A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. Which of the following would be the BEST example of twofactor authentication?

A. ID badge and keys
B. Password and key fob
C. fingerprint scanner and retina scan
D. Username and password


Answer: B. Password and key fob

Computer Science & Information Technology

You might also like to view...

Suppose that only 80% of the STUDENT records from Exercise 17.28 have a value for PHONE, 85% for MAJORDEPTCODE, 15% for MINORDEPTCODE, and 90% for DEGREEPROGRAM, and we use a variable-length record file. Each record has a 1-byte field type for each field occurring in the record, plus the 1-byte deletion marker and a 1-byte end-of-record marker. Suppose we use a spanned record organization, where each block has a 5-byte pointer to the next block (this space is not used for record storage).

(a) Calculate the average record length R in bytes. (b) Calculate the number of blocks needed for the file.

Computer Science & Information Technology

As you enter text in a table cell, Word will automatically increase row width to accommodate additional text if necessary

Indicate whether the statement is true or false

Computer Science & Information Technology

What installation media source is the most common source for Linux packages?

A. DVD B. NFS C. hard disk D. CD-ROM

Computer Science & Information Technology

A written or verbal exercise that gives a prospective employee a problem that represents the kind of problem support staff actually encounter is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology