FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following are examples of possession authentication? (Select THREE).
A
Key fob
B
RFID badge
C
Passphrase
D
PIN
E
Fingerprint reader
Explanation: 

Detailed explanation-1: -Authentication factors can be classified into three groups: something you know: a password or personal identification number (PIN); something you have: a token, such as bank card; something you are: biometrics, such as fingerprints and voice recognition.

Detailed explanation-2: -The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.

Detailed explanation-3: -This category includes the scope of biometrics such as retina scans, iris scans, fingerprint scans, finger vein scans, facial recognition, voice recognition, hand geometry and even earlobe geometry.

Detailed explanation-4: -Possession authentication covers an array of credentials that a user currently has. These unique pieces of information, typically contained in a hardware device, are ideally unknown to anyone other than its owner. Moreover, this authentication factor limits access interference that professional hackers might carry out.

There is 1 question to complete.