What are the three ways to authenticate a person?
Answer / chaitanya
Something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication often times uses a password and token setup, although in some cases this can be a PIN and thumbprint.
Is This Answer Correct ? | 1 Yes | 2 No |
How many security protocols available?
What is database in a computer?
What is the Chain of Custody?
You see a user logging in as root to perform basic functions. Is this a problem?
What is meant by computer application?
You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?
Does indexing slow down computer?
How would you lock down a mobile device?
What is the difference between closed-source and open-source? Which is better?
What is the CIA triangle?
You need to reset a password-protected BIOS configuration. What do you do?
What is data source in computer?