The network security team at your organization is enhancing your login process through the use of two-factor authentication. Which of these methods would NOT be an example of two-factor authentication?
A) Fingerprint scanner
B) Smart card
C) Pseudo-random token generator
D) Extended-length passwords that include special characters
The answer: D) Extended-length passwords that include special characters
A two-factor authentication method is often referred to as something you have. With two-factor authentication, you use your username, your password, and some other piece of information.
Want to know more? Watch “Security Fundamentals.” Data security is the responsibility of everyone in the organization. In this module, we’ll examine some of the basic fundamentals of security such as authentication technologies, file system security, and social engineering. |
Pages: 1 2