1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
5

Remote authentication has always been a concern because the person is coming from a public network, and many companies require t

wo-factor authentication for remote access. Which of the following is not one of the most commonly accepted types of credentials?
something you want to know
Computers and Technology
2 answers:
g100num [7]3 years ago
8 0

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

saveliy_v [14]3 years ago
8 0

Answer:

The correct answer is letter "D": something you want to know.

Explanation:

Two-Factor Authentications are necessary when users access to certain systems or software from a remote location that might not be secure. The <em>first step</em> consists of providing the user's username and password which indicates <em>something you are</em>. The <em>second factor</em> requires providing a sort of passcode sent in a token for instance -<em>something you have</em>- or going through facial recognition -<em>something you are</em>.

Thus, <em>something you want to know is not considered in the two-factor authentication process.</em>

You might be interested in
What is software?
bogdanovich [222]

Answer:

B

Explanation:

3 0
3 years ago
Read 2 more answers
Which tool lets you increase the view, but not the size, of text, images, and other content?
blagie [28]
Use ctrl + or - or if in microsoft word, use the zoom tool
7 0
3 years ago
In the context of a manager's roles, a _____ is an informational role that involves seeking and receiving information, scanning
Marina CMI [18]

Answer: Monitor

Explanation: Monitor role is the role played by the person in the management that processes the information.The role has the responsibility of the seeking data and records of the organization.

Organizing or managing ,scanning the data that is seeked and accordingly changes are made is the function of the monitor. Monitors also examines the productivity and the processing in the management.

5 0
3 years ago
Question 11 of 20
asambeis [7]

Answer: A.) To convince your manager to use a new meeting organization tool

Explanation:

4 0
2 years ago
What is the full form of PDP​
PtichkaEL [24]

Answer:

<em>Plasma display panel </em>(PDP)

Explanation:

<em>Plasma display panel </em>(PDP) is a type of flat panel display that uses small cells containing electrically charged ionized gases or plasmas, to produce an image. PDP consists of millions of tiny gas-filled compartments, or cells, between two panels of glass with parallel electrodes deposited on their surfaces.

3 0
3 years ago
Other questions:
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    15·1 answer
  • T/F The two primary sections of the CPU are the arithmetic/logic unit and the control unit
    8·1 answer
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • Which of the following is NOT a web browser?<br> Safari<br> Chrome<br> Bing<br> Firefox
    8·2 answers
  • The intention of this problem is to analyze a user input word, and display the letter that it starts with (book → B).
    7·1 answer
  • Which of the following is a basic principle of improvement?
    13·1 answer
  • True or false: within a database, fields can be added, deleted and edited but never moved.
    11·1 answer
  • Please help with attached file
    8·2 answers
  • If you cannot see _______________, you are in the truck driver's blind spot and cannot be seen.
    7·1 answer
  • A(n) _____ is created using the select and option elements that present users with a group of predefined possible values for the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!