Which of the following technologies is utilized to ensure that an individual connecting to a
corporate internal network over the Internet is not an intruder masquerading as an authorized
user?
A.
Intrusion detection system (IDS)
B.
IP address packet filtering
C.
Two-factor authentication
D.
Embedded digital signature
Explanation:
Two-factor authentication provides an additional security mechanism over and above that provided
by passwords alone. This is frequently used by mobile users needing to establish connectivity to acorporate network. IP address packet filtering would protect against spoofing an internal address
but would not provide strong authentication. An intrusion detection system (IDS) can be used to
detect an external attack but would not help in authenticating a user attempting to connect. Digital
signatures ensure that transmitted information can be attributed to the named sender.