________ uses two means to authenticate the user, such as biometrics or a smart card used in combination with a password.

a) Two-method authentication.
b) Digital authentication.
c) Two-factor authentication.
d) None of the above.


c) Two-factor authentication.

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. FindRecord II. Exclamation point (!) III. SetValue IV. Syntax V. Event A. Bang operator that tells Access that what follows the parent is a child object B. An action that locates the first or next record that meets the specified search criteria C. An untrusted macro action that is used to set the value of a field D. Spelling, grammar, and sequence of characters of a programming language E. Any action that can be detected by a program or computer system

Computer Science & Information Technology

What are the three types of malicious traffic detection methods?

A) Signature, policy, and anomaly based B) IDS, IPS, and IRS based C) NIDS, HIPS, and NIPS based D) Symmetric, asymmetric, and transparent based

Computer Science & Information Technology

Your customer wants to build a new computer and needs to make sure he orders the correct power supply for his machine. What should you tell him to check to make sure he orders the correct power supply?

A. Wattage requirements B. RAM requirements C. Type of cooling D. Form factor E. Number of hard drives F. Video requirements

Computer Science & Information Technology

Which of the following statements about output formatting is false?

A. A control string contains formatting instructions for the data to be output B. The printf function requires a set of zero or more data values C. The minimum code for a conversion specification consists of a conversion code, such as  ‘d' for integer D. There are four optional modifiers that can be used to refine output formatting E. To format data into columns we use the width modifier

Computer Science & Information Technology