1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
2 years ago
6

Password is an example of an authentication mechanisms that is based on " what an entity has".

Computers and Technology
2 answers:
Over [174]2 years ago
7 0

Answer:

False

Explanation:

A password in a one factor or multi-factor authentication is a mechanism not of what an entity has but what they know.

One factor authentication makes use of passwords only, to secure a user account. A multi-factor authentication uses two or more mechanisms for securing user accounts. It ask the question of what the users know (for password), what they have (security token, smart cards), and who they are(biometrics).

Alla [95]2 years ago
5 0

Answer:

False

Explanation:

The authentication mechanism especially the multi-factor authentication uses three types of authentication form factors.

i. What the entity knows: This includes what the entity knows and can always remember. Such as passwords and PINs

ii. What the entity has: This includes physical items that belong to the entity such as smart cards and token generators.

iii. What the entity really is: This includes natural or body features of the entity such as its thumbprint and its palm which can be used for verification.

According to these three factors, it is evident that password is based on "what an entity knows" and <u>not</u> "what an entity has".

You might be interested in
The technology dealing with robots is called
Alisiya [41]
<h2> Robotics </h2>

Robotics is a field of engineering that deal with design and application of robots and the use of computer for their manipulation and processing. ... Robotics requires the application of computer integrated manufacturing, mechanical engineering, electrical engineering, biological mechanics, software engineering.

4 0
2 years ago
Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w
Nostrana [21]
<span>Google Glass was interesting; a personal screen overlaid onto the real world, with 'augmented reality' ideas. The Nintendo 3DS was the first 'no glasses' portable 3D system.

So I predict Google 3D Glasses with built in Dolby 9.1 sound emulation. </span>
4 0
3 years ago
Read 2 more answers
How is sharepoint used in organization today?
tatyana61 [14]
<span>To build a team site and collaborate with your colleagues</span>
8 0
3 years ago
What is the main idea of this article? Please someone help me. I will give brainliest answer
mart [117]
The main idea of this article is that theme parks are conducting scientific research that is benefiting the community. Hope this helps!
8 0
3 years ago
When a typist changes from a conventional typewriter to a word processor, his typing schema will have to _____ to incorporate th
Elis [28]
<span>The schema will have to accommodate to make the person more easily able to perform the new task. Accommodation allows the new information to be made a part of a schema without changing the overall concepts in the schema. The schema itself stays unchanged for the most part, but the new information is more of a "tweak" to the schema than a full-on update.</span>
8 0
3 years ago
Other questions:
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Rom
    13·1 answer
  • Your mom wants to purchase a computer. She has heard about how the Windows 8 operating system is best-geared for a touch-enabled
    8·1 answer
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • What xDSL version provides a maximum throughput of 24 Mbps downstream and 3.3 Mbps upstream?
    9·1 answer
  • What is the financial aspect for a business as to what database software they will buy?
    6·1 answer
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • Which of the following is NOT a file format used for word processing documents? A. .ppt B. .rtf C. .doc D. .odt
    5·1 answer
  • Transitive spread refers to the effect of the original things transmitted to the associate things through the material, energy o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!