Which of the following technologies can be implemented as part of an authentication system to verify the identity of employees? (Select two correct answers)
- A fingerprint
- A SHA-1 hash
- A smart card reader
- A mantrap
Explanation: A username is the most common method used to identify a user. A username can be an alphanumeric combination, a personal identification number (PIN), a smart card or biometric — such as a fingerprint, retina scan or voice recognition.
More Questions: Cybersecurity Essentials: Course Final Exam Answers