A technician wants to implement a dual factor authentication system that will enable the organization to authorize access to sensitive systems on a need-to-know basis. Which of the following should be implemented during the authorization stage?

A. Biometrics
B. Mandatory access control
C. Single sign-on
D. Role-based access control


Ans: A. Biometrics

Computer Science & Information Technology

You might also like to view...

Variables used to store integer values should be declared with the keyword.

a) integer b) int c) intvariable d) None of the above.

Computer Science & Information Technology

The Equals operator is an example of a(n) ________ operator

Fill in the blank(s) with correct word

Computer Science & Information Technology

A PivotChart displays ________ that you can click to choose a filter and change the data displayed in the chart

A) cell ranges B) field buttons C) name ranges D) named reports

Computer Science & Information Technology

Critical Thinking QuestionsCase 2-1You are planning a new presentation on marketing that you will deliver to your Intro to Business class. You also want to ensure consistency across all the slides in the presentation. In addition to applying an appropriate document theme for consistency in colors and fonts, you also decide to ____. a. arrange the slides in portrait orientationc. add speaker notes to all the slidesb. apply style guidelines to all slide textd. add a closing slide

What will be an ideal response?

Computer Science & Information Technology