1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
4 years ago
5

Remote authentication has always been a concern because the person is coming from a public network, and many companies require t

wo-factor authentication for remote access. Which of the following is not one of the most commonly accepted types of credentials?
something you want to know
Computers and Technology
2 answers:
g100num [7]4 years ago
8 0

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

saveliy_v [14]4 years ago
8 0

Answer:

The correct answer is letter "D": something you want to know.

Explanation:

Two-Factor Authentications are necessary when users access to certain systems or software from a remote location that might not be secure. The <em>first step</em> consists of providing the user's username and password which indicates <em>something you are</em>. The <em>second factor</em> requires providing a sort of passcode sent in a token for instance -<em>something you have</em>- or going through facial recognition -<em>something you are</em>.

Thus, <em>something you want to know is not considered in the two-factor authentication process.</em>

You might be interested in
Which one of these is the range for a Class C address?
kifflom [539]

class C network addresses range from 192 to 223

6 0
3 years ago
Read 2 more answers
Does anyone else realize how the only tutor is for math never any other subjects?​
Slav-nsk [51]

Answer:

yes I do and I wonder why ??

7 0
3 years ago
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
Free_Kalibri [48]

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

7 0
3 years ago
Why do you think you are ready to handle the high school type of education and atmosphere? (in complete sentences)​
sertanlavr [38]

Answer:

I'm already in high school but at first, I was scared for my life literally. It wasn't what I expected it to be, though. Everyone was super nice to me and has been ever since I started. Turns out, high school is amazing.

Explanation:

5 0
3 years ago
What query class will you choose<br> for this query "women are evil"?
nikklg [1K]

Answer:

A) Gibberish or Vague Profane

Explanation:

Hope this helps

7 0
2 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • Consider the following page reference string:
    12·1 answer
  • What type of media can be edited and published by anyone?
    6·2 answers
  • What happens when a returntype, even void, is specified as a constructor in Java?
    14·1 answer
  • Which of the following cannot be copyrighted? a. books b. inventions c. videos d. music
    7·1 answer
  • True or false a relational database is one in which every data item is related to every other data item
    6·1 answer
  • The IT Department already has been testing Windows Server 2012 R2, and some time ago purchased licenses to convert all of its Wi
    14·1 answer
  • Mr. O would like to purchase a new computer for his home business. Mr. O's current computer runs very slow when he is running e-
    5·2 answers
  • Who is the owner of apple company??​
    13·2 answers
  • How do you determine if a name is a variable holding a value or if it is a function call?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!