A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO's requirements?
A. Username and password
B. Retina scan and fingerprint scan
C. USB token and PIN
D. Proximity badge and token
Answer: C. USB token and PIN
You might also like to view...
The first element in an overlay must be a(n) .
a. PanelOverlayElement b. TextAreaOverlayElement c. OverlayElement d. OverlayContainer
Computing power is considered a hardware limitation
Indicate whether the statement is true or false
You are building a new PC for a customer. Which of the following is the most valid reason why you would select SATA 3.0 over the original SATA 2.0?
a. You do not want to use jumpers. b. You are installing an external SATA drive. c. You are attempting to implement hot-swapping function d. You are trying to optimize the system for audio and video.
If an app does not have a needed permission (such as an-droid.permission.WRITE_EXTERNAL_STORAGE), use the built-in ________ method to determine whether an explanation of why the app needs this permission should be displayed.
a. shouldShowRationale b. shouldShowPermissionRationale c. shouldShowRequestRationale d. shouldShowRequestPermissionRationale