Ann a network administrator has been tasked with strengthening the authentication of users logging into systems in area containing sensitive information. Users log in with usernames and passwords, following by a retinal scan. Which of the following could she implement to add an additional factor of authorization?
A. Requiring PII usage
B. Fingerprint scanner
C. Magnetic swipe cards
D. Complex passphrases
Answer: B. Fingerprint scanner
You might also like to view...
Which of the following lines would be the prototype for an overloaded cast operator function that converts an object of user-defined type Time into a double?
a. Time::operator double() const; b. Time::static_cast double() const; c. Time::operator_cast(double) const; d. Time::double() const;
It is important that when using time as a series of labels on a chart to make sure the intervals are all different in order to create interest
Indicate whether the statement is true or false
A character entity is one that you can enter from the keyboard.
Answer the following statement true (T) or false (F)
What code is used within the IPv6 routing table to distinguish a local route?
A) C B) U C) L D) S