FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are three examples of two-factor authentication?
A
A fingerprint and a pattern A password and a smart card A pin number and a debit card
B
A password and a smart card A username and a password A pin number and a debit card
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Type 2 – Something You Have – includes all items that are physical objects, such as keys, smart phones, smart cards, USB drives, and token devices. (A token device produces a time-based PIN or can compute a response from a challenge number issued by the server.).

There is 1 question to complete.