You work as a security manager for Company Inc. An individual is connecting to your corporate
internal network over the Internet. You have to ensure that he is not an intruder masquerading as an
authorized user. Which of the following technologies will you use to accomplish the task?
A.
Two-factor authentication
B.
IP address packet filtering
C.
Intrusion detection system (IDS)
D.
Embedded digital signature
Explanation:
Two-factor authentication offers an extra security mechanism above that offered by passwords
alone. It is frequently used by mobile users who want to establish connectivity to a corporate
network.