COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
What are three examples of two-factor authentication?
|
A fingerprint and a pattern A password and a smart card A pin number and a debit card
|
|
A password and a smart card A username and a password A pin number and a debit card
|
|
Either A or B
|
|
None of the above
|
Explanation:
Detailed explanation-1: -Type 2 – Something You Have – includes all items that are physical objects, such as keys, smart phones, smart cards, USB drives, and token devices. (A token device produces a time-based PIN or can compute a response from a challenge number issued by the server.).
There is 1 question to complete.