Which methods can be used to implement multifactor authentication?
- VPNs and VLANs
- IDS and IPS
- passwords and fingerprints
- tokens and hashes
Explanation: A cybersecurity specialist must be aware of the technologies available that support the CIA triad.
Exam with this question: Final Exam - Composite (Chapters 1-14)
Exam with this question: Cybersecurity Essentials FINAL Quiz Answers Full
Exam with this question: IT Essentials ( Version 8.0) Final Exam (Chapters 10-14)
Please login or Register to submit your answer