Information Technology
1. Level One Authenticity for security: * Once an individual is logged into the system (using their name and password), their name appears on the screen and their access is tracked as they use the system. * Users are automatically logged out after come period of inactivity and must log in again to continue using the system. * Must update their password (set to a specific level of complexity) on a regular basis. (e.g. monthly).
Explanation
HyperText Markup Language – is a markup language, not a programming language. It is the the building blocks for web pages. was originally called SEQUEL for Structured English Query Language, SQL, still pronounced “sequel”, stands for Query Language, a database querying language, not programming language.
2. Level Two Authenticity for Security: * Encrypted key-based authentication, * User must present computer access card (CAC) to the system before they can log on, * Log out occurs automatically is CAC is too far from the computer.
3. Level Three Authenticity for security: * Biometric authentication, * Uses something unique to the individual such as fingerprint, retinal scan or face recognition, * Cannot be lost or stolen, * Some newer laptops now come with a a fingerprint scanner built in.
Quiz Review Timeline (Updated): Mar 15, 2022 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.