NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Biometrics-based, Smart card-based
|
|
Multifactor authentication, Biometrics-based
|
|
Kerberos-based, Multifactor authentication
|
|
Smart card-based, Kerberos-based
|
Detailed explanation-1: -Usually, authentication by a server entails the use of a user name and password. Other ways to authenticate can be through cards, retina scans, voice recognition, and fingerprints.
Detailed explanation-2: -Type 2 – Something You Have – includes all items that are physical objects, such as keys, smart phones, smart cards, USB drives, and token devices.
Detailed explanation-3: -Authentication factors can be classified into three groups: something you know: a password or personal identification number (PIN); something you have: a token, such as bank card; something you are: biometrics, such as fingerprints and voice recognition.
Detailed explanation-4: -Kerberos Authentication. Smart-card-based Authentication. Integrated Windows Authentication (IWA) Security Assertion Markup Language (SAML)