Which of the following is being implemented?

A network administrator has decided to tighten company security after a recent data breach. The
new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time
use dynamic token that is accessed via a smartphone application. Which of the following is being
implemented?

A network administrator has decided to tighten company security after a recent data breach. The
new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time
use dynamic token that is accessed via a smartphone application. Which of the following is being
implemented?

A.
Two-factor authentication

B.
Biometric security

C.
Multi-factor authentication

D.
Single factor authentication

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *

nineteen − sixteen =


tekj79

tekj79

This would seem more like multi-factor authentication since it lists 3 methods here.
But I can see how it would be two-factor.

I can remote into a web portal at work with my password in one field, and then I would enter the the pin and access code in a single separate field.

Username:[tecnician]
Password:[som3th!ng]
Accesscode: [pin+token code]