Question

Management wishes to add another authentication factor in addition to fingerprints and passwords in order to...

Management wishes to add another authentication factor in addition to fingerprints and passwords in order to have three-factor authentication. Which of the following would BEST satisfy this request?

  • Retinal scan
  • Passphrase
  • Token fob
  • Security question
0 0
Add a comment Improve this question Transcribed image text
Answer #1

If equipment exists for example, inside company or office if you are able to establish then retinal scan is the best authentication but this fails in case of force logins like an intruder behaving rude to user and getting the retina scanned. If token fob is used, then anybody with the kit can get in easily, hence not recommended. Security question answer has the probability of answering more if the intruder knows the user well. Hence pass phrase can be used, which even exposed unknowingly hard to remember even it is impossible to guess such huge combination. It cannot be stolen as it is remembered unlike retina and token fob. Hence retina is good in case if equipment is good and authentication is done in open areas, else passphrase is much helpful

Add a comment
Know the answer?
Add Answer to:
Management wishes to add another authentication factor in addition to fingerprints and passwords in order to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Java Netbeans code Option 1: Authentication System For security-minded professionals, it is important that only the...

    Java Netbeans code Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential...

  • Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain...

    Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized...

  • Jefferson, Inc. (JI) Jefferson Inc. (JI) is a relatively new company that wants to improve its...

    Jefferson, Inc. (JI) Jefferson Inc. (JI) is a relatively new company that wants to improve its employee rewards, compensation, and benefits. The company understands that there are effective reward systems that will motivate employees. However, JI management is not sure which would be the best for the company. Compensation, another important area, must also be improved so that it will satisfy all employees effectively. In addition, the company wants to create benefits to keep the employees not just satisfied, but...

  • QUESTION 6 What factor(s), besides the NPV of an investment, should managers consider in a capital...

    QUESTION 6 What factor(s), besides the NPV of an investment, should managers consider in a capital budgeting decision? The effect of the investment on the manager's short-term incentives The effect of the investment on the company's reputation Tax shields related to depreciation that would result from the investment All three of the other answers 2 points    QUESTION 7 Which of the following three investments will have the highest NPV? All three cases require an initial investment of $45,000, and...

  • Correlation, risk, and return Matt Peters wishes to evaluate the risk and return behaviors associated with...

    Correlation, risk, and return Matt Peters wishes to evaluate the risk and return behaviors associated with various combinations of assets V and W under three assumed degrees of correlation: perfectly positive, uncorrelated, and perfectly negative. The expected return and risk values calculated for each of the assets are shown in the following table, B a. If the returns of assets V and W are perfectly positively correlated correlation coefficient = +1), describe the range of (1) expected return and (2)...

  • Only say choice 8. In order to maximize firm value, management should invest in new assets...

    Only say choice 8. In order to maximize firm value, management should invest in new assets when the internal rate of retum a. greater or equal to the firm's marginal cost of capital. b. greater than the cost of debt financing. c. less than or equal to the accounting rate of return. 9. The cost of capital is: a. the opportunity cost of using funds to invest in new projects. b. the rate of return the firm must ean on...

  • a lidate that you selected 1)In addition to the medication name and strength, which one of...

    a lidate that you selected 1)In addition to the medication name and strength, which one of the fo the correct product? c Manufacturer name NDC number Lot number Expiration date 2) Which queue is used to complete your Production workstation activities O QV OT 090 OOP 3) Which of the following describes ScriptSync? Helps patients get back on therapy by encouraging patients to re pas de prescription Helps patients start medication right by educating patients on the need to contenta...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT