Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as _______

A. temporary authentication
B. dual authorization
C. dual authentication
D. biometric authentication

Answer: C

Computer Science & Information Technology

You might also like to view...

While responding to an incident on a Linux server, the administrator needs to disable unused services. Which of the following commands can be used to see processes that are listening on a TCP port?

A. Lsof B. Tcpdump C. Top D. Ifconfig

Computer Science & Information Technology

1 ________ may contain different data types.

a) structures b) arrays c) both a and b d) none of these

Computer Science & Information Technology