Ann a network administrator has been tasked with strengthening the authentication of users logging into systems in area containing sensitive information. Users log in with usernames and passwords, following by a retinal scan. Which of the following could she implement to add an additional factor of authorization?

A. Requiring PII usage
B. Fingerprint scanner
C. Magnetic swipe cards
D. Complex passphrases


Answer: B. Fingerprint scanner

Computer Science & Information Technology

You might also like to view...

Which of the following lines would be the prototype for an overloaded cast operator function that converts an object of user-defined type Time into a double?

a. Time::operator double() const; b. Time::static_cast double() const; c. Time::operator_cast(double) const; d. Time::double() const;

Computer Science & Information Technology

It is important that when using time as a series of labels on a chart to make sure the intervals are all different in order to create interest

Indicate whether the statement is true or false

Computer Science & Information Technology

A character entity is one that you can enter from the keyboard.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What code is used within the IPv6 routing table to distinguish a local route?

A) C B) U C) L D) S

Computer Science & Information Technology