Many computer systems provide "maintenance accounts" for diagnostic and support services. Which of the following security techniques is least preferred to ensure reduced vulnerability when using these accounts?
a. Call-back confirmation
b. Encryption of communications
c. Smart tokens
d. Password and user ID