Which of the following is an example of a single-factor authentication being used to gain access to a computer system?

A. Using a username and a 16-character password
B. Using a smart card and entering a secret password
C. Using an RSA SecureID token device and entering a private code
D. Using a biometric scan of a fingerprint and entering a PIN


Answer: A. Using a username and a 16-character password

Computer Science & Information Technology

You might also like to view...

Key distribution often involves the use of _________ which are generated and distributed for temporary use between two parties.

A. public key certificates B. session keys C. master keys D. private key certificates

Computer Science & Information Technology

If the path for an image or a link begins with the word home, you will have linking problems. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Some of the file management functions that a(n) ____________________ performs are displaying a list of files on a storage medium; organizing files in folders; copying, renaming, deleting, moving, and sorting files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Software consists of programs, which are sets of instructions telling you how to use the computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology