What is two-factor authentication’s promise?

A. The two factors of authentication have to be similar
B. The impostor needs one method to work to be able to access a system
C. If one authentication method is broken, the impostor will still not be able to authenticate himself or herself.
D. The user can pick any of the two authentication methods.


C. If one authentication method is broken, the impostor will still not be able to authenticate himself or herself.

Computer Science & Information Technology

You might also like to view...

Give schedules of distributed transactions executing at two different sites such that the commit order is different at each site but the global schedule is serializable.

What will be an ideal response?

Computer Science & Information Technology

CompuServe was a large commercial dial-up computer network, in operation from 1979 through 2009

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ means that when you open the item, you open it in its original application such as Excel

Fill in the blank(s) with correct word

Computer Science & Information Technology

Many computer manufacturers offer ________ programs to reduce the number of computers disposed of in landfills.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology