NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
A fingerprint and a pattern A password and a smart card A pin number and a debit card
|
|
A password and a smart card A username and a password A pin number and a debit card
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Type 2 – Something You Have – includes all items that are physical objects, such as keys, smart phones, smart cards, USB drives, and token devices. (A token device produces a time-based PIN or can compute a response from a challenge number issued by the server.).
Detailed explanation-2: -Authentication factors can be classified into three groups: something you know: a password or personal identification number (PIN); something you have: a token, such as bank card; something you are: biometrics, such as fingerprints and voice recognition.
Detailed explanation-3: -Common types of biometrics include the following: Fingerprint scanning verifies authentication based on a user’s fingerprints. Facial recognition uses the person’s facial characteristics for verification. Iris recognition scans the user’s eye with infrared to compare patterns against a saved profile.
Detailed explanation-4: -Something you know, like a password or PIN. Something you have, like your ATM card, or your phone. Something you are, like a fingerprint or voice print.