Quiz Complete, well Done!
What should you do if you suspect your password has been compromised?
private key
Biometric authentication uses
physical characteristics.
The main advantage of symmetric encryption is
.
Network security
Digital certificate
is a measure of how difficult it is to guess or crack a password.
Encryption is often used to protect sensitive
.
What is the role of the private key in a digital certificate?
Which of the following is a common network authentication protocol?
decryption
key exchange
Which of the following is a purpose of digital certificates in network validation and authentication?
key pair
The practice of periodically changing passwords is known as
.
How often should you change your passwords?
Which of the following is an example of network authentication?
To authenticate a user, a system may require a
and password.
Intrusion detection system
requires the use of two different authentication methods.