What are the three ways to authenticate a person?
Answer / chaitanya
Something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication often times uses a password and token setup, although in some cases this can be a PIN and thumbprint.
| Is This Answer Correct ? | 1 Yes | 2 No |
You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?
What is the difference between a virus and a trojan?
0 Answers Tavant Technologies, Zensar,
You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?
What is SSL and why is it not enough when it comes to encryption?
What is a spooler on a computer?
You see a user logging in as root to perform basic functions. Is this a problem?
Is a console a computer?
What is the difference between a vulnerability and an exploit?
What’s the difference between Symmetric and Asymmetric encryption?
What is a table in computer?
What is a driver in computer?
Why are internal threats oftentimes more successful than external threats?