Which of the following can be used to implement two-factor authentications?

Which of the following can be used to implement two-factor authentications? Each correct answer
represents a complete solution. Choose all that apply.

Which of the following can be used to implement two-factor authentications? Each correct answer
represents a complete solution. Choose all that apply.

A.
Firewall security rule

B.
Password

C.
Smart card

D.
Encrypted network configuration

Explanation:
Two-factor authentication is defined as a security process that is used to confirm user identities by
using two individual factors as follows:
Something they have such as token, smart cards, etc
Something they know such as password.



Leave a Reply 0

Your email address will not be published. Required fields are marked *