A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. Which of the following would be the BEST example of twofactor authentication?

A. ID badge and keys
B. Password and key fob
C. fingerprint scanner and retina scan
D. Username and password

Answer: B. Password and key fob

Computer Science & Information Technology

You might also like to view...

< >, =, <, <=, >, and >= are Excel's ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a token ring network, a device waiting to transmit

a. must wait until it receives a busy token b. must wait until it receives a free token c. can transmit only when it is the active monitor d. can transmit only when it is the standby monitor

Computer Science & Information Technology