When attempting to secure a mobile workstation, which of the following authentication technologies rely on the user's physical characteristics? (Choose two.)
A) MAC address table
B) Retina scan
C) Fingerprint scan
D) Two-factor authentication
E) CAPTCHA
F) Password string
Correct Answer:
Verified
Q304: A technician is investigating a potentially compromised
Q305: A company has two wireless networks utilizing
Q306: A security administrator is trying to eradicate
Q307: Joe, a user, has been trying to
Q308: A malicious system continuously sends an extremely
Q310: A penetration tester has written an application
Q311: Systems administrator and key support staff come
Q312: Which of the following is a deployment
Q313: Which of the following threats has sufficient
Q314: Ann, a user, reports she is unable
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents