The use of the smart card or security tokens is referred to as a two factor authorization because:
A) It is based on something the user has, the token or card, and something the user knows, the password.
B) It requires that the user is granted the card / token in a secure environment and that the user actually uses the card / token.
C) It requires that the user has two different authorizations: 1) to receive the card / token, and 2) to use the card / token.
D) It requires the use the card / token to 1) login to the system and 2) access the applications.
Correct Answer:
Verified
Q25: This item, that strengthens the use of
Q27: All of the following are environmental control
Q29: This table contains a list of valid,
Q30: This type of authentication uses some unique
Q33: Which of the following is not an
Q35: This should be established for every authorized
Q36: A process or procedure in an IT
Q37: This term means that a user cannot
Q38: The process of converting data into secret
Q40: General controls in IT systems are divided
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents