Which of the following describes this methodology?

An employee of a highly secure company needs to use facial recognition in addition to username/password to
successfully establish a VPN. Which of the following describes this methodology?

An employee of a highly secure company needs to use facial recognition in addition to username/password to
successfully establish a VPN. Which of the following describes this methodology?

A.
PKI

B.
Federated identity

C.
Two-factor authentication

D.
Biometric authentication

E.
AAA



Leave a Reply 1

Your email address will not be published. Required fields are marked *

3 × five =


Mike

Mike

C. Two-factor authentication