A technician wants to implement a dual factor authentication system that will enable the organization to authorize access to sensitive systems on a need-to-know basis. Which of the following should be implemented during the authorization stage?
A. Biometrics
B. Mandatory access control
C. Single sign-on
D. Role-based access control
Ans: A. Biometrics
You might also like to view...
Variables used to store integer values should be declared with the keyword.
a) integer b) int c) intvariable d) None of the above.
The Equals operator is an example of a(n) ________ operator
Fill in the blank(s) with correct word
A PivotChart displays ________ that you can click to choose a filter and change the data displayed in the chart
A) cell ranges B) field buttons C) name ranges D) named reports
Critical Thinking QuestionsCase 2-1You are planning a new presentation on marketing that you will deliver to your Intro to Business class. You also want to ensure consistency across all the slides in the presentation. In addition to applying an appropriate document theme for consistency in colors and fonts, you also decide to ____. a. arrange the slides in portrait orientationc. add speaker notes to all the slidesb. apply style guidelines to all slide textd. add a closing slide
What will be an ideal response?