Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as _______
A. temporary authentication
B. dual authorization
C. dual authentication
D. biometric authentication
Answer: C
Computer Science & Information Technology
You might also like to view...
While responding to an incident on a Linux server, the administrator needs to disable unused services. Which of the following commands can be used to see processes that are listening on a TCP port?
A. Lsof B. Tcpdump C. Top D. Ifconfig
Computer Science & Information Technology
1 ________ may contain different data types.
a) structures b) arrays c) both a and b d) none of these
Computer Science & Information Technology