Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the three ways to authenticate a person?



What are the three ways to authenticate a person?..

Answer / chaitanya

Something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication often times uses a password and token setup, although in some cases this can be a PIN and thumbprint.

Is This Answer Correct ?    1 Yes 2 No

Post New Answer

More Computer Security Interview Questions

Why would you bring in an outside contractor to perform a penetration test?

1 Answers  


If you were going to break into a database-based website, how would you do it?

1 Answers  


Why are internal threats oftentimes more successful than external threats?

1 Answers  


 What is the difference between a vulnerability and an exploit?

1 Answers  


What is data source in computer?

0 Answers  


What is residual risk?

1 Answers  


What is database in a computer?

0 Answers  


What is a spooler on a computer?

0 Answers  


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

0 Answers  


 Why would you want to use SSH from a Windows pc?

1 Answers  


 Why is deleted data not truly gone when you delete it?

1 Answers  


What is meant by computer application?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)