search
Q: Which of the following is used to protect in computer system, in the absence of more complete protection schemes?
  • A. Digital certificate
  • B. Digital signature
  • C. Passwords
  • D. Tokens
Correct Answer: Option C - Passwords are used as part of complete security measures to protect confidential documents and a series of confidential words and abbreviations that must be used as evidence to establish identity by accessing a resource at the present time it is used in secure computer operating system during the logging process, mobile phone, cable TV, Decoder etc. Other options include digital certificate-electronic documents, digital signature-electronic verification and a series of token-bits.
C. Passwords are used as part of complete security measures to protect confidential documents and a series of confidential words and abbreviations that must be used as evidence to establish identity by accessing a resource at the present time it is used in secure computer operating system during the logging process, mobile phone, cable TV, Decoder etc. Other options include digital certificate-electronic documents, digital signature-electronic verification and a series of token-bits.

Explanations:

Passwords are used as part of complete security measures to protect confidential documents and a series of confidential words and abbreviations that must be used as evidence to establish identity by accessing a resource at the present time it is used in secure computer operating system during the logging process, mobile phone, cable TV, Decoder etc. Other options include digital certificate-electronic documents, digital signature-electronic verification and a series of token-bits.