Ann a network administrator has been tasked with strengthening the authentication of users logging into systems in area containing sensitive information. Users log in with usernames and passwords, following by a retinal scan. Which of the following could she implement to add an additional factor of authorization?

A. Requiring PII usage
B. Fingerprint scanner
C. Magnetic swipe cards
D. Complex passphrases

Answer: B. Fingerprint scanner

Computer Science & Information Technology

You might also like to view...

VoIP is a phone service that

a. requires a fiber-optic connection. b. works over an Internet connection. c. is only available for calls within the United States. d. has extremely high quality but is very expensive.

Computer Science & Information Technology

According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________

a. experiment b. question c. probable answer d. possible solution

Computer Science & Information Technology