A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network: Biometric fingerprint scan Complex 12 character password 5 digit pin code authorization Randomized security question prompt upon login Which of the following security setups does this company employ?

A. Single factor authentication
B. Three factor authentication
C. Two factor authentication
D. Single sign-on


Answer: C. Two factor authentication

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true regarding the IsNull function?

A) The result of an IsNull function is a Boolean value. B) Null is equal to zero. C) The results indicate whether an expression contains no valid data. D) Null is used to indicate that a value is unknown, and it is treated differently than other values because it has no value.

Computer Science & Information Technology

Review the planning example and examine Figure 2-3 on page 44. In that scenario, a systems analyst for a large hotel chain wanted to determine whether the Visible Analyst CASE tool would be helpful in planning a new marketing system. Now, using the same example, create a sample project named HOTEL. Add at least seven sample planning statements, including an assumption, an objective, a critical success factor, strength, a weakness, an opportunity, and a threat. You should try to suggest realistic examples, and you can use your imagination freely.

What will be an ideal response?

Computer Science & Information Technology

A recursive function is one that

a. Speeds up a program. b. Is always slower than a nonrecursive function. c. Calls itself d. Calls no functions at all. e. Calls another function

Computer Science & Information Technology

RAID-5 is also known as striping with parity, and provides fault tolerance

Indicate whether the statement is true or false

Computer Science & Information Technology