Which one of thefollowing would be the appropriate system to implement?

You are trying to implement a strong authentication system. Which one of thefollowing would be the appropriate system to implement?

You are trying to implement a strong authentication system. Which one of thefollowing would be the appropriate system to implement?

A.
Something you know

B.
Something you are

C.
Something you have

D.
Something you have and something you know

Explanation:
The three authentication approaches are:
– Something you know
– Something you have
– Something you are

Strong authentication, also called two factor authentication, requires two out ofthese three.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

D