1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
3 years ago
13

Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin

gerprint or a retina scan) or something you possess (a smart card or a USB stick)?.a. Confidentiality b. Authentication c. Two-factor authentication
d. Third-party certificate system
Computers and Technology
1 answer:
yulyashka [42]3 years ago
4 0

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

You might be interested in
6. The following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is th
ryzh [129]

Answer:

Explanation:

a) taking 00000005, it is a 13th bit which is 0, and therefore, we'd call it an ordered chunk

b) taking 00000005 again, it is 14th (B) and 15th (E) bits are 0 and so we'd call it a middle fragment

c) 00000015 is equal to 21, it is not a multiple of 4, and as such, it needs 3 padding bytes

d) 00000005 is equal to 5 making it a TSN. So the TSN is 5

e) taking 0003, we can then say the SI is 3

f) taking 000A, the SSN is then 10

g) the message is 48656C6C

6 0
2 years ago
Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, re
Gwar [14]

Answer: See explanation

Explanation:

Following the information given in the question, the testing process for the website will include testing the links that are on the site.

Another that ng to test is to check if the menus and the buttons are working properly. Furthermore, the layout should be ensured that it's consistent as well as the ease with which the website can be used.

5 0
3 years ago
A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
Advocard [28]

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

6 0
3 years ago
The IT person most involved with system development is the _________
laila [671]

Answer:

douch

Explanation:

3 0
3 years ago
A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
lesya [120]
The value displayed in A4 is 24
5 0
2 years ago
Other questions:
  • Assuming arrayName is the name of an array and identifier is a name of a variable that has the same data type as the array eleme
    6·1 answer
  • Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
    13·1 answer
  • To read visual and audio text means
    11·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • What is the benefit of an arch in a building design? It permits architects to build taller structures. It allows architects to c
    14·1 answer
  • Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security
    8·1 answer
  • ASAP BRAINLIEST!!!
    10·1 answer
  • Who invented the first mechanical computer? in what year was it invented?.
    11·1 answer
  • 13. In cell B16, use the SUMIF function and structured references to display the total wins for teams in the Youth league.
    13·1 answer
  • What is the importance of test documentation?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!