For two factor authentication, which of the following is considered something the user is?

A. password
B. USB stick
C. smart card
D. iris scan


Answer: D

Computer Science & Information Technology

You might also like to view...

Design a quorum consensus protocol in which, instead of a timestamp field, each item has a version number field, which is updated whenever the item is written.

What will be an ideal response?

Computer Science & Information Technology

What are the port numbers for FTP - File Transfer Protocol?

What will be an ideal response?

Computer Science & Information Technology

A Web server in Apache is limited to 100 aliases.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ is the process of dividing a worksheet window into two or four resizable panes so you can view separate parts of a worksheet at the same time.

A. Synchronous Scrolling B. Splitting C. View Side by Side D. Tiling

Computer Science & Information Technology