Question: VPNs often use an authentication procedure that requires a user to generate a short lived numerical token through a specialized piece of hardware or software,

VPNs often use an authentication procedure that requires a user to generate a short lived numerical token through a specialized piece of hardware or software, in addition to providing a username and password. What is this authentication procedure called?
1 point
Two-factor authentication
Biometric authentication
Password-based authentication
Certificate-based authentication

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!