FUNDAMENTALS OF COMPUTER

OPERATING SYSTEMS FOR COMPUTERS

COMPUTER OPERATING SYSTEMS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
SmartCard/Token authentication is considered as
A
Knowledge
B
Possession
C
Biometric
D
None of the above
Explanation: 

Detailed explanation-1: -Items such as card readers, wireless tags and USB tokens are common connected tokens used to serve as a possession factor during a multi-factor authentication process. Disconnected tokens are items which do not directly connect to the client computer – instead requiring input from the individual attempting to sign in.

Detailed explanation-2: -1. An authentication based on what the user has, such as memory cards and smart card tokens. Possession-based authentication is also referred to as token-based authentication. Learn more in: Authentication Methods for Computer Systems Security.

Detailed explanation-3: -A smart card is a physical device, usually a plastic card with a microprocessor, that can provide personal authentication using certificates stored on the card. Personal authentication means that you can use smart cards in the same way as user passwords.

Detailed explanation-4: -Possession authentication covers an array of credentials that a user currently has. These unique pieces of information, typically contained in a hardware device, are ideally unknown to anyone other than its owner. Moreover, this authentication factor limits access interference that professional hackers might carry out.

There is 1 question to complete.