1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
4 years ago
5

Remote authentication has always been a concern because the person is coming from a public network, and many companies require t

wo-factor authentication for remote access. Which of the following is not one of the most commonly accepted types of credentials?
something you want to know
Computers and Technology
2 answers:
g100num [7]4 years ago
8 0

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

saveliy_v [14]4 years ago
8 0

Answer:

The correct answer is letter "D": something you want to know.

Explanation:

Two-Factor Authentications are necessary when users access to certain systems or software from a remote location that might not be secure. The <em>first step</em> consists of providing the user's username and password which indicates <em>something you are</em>. The <em>second factor</em> requires providing a sort of passcode sent in a token for instance -<em>something you have</em>- or going through facial recognition -<em>something you are</em>.

Thus, <em>something you want to know is not considered in the two-factor authentication process.</em>

You might be interested in
Why would a user want to resend a message? Check all that apply.
Dmitrij [34]

Answer:

A

B

D

E

Explanation:

O to include new recipients

D to include a forgotten attachment

D to respond to a request from a recipient who accidentally deleted it

O to include missing information

5 0
3 years ago
Read 2 more answers
A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownershi
lianna [129]

The correct scripts are:

chmod 765 script1

chmod u+x script1

A cοmmand is an instructiοn givеn by a usеr tеlling a cοmputеr tο dο sοmеthing, such a run a singlе prοgram οr a grοup οf linkеd prοgrams. Cοmmands arе gеnеrally issuеd by typing thеm in at thе cοmmand linе (i.е., thе all-tеxt display mοdе) and thеn prеssing thе ЕNTЕR kеy, which passеs thеm tο thе shеll.

In Unix-likе οpеrating systеms, chmοd is thе cοmmand and systеm call which may changе thе accеss pеrmissiοns tο filе systеm οbjеcts. It may alsο altеr spеcial mοdе flags. Thе rеquеst is filtеrеd by thе umask. Thе namе is an abbrеviatiοn οf changе mοdе.

8 0
4 years ago
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
scoray [572]
,,,,,,,,,,,,,,,,,,,,,,
4 0
3 years ago
Why would a person who handles electronic components wear a grounded wrist strap
Otrada [13]
Normally, wrist straps like this are used to prevent static electric discharge, which can ruin electric components.<span />
5 0
3 years ago
A technician is at a small facility that has five computers connected to a central switch and accessing a single server for file
Crazy boy [7]

Answer:

c.

Explanation:

The swich is failing because it letting the four in but not the fith ond so it a faulty swich

8 0
3 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • Mitchell has noticed that his co-workers are unable to open attachments in the emails he sends. What is one possible reason for
    5·1 answer
  • Why are rules required for a number system to be useful?
    10·2 answers
  • What are the primary functions of motor oil? a. Reduce friction and prevent wear b. Keep engine surfaces clean c. Remove heat to
    11·1 answer
  • Dereck works for long hours on his computer. He frequently experiences physical strain by the end of the day because he does not
    8·2 answers
  • 1. Before operating any power tool, you need to
    14·1 answer
  • QUICK! The commands available from a menu change depending upon what you are doing. True False
    10·2 answers
  • Which data type is 2.5?
    5·1 answer
  • Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
    11·1 answer
  • Q.drtrdyudoijoemrkdf
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!