OPERATING SYSTEMS FOR COMPUTERS
COMPUTER OPERATING SYSTEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Knowledge
|
|
Possession
|
|
Biometric
|
|
None of the above
|
Detailed explanation-1: -Items such as card readers, wireless tags and USB tokens are common connected tokens used to serve as a possession factor during a multi-factor authentication process. Disconnected tokens are items which do not directly connect to the client computer – instead requiring input from the individual attempting to sign in.
Detailed explanation-2: -1. An authentication based on what the user has, such as memory cards and smart card tokens. Possession-based authentication is also referred to as token-based authentication. Learn more in: Authentication Methods for Computer Systems Security.
Detailed explanation-3: -A smart card is a physical device, usually a plastic card with a microprocessor, that can provide personal authentication using certificates stored on the card. Personal authentication means that you can use smart cards in the same way as user passwords.
Detailed explanation-4: -Possession authentication covers an array of credentials that a user currently has. These unique pieces of information, typically contained in a hardware device, are ideally unknown to anyone other than its owner. Moreover, this authentication factor limits access interference that professional hackers might carry out.