A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. Which of the following would be the BEST example of twofactor authentication?
A. ID badge and keys
B. Password and key fob
C. fingerprint scanner and retina scan
D. Username and password
Answer: B. Password and key fob
Computer Science & Information Technology
You might also like to view...
< >, =, <, <=, >, and >= are Excel's ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In a token ring network, a device waiting to transmit
a. must wait until it receives a busy token b. must wait until it receives a free token c. can transmit only when it is the active monitor d. can transmit only when it is the standby monitor
Computer Science & Information Technology