Which procedure is NOT a valid mechanism for performing account proofing when users are attempting to log into their account?

A. Have the user type in the username and password a second time.
B. Send a text message to the user's phone.
C. Ask the user three security questions based upon facts that only the user is likely to know.
D. Have the user click a hyperlink in an email message.


Answer: A. Have the user type in the username and password a second time.

Computer Science & Information Technology

You might also like to view...

Which of the following is false?

a. The size of an ArrayList can be determined via its length instance variable. b. The size of an ArrayList can be determined via its size method. c. You can add a new item to the end of an ArrayList with its add method. c. You can get an item from a specified index in an ArrayList with its get method.

Computer Science & Information Technology

Describe the features found in the Ext4 file system available to CentOS 7 users?

What will be an ideal response?

Computer Science & Information Technology

Your organization decides to use digital signatures to sign messages. Which security tenets are covered by this implementation?

A. confidentiality B. authentication C. nonrepudiation D. integrity E. options a and b only F. options c and d only G. options b, c, and d only

Computer Science & Information Technology

What statement describes the advantage of fault tolerance?

A. If one cable break, all of the other computers can still communicate. B. The segments can be combined into a central box. C. Cable termination is not needed. D. Cable termination occurs automatically.

Computer Science & Information Technology