A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?

A. Two-factor authentication
B. Biometric security
C. Multi-factor authentication
D. Single factor authentication


Ans: A. Two-factor authentication

Computer Science & Information Technology

You might also like to view...

Method reduce’s first argument is formally called a(n) ________ value—a value that, when combined with any stream element using the IntBinaryOperator produces that element’s original value.

a. original b. identity c. preserve d. self

Computer Science & Information Technology

Schools or businesses that need to install software on a large number of computers can usually obtain a _____ for the number of users needed.

A. ?computer license B. ?business license C. ?network license D. ?school license

Computer Science & Information Technology

When Windows Firewall is enabled, you might not be able to use some communication features such as sending files with a messaging program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?

a. Ultrasonic. b. Microwave. c. Passive infrared. d. Dual-phenomenology.

Computer Science & Information Technology