What are the three ways to authenticate a person?
Answer / chaitanya
Something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication often times uses a password and token setup, although in some cases this can be a PIN and thumbprint.
| Is This Answer Correct ? | 1 Yes | 2 No |
What is the difference between a vulnerability and an exploit?
If you were going to break into a database-based website, how would you do it?
What is the difference between closed-source and open-source? Which is better?
What is the CIA triangle?
What are the three ways to authenticate a person?
What are salted hashes?
How do you protect your home Wireless Access Point?
What are accessories in computer?
You need to reset a password-protected BIOS configuration. What do you do?
1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?
Is a console a computer?
Why are internal threats oftentimes more successful than external threats?