Which of the following implements two-factor authentication?

A. A phone system requiring a PIN to make a call
B. At ATM requiring a credit card and PIN
C. A computer requiring username and password
D. A datacenter mantrap requiring fingerprint and iris scan


Answer: B. At ATM requiring a credit card and PIN

Computer Science & Information Technology

You might also like to view...

Define the term “bottleneck” as it applies to data entry.

What will be an ideal response?

Computer Science & Information Technology

In Access, what view displays the detailed structure of the table?

A) Preview B) SQL C) Datasheet D) Design

Computer Science & Information Technology

OneNote Online can collect all of the pieces of a larger project for review and discussion in a single file

Indicate whether the statement is true or false

Computer Science & Information Technology

An example of fault tolerance would be ________

a. A RAID array b. A large hard drive c. Installation of RAM beyond the manufacturer's default d. None of the above

Computer Science & Information Technology