An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:

A. Something you have.
B. Something you know.
C. Something you do.
D. Something you are.

Ans: A. Something you have.

Computer Science & Information Technology

You might also like to view...

Explain security concerns with macros and what can be done to minimize the risk

What will be an ideal response?

Computer Science & Information Technology

Which option scales a slide to show the entire slide?

A) Ensure Fit B) Zoom C) Whole Slide D) Maximize

Computer Science & Information Technology