What are the three ways to authenticate a person?
Answer / chaitanya
Something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication often times uses a password and token setup, although in some cases this can be a PIN and thumbprint.
Is This Answer Correct ? | 1 Yes | 2 No |
You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?
How many security protocols available?
What are salted hashes?
What is Exfiltration?
What are the most common computer applications?
How would you login to Active Directory from a Linux or Mac box?
What is the CIA triangle?
You see a user logging in as root to perform basic functions. Is this a problem?
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
What is XSS?
What is the difference between an HIDS and a NIDS?
Why is deleted data not truly gone when you delete it?