An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:
A. Something you have.
B. Something you know.
C. Something you do.
D. Something you are.
Ans: A. Something you have.
Computer Science & Information Technology
You might also like to view...
Explain security concerns with macros and what can be done to minimize the risk
What will be an ideal response?
Computer Science & Information Technology
Which option scales a slide to show the entire slide?
A) Ensure Fit B) Zoom C) Whole Slide D) Maximize
Computer Science & Information Technology