_________ is the use of two different access control methods to validate a user.
A. Two-factor authentication
B. Two-factor pattern control
C. Two-factor authorization
D. Two-factor access arrangement

Fill in the blank(s) with the appropriate word(s).


Two-factor authentication

Rationale: Two-factor authentication is the use of two different access control methods to authenticate a user. It usually combines some type of possessed knowledge along with either a possessed object or a biometric feature. See 6-2: Unauthorized Access and Unauthorized Use

Computer Science & Information Technology

You might also like to view...

Navigation forms display data from a table, therefore they are a bound object

Indicate whether the statement is true or false

Computer Science & Information Technology

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?

a. Update the BIOS using the latest version b. Run CHKDSK c. Re-join the computer to the domain d. Reboot the PC as the domain will automatically rebuild the relationship

Computer Science & Information Technology

A short video presentation is referred to as a:

A) video clip B) mini video C) video footage D) mini-series

Computer Science & Information Technology

A ________ is a shape that can be used to point to information or to connect shapes on a slide

A) callout B) vertex C) selection net D) line

Computer Science & Information Technology