COMPUTER SOFTWARE
OPERATING SYSTEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Knowledge
|
|
Possession
|
|
Biometric
|
|
None of the above
|
Detailed explanation-1: -1. An authentication based on what the user has, such as memory cards and smart card tokens. Possession-based authentication is also referred to as token-based authentication. Learn more in: Authentication Methods for Computer Systems Security.
Detailed explanation-2: -Smart Card Authentication is a means of verifying users into enterprise resources such as workstations and applications using a physical card in tandem with a smart card reader and software on the workstation.
Detailed explanation-3: -Fingerprints, DNA, eye retinas and irises, voice patterns, facial patterns and hand measurements are all forms of biometric data inherent to the user. Possession factor: Informally called “something the user has, ‘’ this is a category of authentication based on an item in the user’s possession.