Which methods can be used to implement multifactor authentication?
- VPNs and VLANs
- IDS and IPS
- passwords and fingerprints
- tokens and hashes
Explanation: A cybersecurity specialist must be aware of the technologies available that support the CIA triad.
Exam with this question: Final Exam – Composite (Chapters 1-14)
Exam with this question: Cybersecurity Essentials FINAL Quiz Answers Full