1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
4 years ago
14

You have been asked to create an authentication security plan for your company. Which of the following components would you inco

rporate to ensure your company is secured?
a. Use a password manager to create unique strong passwords.b. Have the computer identify blood type and oxygen levels.c. Use biometric security that uses characteristics of your face, hands, or eyes.d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.
Computers and Technology
1 answer:
Stolb23 [73]4 years ago
5 0

Answer:

a. Use a password manager to create unique strong passwords.

c. Use bio metric security that uses characteristics of your face, hands, or eyes.

d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.

Explanation:

You might be interested in
the list of available fonts in the fonts gallery may differ, depending on what fonts you have installed and the type of printer
aalyn [17]
I believe the correct answer is true. The <span>list of available fonts in the fonts gallery may differ, depending on what fonts you have installed and the type of printer you are using. Not all fonts would be available in all computers and for all printers. It should be installed first before use.</span>
5 0
3 years ago
Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
Oksanka [162]

D. I hope it helped
5 0
3 years ago
You can copy and paste ________ from excel to powerpoint
Tanya [424]

Answer: data

Explanation:

3 0
3 years ago
Read 2 more answers
In a token ring system, how quickly is the token passed around the circuit? 50 times per second millions of times per second hun
charle [14.2K]
The data transmission speeds of token ring networks were 4Mbps and 16Mbps, implying that token frames were transmitted in the millions of times per second range.
6 0
3 years ago
Mark often gets headaches while working on his computer in the office. What activity can Mark do in the office to prevent headac
svet-max [94.6K]
Mark can prevent these headaches that he is getting on his computer by looking away from his monitor every now and again so he can rest his eyes.
4 0
3 years ago
Other questions:
  • Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the followi
    5·2 answers
  • The user documents are stored in _______ format.
    15·1 answer
  • What event in the 1970s contributed to the current
    6·2 answers
  • Unix is called a(n) ___________ operating system because it can run on a desktop pc or a server. operating systems installed on
    7·1 answer
  • Write a C function which mimics the behavior of the assembly language function below. Note that this time, the assembly language
    10·1 answer
  • You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone betwe
    8·1 answer
  • Which of the following is not a type of Internet Job Board? Options Resume Blaster Professional Association Target Applicants We
    8·1 answer
  • Which software programs should students avoid using to create and submit course work? (Choose all that apply).
    6·1 answer
  • Write a Python program which asks a user for a word and performs letters manipulation. If the word is empty, the program should
    6·1 answer
  • Braxton is writing a program to design t-shirts. Which of the following correctly sets an attribute for color?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!