Your organization recently updated an online application that employees use to log on when working from home. Employees enter their username and password into the application from their smartphone and the application logs their location using GPS. Which type of authentication is being used?

A. One-factor

B. Dual-factor

C. Something you are

D. Somewhere you are


A. This is using one-factor authentication - something you know.

Computer Science & Information Technology

You might also like to view...

The correct order in which an exception is detected and handled is:

a. try, catch, throw b. throw, catch, try c. catch, throw, try d. try, throw, catch

Computer Science & Information Technology

In the first step of completing an instruction, which is known as _______, the computer reads the next program instruction to be executed, along with any necessary data, into the processor.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ effects are a combination of other effects

Fill in the blank(s) with correct word

Computer Science & Information Technology

For the following ideal systems, calculate the hit ratio h required to achieve the stated speedup ratio S.

a. tm = 60 ns, tc = 3 ns, S = 1.1 b. tm = 60 ns, tc = 3 ns, S = 2.0 c. tm = 60 ns, tc = 3 ns, S = 5.0 d. tm = 60 ns, tc = 3 ns, S = 15.0

Computer Science & Information Technology