Which of the following describes this methodology?

An employee of a highly secure company needs to use facial recognition in addition to username/password to successfully establish a VPN.
Which of the following describes this methodology?

An employee of a highly secure company needs to use facial recognition in addition to username/password to successfully establish a VPN.
Which of the following describes this methodology?

A.
PKI

B.
Federated identity

C.
Two-factor authentication

D.
Biometric authentication

E.
AAA



Leave a Reply 0

Your email address will not be published. Required fields are marked *