An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:

A. Something you have.
B. Something you know.
C. Something you do.
D. Something you are.


Ans: A. Something you have.

Computer Science & Information Technology

You might also like to view...

To add a circle object into a pane, use _________.

a. pane.add(circle); b. pane.addAll(circle); c. pane.getChildren().add(circle); d. pane.getChildren().addAll(circle);

Computer Science & Information Technology

Pressing the ____ does not affect the hardness of the brush, only its diameter.

A. number keys B. bracket keys C. spacebar D. arrow keys

Computer Science & Information Technology

Classes that depend on field names from parent classes are said to be ____________________ because they are prone to errors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

File

A. Replicated through email B. Written to avoid detection with fake image C. Attacks EXE files

Computer Science & Information Technology