>_COMMAND ZERO
CertificationsPricing
LearnCompTIA Security+General Security Concepts
easy
Single Answer

Wayne wants to allow systems to claim identities as part of his AAA process. Which of the following is most commonly used to identify both individuals and systems?

Answer Options

A

Tokens

B

Smartcards

C

Certificates

D

Usernames

Correct Answer: C

Explanation

Certificates are commonly used to identify both individuals and systems. Tokens, smartcards, and usernames are primarily used by individuals.

Related Questions

  • Which of the following is not typically true of embedded systems?

    medium
    Security Architecture
  • Which of the following concepts defines a company goal for system restoration an...

    medium
    Security Program Management and Oversight
  • Drew wants to address a recent Windows vulnerability that has a CVE rating of 9....

    medium
    Threats, Vulnerabilities, and Mitigations
  • What process reviews control objectives for an organization, system, or service...

    medium
    General Security Concepts
  • John wants to write a procedure that addresses what to do if an employee inadver...

    medium
    General Security Concepts
  • What does port security use to determine what machines or devices can connect to...

    medium
    Security Architecture
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk