You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without any window and is totally in darkness. For security reasons, you want to place a device in the room. Which of the following devices is best for that room?
Which of the following schemes is used by the Kerberos authentication?
Which of the following authentication methods is based on physical appearance of a user?
Which of the following types of firewall functions at the Session layer of OSI model?