Question: 1. Utilize a USB based security device that can be plugged into a laptops USB port to authenticate the user. 2 Equip all laptops that
1. Utilize a USB based security device that can be plugged into a laptops USB port to authenticate the user.
2 Equip all laptops that allow the built-in camera to be used for facial recognition as a means of authenticating.
3 Authentication utilizing a fingerprint reader and a device that generates a rolling code that the user can attach to their key ring. The rolling code device will provide a new 10-digit code every 5 minutes and the code shown on the display must be entered when swiping your finger over the fingerprint reader.
Are the above:
Answer Options a. Possession based authentication (i.e., What you have) b. Knowledge based authentication (i.e., What you know) c. Identity based authentication (i.e., Who you are) d. Dual-Factor Authentication if you select this option also identify the other types of authentication being used to make up the dual-factor approach.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
