to the Weegy Knowledgebase
Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Which are examples of information that should NEVER be posted on a public website? a. Sensitive Acquisition or contractual information b. Personally Identifiable Information (PII) c. Information regarding incidents under investigation d. All of the above
Question
Not Answered
Updated 8/27/2012 11:21:28 AM
1 Answer/Comment
Which are examples of information that should NEVER be posted on a public website? d. All of the above
Added 8/27/2012 11:21:28 AM
This answer has been confirmed as correct and helpful.
Confirmed by Janet17 [5/26/2014 7:21:11 AM]
The AIAP is a stand-alone program. a. TRUE b. FALSE
Weegy: Asked 2 The AIAP is a stand-alone program. FALSE. User: Establishing an incident response capability includes? a. Create an incident response policy and training the response team b. Develop procedures for performing incident handling and reporting c. Setting communication guidelines and identifying key personnel d. All of the above Weegy: ALL OF THE ABOVE. Establishing an incident response capability includes - Create an incident response policy and training the response team, Develop procedures for performing incident handling and reporting and Setting communication guidelines and identifying key personnel. (More)
Question
Expert Answered
Updated 353 days ago|12/29/2016 12:11:12 AM
1 Answer/Comment
The computer fraud and abuse act was passed in 1986 to combat? a. Wiretapping b. Non-cost effective computer security c. Identity theft d. Hacking
Weegy: Wiretapping (More)
Question
Expert Answered
Updated 11/29/2014 11:07:35 AM
1 Answer/Comment
The computer fraud and abuse act was passed in 1986 to combat: Hacking.

Added 11/29/2014 11:07:35 AM
This answer has been confirmed as correct and helpful.
Confirmed by sujaysen [11/29/2014 12:47:12 PM]
26,531,235 questions answered
Popular Conversations
Most volcanoes are located at A. hot spots. B. transform ...
Weegy: Most volcanoes are located a the pacific ring of fire.
12/12/2017 8:34:43 AM| 14 Answers
This year, after a lengthy, noisy debate, they decided to take ...
Weegy: This year, after a lengthy, noisy debate, they decided to take separate vacations. This is a Simple Sentence. ...
12/10/2017 4:51:34 AM| 4 Answers
What is the primary mission of the Department of Homeland ...
Weegy: The primary mission of the Department of Homeland Security is " ensuring that the United States and its citizens ...
12/12/2017 7:12:59 AM| 4 Answers
Which layer of Earth is responsible for creating Earth's magnetic ...
Weegy: Earth's "Outer Core" is responsible for creating Earth's magnetic field.
12/12/2017 8:25:18 AM| 4 Answers
Which one of the following types of sentences gives a command or ...
Weegy: Do your work! The sentence above is an example of an IMPERATIVE sentence. User: Which one of the following ...
12/8/2017 6:12:32 AM| 3 Answers
Making it a point to work out with a friend is an example of a ...
Weegy: people might interpret a "fitness goal" differently but if what you want is to get healthier, then working out ...
12/7/2017 7:04:03 AM| 2 Answers
(x^3 + 43 - 49x - 7x^2) ÷ (x^2 - 49)
12/7/2017 11:40:19 AM| 2 Answers
Her daughter likes climbing trees. Gerund or gerund phrase: Noun ...
Weegy: A gerund is a verbal that ends in -ing and functions as a noun. User: Locate the gerund or gerund phrase and ...
12/7/2017 4:02:12 PM| 2 Answers
Which one of the following types of sentences gives a command or ...
Weegy: Do your work! The sentence above is an example of an IMPERATIVE sentence. User: Which one of the following ...
12/9/2017 5:01:23 AM| 2 Answers
Weegy Stuff
S
Points 10 [Total 10] Ratings 1 Comments 0 Invitations 0 Offline
S
Points 5 [Total 5] Ratings 0 Comments 5 Invitations 0 Offline
S
Points 3 [Total 3] Ratings 0 Comments 3 Invitations 0 Offline
S
Points 1 [Total 1] Ratings 0 Comments 1 Invitations 0 Offline
S
P
L
P
Points 1 [Total 166] Ratings 0 Comments 1 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.