A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?
A. Two-factor authentication
B. Biometric security
C. Multi-factor authentication
D. Single factor authentication
Ans: A. Two-factor authentication
You might also like to view...
Method reduce’s first argument is formally called a(n) ________ value—a value that, when combined with any stream element using the IntBinaryOperator produces that element’s original value.
a. original b. identity c. preserve d. self
Schools or businesses that need to install software on a large number of computers can usually obtain a _____ for the number of users needed.
A. ?computer license B. ?business license C. ?network license D. ?school license
When Windows Firewall is enabled, you might not be able to use some communication features such as sending files with a messaging program.
Answer the following statement true (T) or false (F)
Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?
a. Ultrasonic. b. Microwave. c. Passive infrared. d. Dual-phenomenology.