Ann a network administrator has been tasked with strengthening the authentication of users logging into systems in area containing sensitive information. Users log in with usernames and passwords, following by a retinal scan. Which of the following could she implement to add an additional factor of authorization?
A. Requiring PII usage
B. Fingerprint scanner
C. Magnetic swipe cards
D. Complex passphrases
Answer: B. Fingerprint scanner
Computer Science & Information Technology
You might also like to view...
VoIP is a phone service that
a. requires a fiber-optic connection. b. works over an Internet connection. c. is only available for calls within the United States. d. has extremely high quality but is very expensive.
Computer Science & Information Technology
According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________
a. experiment b. question c. probable answer d. possible solution
Computer Science & Information Technology