What are the three ways to authenticate a person?
Answer / chaitanya
Something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication often times uses a password and token setup, although in some cases this can be a PIN and thumbprint.
| Is This Answer Correct ? | 1 Yes | 2 No |
What is the CIA triangle?
How do you protect your home Wireless Access Point?
Why would you bring in an outside contractor to perform a penetration test?
What is the Three-way handshake? How can it be used to create a DOS attack?
What is dora process in DHCP and how it works?
If you were going to break into a database-based website, how would you do it?
What is the difference between a virus and a trojan?
0 Answers Tavant Technologies, Zensar,
What are salted hashes?
What are the three ways to authenticate a person?
How would you compromise an “Office Workstation” at a hotel?
Why are internal threats oftentimes more successful than external threats?
You see a user logging in as root to perform basic functions. Is this a problem?