_________ is the use of two different access control methods to validate a user.
A. Two-factor authentication
B. Two-factor pattern control
C. Two-factor authorization
D. Two-factor access arrangement
Fill in the blank(s) with the appropriate word(s).
Two-factor authentication
Rationale: Two-factor authentication is the use of two different access control methods to authenticate a user. It usually combines some type of possessed knowledge along with either a possessed object or a biometric feature. See 6-2: Unauthorized Access and Unauthorized Use
You might also like to view...
Navigation forms display data from a table, therefore they are a bound object
Indicate whether the statement is true or false
A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?
a. Update the BIOS using the latest version b. Run CHKDSK c. Re-join the computer to the domain d. Reboot the PC as the domain will automatically rebuild the relationship
A short video presentation is referred to as a:
A) video clip B) mini video C) video footage D) mini-series
A ________ is a shape that can be used to point to information or to connect shapes on a slide
A) callout B) vertex C) selection net D) line