Difficulty: Easy
Correct Answer: passwords
Explanation:
Introduction / Context:
Information security uses many layers of defense. While encryption and firewalls protect data in transit and define network boundaries, everyday user access to systems is most commonly controlled by credentials such as usernames and passwords.
Given Data / Assumptions:
Concept / Approach:
Passwords provide knowledge based authentication. They are ubiquitous across operating systems, applications, and network services. Although organizations should pair them with additional factors, in practice passwords remain the default first line of access control worldwide.
Step-by-Step Solution:
Verification / Alternative check:
System setup wizards, directory services, and login prompts consistently rely on password based credentials by default, evidencing their ubiquity.
Why Other Options Are Wrong:
Common Pitfalls:
Equating most common with most secure. Best practice combines passwords with multifactor authentication and strong password policies.
Final Answer:
passwords
Discussion & Comments