A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO's requirements?

A. Username and password
B. Retina scan and fingerprint scan
C. USB token and PIN
D. Proximity badge and token


Answer: C. USB token and PIN

Computer Science & Information Technology

You might also like to view...

The first element in an overlay must be a(n) .

a. PanelOverlayElement b. TextAreaOverlayElement c. OverlayElement d. OverlayContainer

Computer Science & Information Technology

Computing power is considered a hardware limitation

Indicate whether the statement is true or false

Computer Science & Information Technology

You are building a new PC for a customer. Which of the following is the most valid reason why you would select SATA 3.0 over the original SATA 2.0?

a. You do not want to use jumpers. b. You are installing an external SATA drive. c. You are attempting to implement hot-swapping function d. You are trying to optimize the system for audio and video.

Computer Science & Information Technology

If an app does not have a needed permission (such as an-droid.permission.WRITE_EXTERNAL_STORAGE), use the built-in ________ method to determine whether an explanation of why the app needs this permission should be displayed.

a. shouldShowRationale b. shouldShowPermissionRationale c. shouldShowRequestRationale d. shouldShowRequestPermissionRationale

Computer Science & Information Technology